Quick Links: SpywareGuide Greynets Blog | SpywareGuide Product Database | SpywareGuide Company Database | SpywareGuide Categories
Search SpywareGuide Database & Site
Security Email Alerts & Updates
SpywareGuide powered by FaceTime Security Labs

The SpywareGuide research team has been at the forefront of spyware and privacy protection for years. The team spends considerable time researching and reporting on the topics that matter -- protecting your PC and privacy. The SpywareGuide Articles are the result of this effort. Topics covered included botnets, rootkits, IM worms, spyware, adware, keyloggers, privacy and much more.

If you have a Article you would like to submit, or would like to considered as a guest writer, please contact us.

You "Thawte" You Were Safe
Wayne Porter
The importance of understanding how much protection a digital signature extends to you the end user. Just because code is digitally signed does not mean it is inherently safe.

FTC Spyware WorkShop PDF Reference Files
Jan Hertsens
Archived presentations in PDF format. Including Orson Swindle, Bryson Gordon, Andrew McLaughlin, Jules Polonetsky, Jeffrey Friedberg, Wayne Porter and Rep. Sephen Urqhuart, Utah. Also includes Agenda and PanelistBios also included in PDF format courtesy of the FTC.

Adware Self Regulation- Not The Answer
Wayne Porter
Performance marketing leaders meet in 2002 to hammer out a Code of Conduct and how adware is impacting partner commerce specifically in the revenue sharing industry. Find the minutes inside and our own commentary.

Country Code Extensions Look-up
Wayne Porter

Kudos From Our Users
SpywareGuide Staff
Ok this is not an article, but we wanted to highlight some of the nice reviews people send in via Amazon. Thanks so much for your feedback, our staff and volunteers appreciate the kind words and encouragements.

Laptop Security and Laptop Theft Tips to Stay Protected
Jan Hertsens
Your laptop is your life, not to mention really expensive. Treat it like it is your last one and keep spies and thieves at bay with these simple survival strategies.

Spyware- Potential for Terrorism?
Wayne Porter
Could spyware be used for a terrorist attack? Not only could it be used to launch an attack it could possibly be used to fund an attack...with a deadly breed of botnets, spyware and rogue scripts the brew grows more dangerous.

Marketing Advice For Merchants on Adware
Wayne Porter
Adware sounds like a good pitch, but is it really good for you, your customers and your brand?

Tough Questions and Bad Behavior
Wayne Porter
Bad behavior and software. Questions we ask about the software we analyze.

Remove Hidden Data in Microsoft Office
SpywareGuide Staff
Every digital document has its own hidden trail. Preserve your privacy with this free add-on for Office 2003.

Page 7 of 9
2 3 4 5 6 7 8 9
Help with the BUST!
Click here and give us what details you have and let our international research team take it from there. If you desire your report will remain anonymous.
Recent Blog Posts
Notice: Undefined index: version in /data/www/spywareguide/magpierss/rss_parse.inc on line 228
  • A Year In Security
  • Youtube Comment Bot Spams In Waves
  • VGA Awards Trailers Used As Bait For Spam Offers
  • Fake Visa Electronic Report Serves Up Zbot Data Stealer
  • Banned Console Owners Beat The System - With Stickers
  • Spot The Hack
  • The Futility Of EULAs
  • Auto Whaler Spears Phishers
  • Fake Porn Grabbers Snag Nothing But Malware
  • Console DDoS Botnets - A Thriving Industry
  • Recent Modifications
    2021-8-24  Adult Networks/Services
    2017-2-10  Adult Hosts
    2016-3-30  CoolWebSearch
    2015-9-29  Malicious URLS
    2015-5-19  Dialers
    2015-1-5  Email Threats
    2013-7-20  Date Manager
    2013-4-10  BeeBus
    2012-12-18  JT.Moonwalk
    2012-12-18  Sadbiz

    Site EULA | Site Map | Contact Us | About Us | Site and Spyware FAQ | Advertise | RSS Feeds  | Link To Us | SpywareGuide Japan Japanese

    © Copyright 2007, FaceTime Communications, Inc. All rights reserved.