1 Spyware, Adware, and Browser Hijacking. ECE 41122 Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,

Slides:



Advertisements
Similar presentations
Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
What is Spyware? Where did it come from?.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
What is it and how to make your computer go fast again.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Spyware & Internet Security
Chapter Nine Maintaining a Computer Part III: Malware.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Internet safety By Lydia Snowden.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Operating System Utility Programs & Stand-alone utility Programs.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Adware and Spyware By Mr. Arbogast.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
PC Maintenance How to keep your computer healthy.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Network Security.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Spyware: Stealthy and Deadly
Presentation transcript:

1 Spyware, Adware, and Browser Hijacking

ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention, detection, and recovery Lab discussion

ECE Spyware A program that secretly monitors your actions Technology that collects information about a person or organization without their knowledge Most spyware is focused on vulnerabilities in Microsoft applications (Internet Explorer)

ECE How is Spyware spread? Viruses can place spyware in a computer Installation of new program Web browsing  Cookies are considered by some to be a form of spyware  Deceptive pop-up windows

ECE Adware Application used to display advertisements to computer users Many adware programs contain spyware to track and target users Generally spread through freeware programs funded by advertising Examples: AIM, Hotmail, WeatherBug

ECE Browser Hijacking Covers a range of malicious software used to manipulate web browser software Generally the settings of your web browser are modified  change your home page  add new sites to your favorites Prevent access to certain website Disable anti-virus and anti-spyware software

ECE Gator Ad Insertion Network (GAIN) The widest spread form of adware “free programs” install different variants of this ad serving software These advertisements provide revenue for the company called Claria Claria is just the latest name change for this extremely hated company

ECE Symptoms Computer seems to have a mind of its own  Computer is running slower  Hard drive is spinning even when system is not in use  Other changes are noticeable that users did not make Annoying advertisements  Notice when pop-ups occur (online or offline)

ECE Prevention Use secure browser and application settings  Correctly setup ActiveX components Be careful of what you download Close suspicious pop-ups and programs correctly Avoid file sharing applications Use pop-up blockers and spyware prevention applications Firewalls

ECE Detection and Removal Easiest method is with spyware scanning and removal tools  Spybot S&D  Ad-aware  HiJack This Manual removal  Editing the registry  Add/Remove programs Removal from a clean environment  Bart PE

ECE Anti-Spyware Software Scans the local storage devices for known spyware and adware definitions Allows users to quarantine and then remove any detected files Different types of anti-spyware software focus in on different areas of vulnerabilities Spybot S&D, Ad-aware, and HiJack This are some of the more popular anti-spyware software

ECE Bart PE (Preinstalled Environment) Bart’s Bootable Windows CD used for various maintenance tasks Provides a complete Win32 environment to work from  Graphical Interface  File system support  Network Support Excellent in assisting with recovery and scanning of systems

ECE Lab Outline Introduce spyware into your system Perform various scans and recovery exercises using different methods  Automated removal through anti-spyware software  Manual removal – registry editing, Bart PE Test some preventive software and techniques Future additions: Browser Hijacking

ECE Questions?