Date First Published: 4th April 2024
Topic: Computer Systems
Subtopic: Computer Software
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 5/10
Learn about what foistware is in this article.
Foistware describes software that is installed without the user's knowledge or consent, most commonly toolbars, browser extensions, and system utilities. It is "foisted" on users and often bundled with another unrelated product and puts hidden components on a system. For example, an installation package may install an unwanted browser toolbar and the opt-out choice may be hidden or worded in a way that makes it likely for the user to miss them.
Developers of free software with large distribution often get paid to bundle unrelated software with their main software, so the developers try to make money by tricking users into installing software they don't need. This can have an impact on system performance, unnecessarily consume system resources, and reduce efficiency.
Foistware is not always malicious, but it is often unwanted and more of an annoyance than a benefit for the end user. It is often installed through deceptive practices and extra, unwanted software added to an installation package. If users click Next or Okay without reading the agreement or checking that nothing else is ticked, they will end up with extra software that they didn't intend to install on their computers.
Some foistware can be malicious and come in the form of spyware or browser hijackers which steal sensitive information or modify the user's browser settings without their permission. The installation often happens without any user consent.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection