Spyware Absa | Corporate and Investment Banking > Insights and Events > Spyware SHARE Spyware involves the use of malicious software to covertly infiltrate computers or networks with the intent of collecting sensitive information. The information collected can then be used by fraudsters to commit fraud, including unauthorised access to bank accounts, theft of corporate data, and manipulation of financial transactions. How it happens and red flags to look out for You unintentionally install spyware when opening infected email attachments or websites, Clicking on malicious links or pop-ups or downloading free software or apps from untrusted sources. Spyware secretly monitors user behaviour, collects data, and sends it to a third party without your consent. It monitors browsing habits, captures screenshots, accesses camera/microphone, tracks location, collects files or clipboard data etc. Unlike Keylogger it collects many types of data, not just keystrokes. How to respond and protect yourself or organisation Delete unknown or suspicious apps/extensions. Once you notice any unknown files and applications notify your IT department. Keep your software and operating systems updated. Avoid clicking suspicious links or downloading from unknown or verified sites. Reporting options To report fraud-related incidents, please email cibfraud@absa.africa To report phishing incidents, please email secmon@absa.co.za To report a matter after business hours, please contact our Fraud Hotline on 0860 500 703 or 010 211 3117. https://cib.absa.africa/wp-content/uploads/2020/07/file_example_MP3_700KB.mp3 Related Articles FRAUD Fraud Alert Fraud is more than just a crime—it’s a global threat that silently drains billions from economies, shatters businesses, and ruins lives. From Social engineering, Cyber scams and identity theft to corporate deception, embezzlement and financial misstatements, fraud erodes trust in systems we rely on daily. Read more FRAUD Keylogger Keyloggers are programs that record everything you type, including passwords, emails, and credit card numbers. Installed via Trojans or malicious downloads. Read more FRAUD Trojan Horse Tjojan Horse (Trojan) is a type of malware disguised as a legitimate program or file. Once downloaded and opened, it creates a backdoor for attackers to steal data, control your device, or spy on your activity — all without your knowledge. Read more