ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7
powered by Anytech365
Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Stone | |
Threat Level![]() ![]() ![]() |
Stone carries out the following actions:
Spyware programs are applications that gather information about users' Internet habits and preferences. The data, when collected, is sent to the creators themselves or to third parties, either directly or after being stored on computer.
Spyware can be installed either with or without users' consent, and either with or without their knowledge about the data gathered and/or the use of it.
It captures certain information entered or saved by the user, with the corresponding threat to privacy:
Stone does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Stone has the following additional characteristics:
ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7
powered by Anytech365
Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,