 
	Spyware is used for many purposes. Usually it aims to track and sell your internet usage data, capture your credit card 
			or bank account information, or steal your personal identity. How? Spyware monitors your internet activity, tracking your 
			login and password information, and spying on your sensitive information.
Some types of spyware can install additional 
			software and change the settings on your device, so it’s important to use secure passwords and keep your devices updated.
If you’ve ever been a victim of identity theft or credit card fraud, you’re not alone. Cybercrime statistics tell the story:
Spyware contributed to those numbers.
Spyware is one of the most common threats on the internet. It can easily infect your device 
			and it can be hard to identify. 
Spyware is a threat to businesses and individual users, since it can steal sensitive information and harm
			your network.Check out our guide to help understand how spyware works, how to remove it, and how to help protect yourself or your business.
There are four main types of spyware. Each uses unique tactics to track you.
Spyware can affect PCs, Macs, and iOS or Android devices. Although Windows operating systems may be more susceptible to attacks, attackers are becoming better at infiltrating Apple’s operating systems as well. Some of the most common ways your computer can become infected with spyware include these:
Spyware can be difficult to recognize on your device. By its nature, it’s meant to be deceptive and hard to find. But there are clues that can help you identify whether you’ve been infected by spyware. You may have a spyware issue if your computer shows these symptoms.
Here are four main steps to help prevent spyware.
CoolWebSearch (CWS)
CoolWebSearch may hijack any of the following: Web searches, home page, and other Internet Explorer settings. Recent variants of CoolWebSearch install using malicious HTML applications or security flaws, such as exploits in the HTML Help format and Microsoft Java Virtual machines.
Gator (GAIN)
Gator is an adware program that may display banner advertisements based on user Web surfing habits. Gator is usually bundled with numerous free software programs, including the popular file-sharing program Kazaa.
180search Assistant
180search Assistant is an adware program that delivers targeted pop-up advertisements to a user’s computer. Whenever a keyword is entered into a search engine or a targeted Web site is visited, 180search Assistant opens a separate browser window displaying an advertiser's Web page that is related to the keyword or site.
ISTbar/AUpdate
ISTbar is a toolbar used for searching pornographic web sites that, when linked to, may display pornographic pop-ups and hijack user homepages and Internet searches./p>
Transponder (vx2)
Transponder is an IE Browser Helper Object that monitors requested Web pages and data entered into online forms, then delivers targeted advertisements.
Internet Optimizer
Internet Optimizer hijacks error pages and redirects them to its own controlling server at http://www.internet-optimizer.com.
BlazeFind
BlazeFind may hijack any of the following: Web searches, home page and other Internet Explorer settings. BlazeFind may redirect Web searches through its own search engine and change default home pages to www.blazefind.com. This hijacker may also change other Internet Explorer settings.
Hot as Hell
Hot as Hell is a dialer program which dials toll numbers in order to access paid pornographic Web sites. Hot as Hell may disconnect a user’s computer from a local Internet provider and reconnect the user to the Internet using an expensive toll or international phone number. It does not spy on the user, but it may accrue significant long distance phone charges. It may run in the background, hiding its presence.
Advanced Keylogger
Advanced Keylogger, a keystroke logger, has the ability to monitor keystrokes and take screen shots.
TIBS Dialer
TIBS Dialer is a dialer that may hijack a user’s modem and dial toll numbers that access paid, pornographic Web sites.