Escalation Of Ad Wars Boosts Malware Delivery

Slides:



Advertisements
Similar presentations
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Advertisements

Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
IT security By Tilly Gerlack.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malicious Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer safety Filip Hruby.
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Botnets A collection of compromised machines
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
Three Things About Malware
Malware and Computer Maintenance
MALWARE Autumn Mattis.
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Various Types of Malware
Malware aka- malicious software By: Ken Fogel
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Protect Your Computer Against Harmful Attacks!
f
Legitimate Blocks: If you're visiting the same website each time then the warning will appear, the site may contain some dangerous and malicious content.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Botnets A collection of compromised machines
Teaching Computing to GCSE
Computer Technology Notes 5
Computer Applications Unit B
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Staying safe on the internet
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
Cyber security and Computer Misuse
Windows Vista Inside Out
Introduction-Cyber Safety
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Escalation Of Ad Wars Boosts Malware Delivery Get free antivirus Really free No hidden costs Just for you CLICK HERE NOW Escalation Of Ad Wars Boosts Malware Delivery

Definations Malware Malware is short for malicious software, meaning software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.

Definations Adware Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements.

Definations Malvertising Malvertising (a portmanteau of "malicious advertising") is the use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.

http://www.watchepisodeseries.com/

Types of Malwares Delivered Adware Bot Bug Ransomware RootKit Spyware Trojan Horse Virus Worms

Legitimate Pop-up Ads If you'd like to show an ad on one of your Web pages, you can add JavaScript code to the page that opens a pop-up when someone visits the page. You wouldn't be trying to infect someone else's computer if you did that. You would simply be showing site visitors legitimate pop-ups. They don't harm people and they help websites generate revenue. If you don't wish to see these pop-ups, you can adjust your browser to prevent pop-up windows from appearing.

Dangerous Pop-ups Chase bank gives an excellent example of a dangerous malware program that uses pop-ups to steal information. The bank cites a computer virus that opens a pop-up on a page a bank customer is viewing. Because the pop-up has the word “Chase” in its title, people may assume that the bank displayed the pop-up. While this particular pop-up is not an ad, cybercriminals can infect computers with viruses that show pop-up ads similar to the Chase pop-up.

Chase customer getting hacked

Safety Tips Pop-ups that appear unexpectedly usually come from software running on your computer instead of on a Web page. These programs may be simple adware modules that get into your computer when you install another application. Always read disclaimer messages that appear when you install free applications. Surf safely by installing an anti-virus program, keeping it running at all times and letting it scan all files you download.

Steps to remove adware and unwanted pop-ups Uninstall Malicious programs from windows Use some Cleaner to remove adwares from the computer Scan and clean your computer with antivirus Double check for malicious programs Reset your browser for default settings

FOUND HIM!!! Ethan Zuckerman, the man who invented pop-up ads, has apologised to the world in a lengthy explanation of his original intentions. Zuckerman explains that he had unintentionally created one of the most hated forms of advertising on the web. In the late 90s Zuckerman worked for Tripod.com, a website that marketed content and services to graduates. Tripod later changed business model after the initial concept failed to catch on, becoming a webpage-hosting provider and “proto-social network” instead. Tripod tried a number of revenue streams to keep the business going including; selling merchandise, a subscription service and even a paid-for magazine. But what really worked was advertising, and this is where it all began.

FOUND HIM!!! "Not only did I deploy what was probably the first popup, I wrote the javascript and the server-side Perl to launch it,"

Recent Incidents Rik Ferguson from Trend Micro described an incident when the New York Times was hosting a banner ad that attempted to social-engineer people into installing a rogue antivirus tool. According to Rik, “the problem may have been ongoing for upwards of 24 hours” before the New York Times noticed the malicious nature of the ad and disabled it.

Recent Activities In another example, the London Stock Exchange website was also observed inadvertently serving malicious ads to its users, as described by Paul Mutton. This incident was traced to a possible breach at Unanimis—the company serving the ads the London Stock Exchange and many other companies.

Some Videos https://www.youtube.com/watch?v=yeg5XfLhSic https://www.youtube.com/watch?v=Y2dvnE2-bL8

References https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101 https://www.forbes.com/sites/jaymcgregor/2014/08/15/the-man-who-invented-pop-up-ads-says-im-sorry/#3754dac54ebe https://malwaretips.com/blogs/remove-adware-popup-ads/ https://zeltser.com/malvertising-malicious-ad-campaigns/

LOL...THANKYOU Go next Go next Go next Go next Go next Go next Go next