Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007
SPYWARE Is software that collects your personal information about your user habits without your consent. Is software that collects your personal information about your user habits without your consent.
Techniques Logging Keystrokes Logging Keystrokes Recording Internet Web Browsing History Recording Internet Web Browsing History Scanning Documents on the Computer’s Hard Disk Scanning Documents on the Computer’s Hard Disk
Purpose Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources Purposes range from overtly criminal ( the theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources
Adware Is any software application in which advertising banners are displayed while the programming is running Is any software application in which advertising banners are displayed while the programming is running The ads can be viewed through pop-up windows or through a bar that appears on a computer screen The ads can be viewed through pop-up windows or through a bar that appears on a computer screen
Malware Is a type of programming intended to cause harm Is a type of programming intended to cause harm Malware is designed to send itself from your account to all the friends and colleagues in your address book Malware is designed to send itself from your account to all the friends and colleagues in your address book
Infection Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence Results of malware infection include wasted resources, compromised systems, lack of regulatory compliance, lost or stolen data, and the loss if user and client confidence
Common Types of Malware Viruses Viruses Worms Worms Trojans Trojans Spyware Spyware Browser Hijackers Browser Hijackers
Prevention Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Programs have been developed in order to detect, quarantine, and remove ad- ware as well as spy-ware Keep up-to-date security patches and operating system updates from Windows Update Keep up-to-date security patches and operating system updates from Windows Update
Prevention Use an alternative web browser Use an alternative web browser Install ad-blocking software Install ad-blocking software