Spyware: Technical Overview

Slides:



Advertisements
Similar presentations
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Advertisements

Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
BlueRedGreenPurpleOrange.
Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Resources. Overview Problem Report WebCT Faculty & Student Support Searching.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
SPYWARE  Do you know where your personal information is?
Spywares By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of technology (NYIT)-Jordan’s campus 2006.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Spyware & Internet Security
Quiz Review.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid Project 1 Fall 2004.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Protecting Your Computer & Your Information
Givingabit & ‘forgetmenot’ for businesses who support charity.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Spyware How to eliminate it!. What is Spyware? It is a file that copies itself to your computer without your knowledge. It reports your activities to.
Adware and Spyware By Mr. Arbogast.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
IWDS – Training Provider /28/2004. TOC-2 TOC-3 Objectives Understand Terminology and System Overview Enter an Entity Create a Location and Contact.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
SPYWARE By Bailey Hoover. HEADINGS What Is This? How to Protect Your Computer Steps If You Think You Have It Spyware Questions?
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Spyware Who’s spying on you?. What is Spyware? Spyware is software or hardware installed on a computer without the user's knowledge which gathers information.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
How to remove Ransomware on windows 10 ?
How to Avoid Spyware, Popups and other Annoyances
MALWARE Autumn Mattis.
Big Picture Consider this How many online threats might you be faced with a day?
TET1 Task 1: Ethics Charles Rich 5 November, 2016.
Malware aka- malicious software By: Ken Fogel
Computer Security Listening.
Spyware: Stealthy and Deadly
Protect Your Computer Against Harmful Attacks!
Spyware & Internet Security
Computer Applications Unit B
Spyware. By: Katheryn L. Gaston.
Viruses and Virus Protection
HOW DO I KEEP MY COMPUTER SAFE?
Ch9 E-commerce Security
Windows Vista Inside Out
Presentation transcript:

Spyware: Technical Overview Jody Blanke Mercer University ALSB, Ottawa August 21, 2004

What is Spyware? FTC definition – “software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer’s consent, or asserts control over a computer without the consumer’s knowledge” Spyware Adware Hijacker Trojan Keystroke logger Browser helper object (BHO)

How do you get it? “Trojan horse” - bundled as part of other software package Kazaa (12 different spyware programs; at least two with every version) ClockSync (WhenU) Precision Time (Gator) “Drive-by download” – HTML code transmitted by browser when visiting a web site request installation of program One spyware program helps install another; self-updating E-mail or links that, when opened, initiate transfer of code

How do you get rid of it? Be careful what you download Be careful what you consent to Install Spybot Search & Destroy http://www.safer-networking.org Install SpywareBlaster http://www.javacoolsoftware.com/spywareblaster.html Install Ad-Aware http://www.lavasoftusa.com/support/download/ Install Google Toolbar http://toolbar.google.com/ Visit PestPatrol Research http://research.pestpatrol.com/

Google Toolbar