SkipToMainContent

Norton UK Blog

« Back to Norton Blog

What is Grayware?

by Norton_Team

We’re not talking ancient Greek pottery here, but one of the most prevalent issues in Internet security today. But what exactly is grayware? Why is it a problem? And how should you deal with it? Read on to discover all you need to know about grayware.

So, what is grayware and what’s the big deal?

As its name might suggest, grayware is a category of software that sits in that ‘gray area’ – a sort of no-man’s land – between outright malware and legitimate conventional software.

Grayware – which is sometimes referred to as potentially unwanted programs (PUPs) – is not obviously malicious and is not classified as a virus, but it can still be irritating and even harmful. It includes files or applications that can carry out unwanted actions, such as tracking your behaviour online or sending you a barrage of pop-up windows. Grayware can be annoying, but – more importantly – it can affect your computer or mobile device’s performance and expose it to security risks.

The two most common types of grayware are adware and spyware.

  • Adware’s primary aim is to make money via advertising targeted specifically at you, the computer or mobile device user. It may or may not collect and send personal data to a third party. Adware is often considered obtrusive, and may make your computer less responsive.
  • Spyware’s main purpose is to track and record your online behaviour, and then send this information on to a third party – usually for marketing purposes. This information can include confidential financial and personal account usernames and passwords, as well as credit card details. Spyware generally doesn’t overtly ask for your consent to install components or to use the data it collects about you and your device. It tends to keep itself hidden, running silently in the background to avoid detection.

Adware and spyware are often installed together and work in combination: the spyware tracks and gathers information about your online behaviour, creating a user profile, while adware uses that information to display ads tailored to your profile.

You might knowingly or inadvertently agree to install bundled adware and spyware by accepting end-user licence agreements on free software. You might also pick it up accidentally by clicking on a pop-up window offering a free antivirus scan, a prize or a software update. You could also get it by opening links or attachments in compromised emails, texts or app messages.

Both adware and spyware take up disk space, generate annoying pop-up windows, consume memory and processing resources and may slow your computer down.

In the past, grayware was largely targeted at computers. However, a combination of our raised awareness of computer security risks and an increase in demand for mobile devices has led grayware developers to change tactics.  Smartphones and tablets are now increasingly at risk of picking up grayware, as we tend to be rather too app-happy – installing mobile apps with little thought of those applications’ potential to access and use our personal information.

 

Madware (mobile adware) is a particularly aggressive type of grayware that targets mobile devices – and it’s common in free apps, which tend to rely on ads for revenue. Madware has been known to:

  • Gather information about your device’s location and phone number.
  • Bombard you with text message ads.
  • Show ads on the notification bar.
  • Put shortcuts or icons on to the screen.
  • Change your dial tone to an audio advert.
  • Change your bookmarks.
  • Cost you in terms of data use and messaging charges.

What can you do about grayware?

  • Safe behaviour is your best defence against grayware.
  • Pay attention when you’re installing a computer program. Be alert for warning signs such as free add-ons or pre-checked boxes.
  • Think before you download apps. Consider what permission the app is looking for and ask yourself why it wants your data and what it will do with it. Read privacy policies.
  • Download apps only from secure, trusted sources.
  • Take the time to read End User Licence Agreements. Don’t automatically click ‘Next’, ‘I Agree’ or ‘OK’.
  • Install Internet security software on your smartphones and tablets as well as your computers. Keep it up to date and run regular scans.
  • Always update your device’s operating system when prompted.
  • Don’t click on pop-up ads, or links or attachments in unsolicited texts or emails.

Now you have it in black and white

Grayware can affect your device’s performance and compromise your security, as well as being a nuisance.

Don’t put your devices and your data at risk. Be aware. Be proactive: follow the tips above to help keep grayware out and keep your computers, smartphones and tablets running more securely and efficiently, free from unwanted software.

Related content: What is Spyware?

This entry was posted on Mon Aug 31, 2015 filed under online safety , online security and online threats

Stealing your identity can be easy. Good thing calling us is too.

Help with identity theft starts here. Trusted by millions of customers around the globe. Get Antivirus, Online Privacy, and in case of identity theft, Identity restoration support.


Get our award winning Norton protection

PC Mag:

A trademark of Ziff Davis, LLC. Used under license. Reprinted with permission. © 2022 Ziff Davis, LLC. All Rights Reserved

No one can prevent all cybercrime or identity theft.

The Norton brand is part of NortonLifeLock Inc.

Copyright © 2023 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

WANT MORE?

Follow us for all the latest news, tips and updates.