How to Avoid Spyware


Lots More Information

Related Articles

Sources

  • Dang, Alan. "Behind Pwn2Own: Exclusive Interview with Charlie Miller." Tom's Hardware. March 25, 2009. (April 6, 2009)http://www.tomshardware.com/reviews/pwn2own-mac-hack,2254.html
  • Ibanga, Imaeyen. "Teacher: Wrong Computer Click Ruined My Life." ABC News. Jan. 27, 2009. (April 6, 2009) http://abcnews.go.com/GMA/Story?id=6739393
  • Magid, Larry. "It Pays to Read License Agreements." PC Pitstop. (April 15, 2009) http://www.pcpitstop.com/spycheck/eula.asp
  • Panda Security. PandaLabs Blog. "PandaLabs Quarterly Report January-March 2009." (April 7, 2009)http://www.pandasecurity.com/img/enc/Quarterly_Report_PandaLabs_Q1_2009.pdf
  • Scambusters.org. "Protect Yourself from Fake Antivirus Software." (April 2, 2009) http://www.scambusters.org/fakeantivirus.html
  • spamlaws.com. "Spyware and the Law." (April 7, 2009)http://www.spamlaws.com/spyware-laws.html
  • Spyware Warrior. "The Spyware Warrior List of Rogue/Suspect Antispyware Products & Web Sites." (April 8, 2009)http://www.spywarewarrior.com/rogue_anti-spyware.htm
  • U.S. Federal Trade Commission. "Federal Trade Commission's Information on Spyware." (April 7, 2009)http://www.ftc.gov/bcp/edu/microsites/spyware/index.html

More to Explore