Tag: spyware and malware

Displaying 1 - 20 of 32 results.

Pages

Filtering by content type: Blog Post

Natives and fans heartily agree that “Cleveland Rocks!” That’s why the Federal Trade Commission and its Ohio partners are ready to roll with the next installment of Green Lights & Red Flags: FTC Rules of the Road for Business, set to make its online debut on October 29, 2020, from...

Filtering by content type: One Stop - Tag-based

Combating Spyware and MalwareMalware, short for "malicious software," includes viruses and spyware that can steal personal information, send spam, and commit fraud. Criminals use appealing websites, desirable downloads, and compelling stories to lure consumers to links that will download malware –...

Filtering by content type: Plain Language Guidance

More than a thousand new apps are hitting the market each day.  In this fast-moving era of entrepreneurship and creativity, is security keeping up?  Apps and devices often rely on consumer data — including contact information, photos, and location to name a few — and can be vulnerable...
Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions...

Filtering by content type: Press Release

Your email has been hacked – what do you do? Your computer has been hijacked by malware – how do you get it back? Whether you’re unsure or you’re the person your friends always turn to with these kinds of questions, the Federal Trade Commission has created two videos, in English and Spanish, to...
The Federal Trade Commission testified before Congress today on the agency’s ongoing efforts to protect consumers from emerging threats related to online advertising, as well as the Commission’s recommendations in this area.
How much is everything on your computer worth to you?  About $300?  The criminals behind a new malware program are betting on it.The Federal Trade Commission, the FBI and other federal agencies are warning consumers and businesses about “Cryptolocker,” a malware program that holds the files on your...
An operation that uses the lure of free lyric files, browser upgrades, and ring tones to download spyware and adware on consumers’ computers has been ordered to halt its illegal downloads by a U.S. District Court at the request of the Federal Trade Commission. The court also halted the deceptive...
At the Federal Trade Commission’s request, a federal court imposed a judgment of more than $163 million on the final defendant in the FTC’s case against an operation that used computer “scareware” to trick consumers into thinking their computers were infected with malicious software, and then sold...
An operator of an online “scareware” scheme will pay more than $8 million to settle Federal Trade Commission charges that he used deceptive ads to trick consumers into thinking their computers were infected with malicious software, and then sold them software to “fix” their non-existent problem.
The Federal Trade Commission has put the brakes on the business practices of an operation that was selling spyware and showing customers how to remotely install it on other people’s computers without their knowledge or consent.
At the Federal Trade Commission’s request, a district court judge has permanently shut down a rogue Internet Service Provider that recruited, hosted, and actively participated in the distribution of spam, spyware, child pornography, and other malicious and illegal content. The ISP’s computer...

Filtering by content type: Video

Filtering by content type: Public Statement

Filtering by content type: Public Event

The FTC hosted a public workshop to explore the issues associated with the distribution and effects of software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer's...

Pages