Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Getting spyware It’s influence Ways of treatment spywareguide.net
  2. 2. Introduction What is spyware in general Ways of infecting the PC Spyware abilities How to recognize spyware Ways of protection spywareguide.net
  3. 3. What is spyware in general Spyware is a kind of malicious software which is installed into the computer without user’s knowledge or permission. Usually spyware becomes downloaded along with a certain program, which contains malware code in its body Once being installed onto the PC, spyware starts working immediately spywareguide.net
  4. 4. Statistics Users who have spyware As a rule, users usually don’t 100 even suspect they have 98 spyware in their system. 96 According to statistics, out of 94 100% users 92% don’t know they have spyware and 91% 92 didn’t give any permission on 90 its installation. 88 8% remaining have installed 86 spyware intentionally to control the machine’s activity spywareguide.net
  5. 5. Spyware installation Often spyware function is mentioned in the license agreement, but users generally click “Agree” without reading it. So spyware comes onto the HDD absolutely legally spywareguide.net
  6. 6. Ways of infecting the PC By installing the spyware together with some useful program By exploitation of certain software vulnerabilities – e.g., Internet Explorer By using the fake antivirus and antimalware programs spywareguide.net
  7. 7. Internet Explorer Many spyware programs make use of IE. Mainly it happens not because Internet Explorer is the most popular browser nowadays, but because it is deeply integrated with Windows and has many keys to critical system features spywareguide.net
  8. 8. Fake antiviruses Today many antiviruses are available for free downloading – and some of them contain malicious code. It’s worth being careful when downloading anti- malware applications and pay attention to the recognition and acceptance of the product. spywareguide.net
  9. 9. Spyware abilities  User activity monitoring (web-sites, logins and passwords, etc.)  Bank and credit card information  Collecting almost any kind of data  Change system security and personal settings  Often – slowing down the computer because of RAM and CPU usage spywareguide.net
  10. 10. User activity monitoringThe main and mostwidened aim of anyspyware is collecting dataabout the user. Browsinghabits, passwords andplenty of other databecomes vulnerable. Aftercollecting and sorting outthe data is used fordifferent illegal purposesincluding ID theft andcarding. spywareguide.net
  11. 11. System resources wasting As a rule, spyware has access practically to any system setting. It changes the priority of processes in order to intercept data, and that makes the computer slower – as far as all resources are primarily maintaining the spyware and only secondarily – all other tasks. All these make the machine slow. spywareguide.net
  12. 12. Spyware recognition PC performance is reduced Browser settings are changed, the homepage is different from the normal one Internet traffic increases, especially outgoing traffic Computer turns to HDD without any reason – it can be easily seen on the system block Antivirus programs warnings spywareguide.net
  13. 13. Browser warningsRemember that browsercannot change usersettings on its own. Onceyou detect any changes inthe homepage, newtoolbars or anything likethat – it might be a badsignal. Also do rememberthat spontaneous webpageredirection can also be awarning sign to check yourPC for spyware spywareguide.net
  14. 14. Unusual HDD activityA sure sign of spywarepresence is launching theHDD when the machine isidle. It happens due tocertain features of thespyware, as it may collectinfo independently. So whenthe machine is idle and theHDD suddenly startsworking (it’s a specific soundthat all of us know), it couldbe the sign of spywarepresence spywareguide.net
  15. 15. Ways of protection Use appropriate anti-spyware applications Don’t download anything from suspicious websites Remember to update you IE, even if you don’t use it Use firewalls and web proxies spywareguide.net
  16. 16. IE regular update Even if you don’t use Internet Explorer as your chief browser, don’t forget to update it regularly. It is very vulnerable even being disabled. Do remember to use a reliable browser like Opera, Firefox, Google Chrome etc. In general – always keep your system updated. spywareguide.net
  17. 17. Use anti-spyware programs The most powerful and secure tool to keep PC safe from spyware is buying a good anti-spyware program like PCKeeper or Malwarebytes. It’s highly advisable to keep them updated. Choose the respectable ones because some anti-spyware applications are spyware on their own. spywareguide.net
  18. 18. Learn more at spywareguide.net spywareguide.net