Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How to Protect Your PC Grayware Adware, Malware, Spyware.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
What is Malware? Definition: Definition: A generic term used to describe any form of malicious software; e.g., Virus, Trojan horse, Spyware, Adware, Malicious.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Why Should I Improve My PowerPoint Backgrounds? Dr. Steve Broskoske Misericordia University.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

Spyware and other annoying Pop-ups

What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How do I prevent spyware infections How do I get rid of spyware

What is Spyware? Spyware originated in the 1990's with programs that secretly observed and logged your web surfing habits Spyware can do more than steal your personal information. It can also rob your PC of its speeds, stability and Internet access efficiency.

What is the threat? Spyware is now the single largest problem facing Internet users today –volume far outstrips spam and regular virus infections –Spyware usually refuses to be uninstalled through your control panel –covertly install themselves on your computer –perform secret operations without your permission

Is Adware the same as Spyware? Adware is a subset of Spyware with a definite distinction. Adware delivers specific advertising (pop-ups) on user’s computers which can be annoying when undesired. Adware is generally not malicious or illegal. Adware can be Spyware when it tracks browser activity and reports such activity back to some unknown recipient.

Adware Example

Types of Spyware Spyware has now evolved into dozens of other malicious forms: –Sneakware –Adware –Keyloggers –Browser hijackers

What is Sneakware Sneakware - Uses deceptive means to sneak onto your computer. –Users may grant permission, but is often unaware. –permission is buried deep within EULA –vendor often tries to fool naïve users into thinking they are at risk if they don’t install it.

What is Adware? Adware - Software that gathers information about your Web-surfing habits in order to target you with pop-up advertisements for products and services that might be of interest to you.

Adware Example

What is a keylogger? keyloggers are applications that monitor a user's keystrokes and then send this information back to the malicious user.

What are browser hijackers? Browser hijackers are malicious programs that –change browser settings, usually altering designated default start and search pages. –Some produce pop-up ads for pornography add dozens of bookmarks redirect users to porn websites when they mistype URLs.

Spyware Threat Statistics 80% of all PCs have been infected by spyware 91% of PC users are aware of spyware The average PC has 93 spyware components on it 89% of infected users are unaware of the spyware found on their machines 95% of infected users did not give permission for the software identified as spyware to be installed on their machines 20% of calls to Dell’s helpdesk are spyware related (source: Dell) Microsoft estimates that 50% of all PC crashes are a result of spyware

Spyware statistics Severe Threat – 15% of spyware threats send private information gathered from the end user currently logged on to the infected system: logging the user's keystrokes, logged-on user name, hash of administrator passwords, addresses, contacts, instant messengers login and usage, and more. Moderate Threat – 25% percent of spyware sends information gathered from the victim's operating system, including the computer (host) name, domain name, logs of all processes running in memory, installed programs, security applications, client's internal IP address, OS version, the existence and versions of service packs and security updates, TCP ports the spyware is listening to, Computer Security Identifier (SID),default browser's homepage, browser plug- ins, etc. Minor Threat – 60% of spyware transmits gathered commercial-value information about the end user's browsing habits. This includes keywords used in search engines, browsing habits and ratings of frequently visited websites, shopping reports etc.

Why does Spyware continue? SPYWARE APPLICATIONS GENERATE AN ESTIMATED $2 BILLION IN REVENUE ANNUALLY.

How do you make money on Spyware? iFrameDollars.biz –pays 55 cents per install or $55 for 1,000 unique installs of a 3KB program that "changes the homepage and installs toolbar and dialer." –Website owners install the code on their site and web visitors get the code installed on their computer.

How Adware Gets on Your PC

How does spyware get on your PC? Drive-by downloading (rogue affiliates) –Websites use vulnerabilities in IE to install spyware without your knowledge or permission Intentional Installs

How does spyware get on your PC? Viruses and Trojans –Some viruses install spyware Software Bundles –Legitimate freeware may install spyware or adware as a way to ‘pay the bills’. P2P software is notorious for this.. –Morpheus, Kazaa, eDonkey, Bit Torrent, etc. –Often times spyware is authorized by the EULAEULA

Is spyware different than viruses Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, spyware is designed to exploit infected computers for commercial gain. Spyware may have to same effect as viruses

The clues that spyware is on your computer a barrage of pop-up ads a hijacked browser — that is, a browser that takes you to sites other than those you type into the address box a sudden or repeated change in your computer’s Internet home page new and unexpected toolbars new and unexpected icons on the system tray at the bottom of your computer screen keys that don’t work (for example, the “Tab” key that might not work when you try to move to the next field in a Web form) random error messages sluggish or downright slow performance when opening programs or saving files

How do I prevent spyware? Visit trustworthy Web sites Read user reviews, download site reviews, or analyst/press reviews (i.e. CNet, ZDnet, Tucows) on software you intend to download Before installing any software, carefully read license agreements, and privacy statements for how information is collected To close pop-ups, ignore the message and just click the Windows close "X" button Run anti-spyware software to clean and block spyware in real time Download and install the latest updates for your anti-spyware software and Microsoft Windows operating systems Set appropriate security settings for Internet Explorer. Use a separate, non-mission-critical machine for testing downloaded software Install a personal firewall to track outgoing connections before and after installing downloaded software

How do I prevent spyware? Don’t install "free programs," specifically file sharing programs, until you know all the software that’s bundled with it Don’t click on attachments or links in s or internet messages if you don’t know the sender or even if you know the sender, but the content is unexpected. Don’t give permission to unknown software to install itself on your computer Don’t click on links or buttons on pop-up windows even a click on the "no" and "cancel" buttons can install spyware your machine Don’t install non-work-related software onto your work computers Save your data and backup often

How do I get rid of spyware? Remove your computer from the network Run anti-spyware programs to identify malware Uninstall / remove malware programs Once you complete these steps you will most likely need to re-format and re-load the computer.

Spyware Legislation Securely Protect Yourself Against Cyber Trespass Act or SPY ACT Computer users have to be informed before spyware is installed Clear explanation of what spyware does Sitting in a the Senate pending approval

Questions?