Description
Programs of this type are able to monitor computer activity (active processes, network activity, etc.) and are not malicious programs. However, these actions may be performed with malicious intent.
If a user has installed such a program on his/her computer, or if it was installed by a system administrator, then it does not pose any threat.
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!