Badware is software that fundamentally disregards a user’s choice about how his or her computer or network connection will be used.

Some badware is specifically designed for criminal, political, and/or mischievous purposes. These purposes might include:

  • stealing financial account numbers, passwords, corporate trade secrets, or other confidential information;
  • tricking the user into buying something that she or he doesn’t need;
  • sending junk e-mail (spam);
  • attacking other computers or networks;
  • distributing more badware.

This type of badware is often referred to as malware, and includes viruses, Trojans, rootkits, spam bots, and other varieties.

Some badware is not malicious in its intent, but still fails to put the user in control. Consider, for example, a browser toolbar that helps you shop online more effectively but neglects to mention that it will send a list of everything you buy online to the company that provides the toolbar. In this case, you are unable to make an informed decision about whether to install or use this software. Another example is when you install a piece of software, and that software installs additional software that you weren’t expecting. This can be especially troubling if the additional software does something undesirable or doesn’t uninstall when you remove the original software.

At times, the line between deliberately malicious software and unintentionally bad software can blur. Software creators can, and should, stay away from this blurry line by using clear messaging and thoughtful product design to keep users in control of their computers and networks.

More information about badware:

Badware websites

A badware website facilitates the distribution of badware, either intentionally or because it has been compromised. Many, perhaps even most, badware websites distribute badware without the knowledge of the sites’ owners.

Drive-by downloads occur when a website automatically (and often silently) installs software when you visit the site. Typically such an attack takes advantage of a vulnerability or “hole” in your web browser, a browser plug-in, or other software on your computer.

Social engineering attacks take advantage of human nature by tricking people into installing badware. One common ploy includes showing a fake virus scan that indicates that your computer is infected and encourages you to download and/or purchase a tool to remove the infection. Another common trick is offering to display a video that sounds interesting, but only after you install a plug-in or codec that is “required” to view the content.

More information about badware websites: