Security Information |
|
Everything You Need To Know About Spyware and Malware
You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. You click on a link, and BLAM you are redirected to a search page you've never heard of and the "back" button won't work. You've got Spyware! Just what is "Spyware?" The word brings to mind exploding pens and shoe phones. In fact, software makers have struggled to define what spyware is, and is not. The Anti-Spyware Coalition, a group of companies that include EarthLink, Microsoft, and Hewlett-Packard, have recently published a document that defines spyware as such: "Spyware impairs users control over material changes that affect their user experience, privacy or system security; use of their system resources, including what programs are installed on their computers; or collection, use and distribution of their personal or otherwise sensitive information" In simpler terms, spyware "spies" the software on your computer, personal information, what web pages you look at, and in some cases, usernames and passwords. Ugh. The first spyware distribution was in 1999, and is attributed to a popular freeware program called "Elf Bowling." Many users found to their dismay that this "harmless game," was sending information to the creators, Nsoft. This spawned the first anti-spyware program in the year 2000. Now, both spyware and anti-spyware programs are too numerous to count. There are several types of software that fall under the generic description of spyware. Let's look at a few, and what they do. Adware - adware is an application that displays advertising banners. The reason this is criticized is that it can send information back to the company, who then "targets" you with specific banners based on the web pages you've opened. This is different from clicking on a banner for more information. This program sneaks in the "back door," not "advertising" its presence. Please note that the word "AdWare" is a trademark of AdWare Systems, an honest software company. They are not a part of adware, just share the unfortunate name. Key loggers are just that. They collect the keystrokes you make, like logging into your bank account, and send it to the hacker. Now he has your account number, user name, and password. Hijackers and Toolbars are another form of spyware. Hijackers take over your browser, opening pages you don't want, and preventing you from opening ones you need - like a site that tells you how to get rid of them. Toolbars are the same sort of thing. Now, you may want to have a toolbar like Yahoo or Google on your browser. They can make searches easier, and may have popup or ad blockers. The malware forms of these try to look like them, but they have completely different motives. Malware is a generic term for "malicious" software. These programs don't just collect information; they are out to get your computer. Technically, these are not spyware, but a brief explanation seems to be in order. Malware spreads itself through the computer, changing files, making copies to send, even erasing the hard drive. Virus' and worms are a part of this group. Other malware programs are "Trojan Horse, or Backdoor." These hide quietly in your computer until you connect to the internet. Then they creep around your browser, "reporting in" to the owner, who then uses your computer "address" to send out virus's, malware, and spam. Some hackers link several computers to send so much nonsense information to a particular web site that it is overwhelmed, causing it to shut down. How does spyware end up on your computer? You're not going to like this . . . but most likely you loaded it on yourself! Wait! Before we get nasty letters, let us explain. Remember those "smileys" you downloaded last week? How about the cute cursor the nine year old picked? Most of these "free" programs have spyware attached, or imbedded in them. Even Adobe Reader loads a "Yahoo search bar" when you update the reader. Remember when you installed the program and that gray box popped up with a thousand lines of small print? Did you read it? I doubt anyone does. The spyware distributor counts on that. If you do manage to slog through the legalese, and stuff only advanced programmers would know (or care about), there will be a few innocuous lines, something along the lines of: "this program will collect information to better your enjoyment of this program," or "a web search toolbar will be added to your browser." When you click on the "accept" button to install the software, you have also agreed to the spyware program. Another way is when a box pops up claiming to be legitimate software needed to view the site properly, or that it is an update. It only has a "yes" button, implying that you are required to allow the download. These are copying legitimate updates from places like Microsoft, or Macromedia. Just what is spyware going to do to your computer? Anything you can do, he can do better. It is an executable that can record keystrokes, read your files, watch your word processing program, change your home page, add and delete files, read your cookies (with personal info), then "phone home" with the info. Some spyware will crash your browser if you try to uninstall it. Others may "pretend" to be uninstalled, but they wait until your back is turned to load itself back on your system. You don't know how the stuff was loaded on your computer, but it is causing all kinds of problems. The computer is running slower, certain programs are not working, and on occasion, you see the dreaded "blue screen of death." (crash). Don't worry, you are not alone According to an October 2004 study by America Online and the National Cyber-Security Alliance, 80% of surveyed users' computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for it to be installed. Now what do you do? There are several good "spyware removal" programs out there. But be warned! There are also a number of programs that claim to be anti-spyware that do not work, or worse add more spyware to your system! A good resource for "suspect" spyware is the list at:http://www.spywarewarrior.com/rogue_anti-spyware.htm They have a list of over 200 programs that claim to take care of spyware, but may not do what they claim. Once you get your computer "clean," how do you avoid getting "dirty" again? There are firewalls and programs designed to watch for known spyware. When you register, the "known spyware" definitions can be updated on a regular basis. You could use a browser other than Internet Explorer (most spyware exploits problems here). This writer loves Mozilla Firefox - it's free at www.mozilla.org Our lawmakers are doing their best to stem the tide of spyware/malware. For example, in Washington State, USA, it is illegal for anyone other than the owner/operator of a computer to install software that alters web browser settings, monitors keystrokes, or disables computer security software. The Gibson Research Corporation, www.grc.com, has several free fixes to "plug holes" in Internet Explorer's security. There is hope. In 2005, NY Attorney General Eliot Spitzer brought suit against Intermix Media, Inc. Intermix's spyware program spread by drive-by download (loaded without permission), and installed itself in such a way it was very difficult to remove. Intermix settled for $7.5 million dollars. Spyware is here to stay. Your best bet is to be informed - know the tricks used by spyware to load itself. Use a firewall or spyware blocker program. Most important, understand exactly what that new program will install on your innocent computer. ABOUT THE AUTHOR:
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News Canada Releases Defense Policy Update to Boost Security Department of Defense Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News RSA Conference 2024: AI and the Future Of Security Security Boulevard See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post FCC proposes BGP security measures Network World UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News The New U.S. Strategy on Global Health Security Think Global Health PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Votiro Keeps Up the Momentum in 2024 Security Boulevard A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State The Best Home Security Systems of 2024 Security.org The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando The Dell API Breach: It could have been prevented Security Boulevard JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Making Safety and Security Intrinsic to School Design Campus Security Today America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard U.S. Security Cooperation with Ukraine - United States Department of State Department of State USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard Belgium cuts off ticket sales for soccer match against Israel over ‘security concerns’ The Times of Israel Security fog machine helps deter burglars from Chatsworth business FOX 11 Los Angeles French security forces impose 'calmer' situation in New Caledonia under emergency powers FRANCE 24 English Galaxy Tab S9 lineup gets Android's May 2024 security update SamMobile - Samsung news |
RELATED ARTICLES
If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. |
home | site map |
© 2006 |