Welcome to Spyware Watch where we track the latest spyware threats and recommend how to get rid of them.

Spyware Watch Home Page

Spyware is the biggest threat to safe computing today. Be sure to keep yourself aware of the current threats, and be able to remove them if your computer becomes infected.

Visit the appropriate sections of this site for the latest news in spyware, the most recent live threats, and find out how to keep your computer, software, operating system and your entire computing environment safe.

Disclaimer: The data on this site is for informational purposes only. Anyone who makes changes to their computer is fully responsible for any repercussions. We strive to make sure we have the latest and most pertinent and correct information available, but not every single piece of information can be verified in a timely manner.

By using this site you agree to take full responsibility for your actions on your on PC or Mac. Spyware-watch.com cannot be held liable for any actions you take on your computer. We offer no services or software on this site, and have no liability herein whatsoever.


Spyware is a computer program that gathers information about a user without that user's knowledge, or performs some sort of activity on a user's computer without the user's knowledge or permission. Spyware can be broken down into two separate categories. The first is surveillance software such as key loggers, screen capture devices, and Trojans. The next is advertising spyware that is usually installed without your knowledge or explained in such a way that you do not know it is spyware.

Some of these programs, whether they are called spyware, malware or adware, can install DLLs and other files that will send data to the company that installed the software. This can also leave your computer open to hackers.

These spyware programs can disable your uninstall abilities, monitor your keystrokes as you type, access files on your drive, disable your applications, reset your browser's homepage and display advertising content which you did not request. They may also be able to access and delete files and even reformat your entire hard drive.