Abstract
The Business
Timeline—how did we get into this mess? The players How their business works Legislative environment The Technology
Technical overview of different types of programs (taxonomy) Describe how the programs function How adware/spyware is installed Hijacking the system How it updates itself Proven techniques to prevent & remove Looking ahead
Market polarization, bad get worse, good get better (more white, less grey) Order from chaos Installations: Beyond the website Growing sophistication Exploiting Adware