Spy Sweeper

December 2004
Management Services;Dec2004, Vol. 48 Issue 12, p31
Academic Journal
This article provides information on the version three of the Spysweeper solution from Webroot Software. The version makes a lot of improvements both for extra functionality and to keep one step ahead of the competitors who are making a lot of improvements themselves including several newly identified blended threats. In a two-pronged approach Spysweeper 3 uses proactive capabilities for fighting spyware and is designed to identify, root out and quarantine all spyware attempts. This means all forms of adware and spyware including Trojans, keyloggers, system monitors and such plus, as stated, blends of those threats. It is armed with a threat database to eradicate more than 27,000 spyware traces. Spyware 3 also uses a set of Internet Explorer (IE) and browsing shields. A hijack shield prevents redirected web searches, IE Favourites shield guards against surreptitious additions to one's favourites list and Host File shield stops malicious websites from conducting an address hijacking in order to divert the user from a desired site to an undesired one. This last also repairs the original address for already damaged sites. For spyware that can attack when a user is not even online, there are shields to catch tricky spyware when it attempts to download, install or run on a user's personal computer.


Related Articles

  • Webroot-SpySweeper Enterprise.  // SC Magazine: For IT Security Professionals (UK Edition);Mar2006, Special section p12 

    The article reviews the computer security software SpySweeper Enterprise from Webroot Software Inc.

  • Webroot Survey.  // Software World;May2008, Vol. 39 Issue 3, p26 

    The article reports on the Webroot Survey of Webroot which demonstrates that travel, personal webmail and social networking websites are frequently accessed by employees in Great Britain's workplace. The Webroot Survey finds out that employees frequently connects with their webmail and social...

  • Internet Essentials.  // Software World;May2005, Vol. 36 Issue 3, p24 

    Reports that Webroot Software Inc. has combined its anti-spyware and security software products in one-retail only security suite called Internet Essentials.

  • Spyware Infection Rates Return To Peak 2004 Levels.  // Software World;Sep2006, Vol. 37 Issue 5, p24 

    The article presents Webroot Software's research report entitled "State of Spyware" in the U. S. Spyware infection rates have returned to 2004 peak levels in the second quarter of 2006. The trend is attributed to advancements in spyware technologies, a consumer tendency to rely on free...

  • Webroot AntiSpyware with AntiVirus. Mitchell, Dave // SC Magazine: For IT Security Professionals (UK Edition);Apr2008, p49 

    The article reviews the electronic mail security software Webroot AntiSpyware With AntiVirus from Webroot.

  • Webroot Merger.  // Database & Network Journal;Dec2007, Vol. 37 Issue 6, p25 

    The article announces the merger between Webroot Software Inc., and Email Systems to develop innovative computer software security solution in Great Britain. The two merger company will offer Internet security solutions such as email archiving, image scanning and encryption, anti-spam and other...

  • WEBROOT SHINES SPOTLIGHT ON BLENDED ATTACKS. McLaughlin, Kevin // CRN;6/26/2006, Issue 1202, p55 

    The article reports on the addition of new features to Spy Sweeper Enterprise from antispyware vendor Webroot aimed at combating increasingly sophisticated threats in the U.S. A variety of enhanced security features are added to Spy Sweeper Enterprise 3.0 to address emerging threats from...

  • Webroot Spy Sweeper Enterprise. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p44 

    Reviews the SpySweeper Enterprise 2.1 anti-spyware software from Webroot.

  • FEATURE: ANTISPYWARE. Winter, Daniel; Rees, Glenn // Australian PC User;Oct2005, Vol. 17 Issue 10, p35 

    Reviews the Webroot Spy Sweeper 4 Internet security antispyware computer software.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics