Spywareguide1
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
849
On Slideshare
849
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Getting spyware It’s influence Ways of treatment spywareguide.net
  • 2. Introduction What is spyware in general Ways of infecting the PC Spyware abilities How to recognize spyware Ways of protection spywareguide.net
  • 3. What is spyware in general Spyware is a kind of malicious software which is installed into the computer without user’s knowledge or permission. Usually spyware becomes downloaded along with a certain program, which contains malware code in its body Once being installed onto the PC, spyware starts working immediately spywareguide.net
  • 4. Statistics Users who have spyware As a rule, users usually don’t 100 even suspect they have 98 spyware in their system. 96 According to statistics, out of 94 100% users 92% don’t know they have spyware and 91% 92 didn’t give any permission on 90 its installation. 88 8% remaining have installed 86 spyware intentionally to control the machine’s activity spywareguide.net
  • 5. Spyware installation Often spyware function is mentioned in the license agreement, but users generally click “Agree” without reading it. So spyware comes onto the HDD absolutely legally spywareguide.net
  • 6. Ways of infecting the PC By installing the spyware together with some useful program By exploitation of certain software vulnerabilities – e.g., Internet Explorer By using the fake antivirus and antimalware programs spywareguide.net
  • 7. Internet Explorer Many spyware programs make use of IE. Mainly it happens not because Internet Explorer is the most popular browser nowadays, but because it is deeply integrated with Windows and has many keys to critical system features spywareguide.net
  • 8. Fake antiviruses Today many antiviruses are available for free downloading – and some of them contain malicious code. It’s worth being careful when downloading anti- malware applications and pay attention to the recognition and acceptance of the product. spywareguide.net
  • 9. Spyware abilities  User activity monitoring (web-sites, logins and passwords, etc.)  Bank and credit card information  Collecting almost any kind of data  Change system security and personal settings  Often – slowing down the computer because of RAM and CPU usage spywareguide.net
  • 10. User activity monitoringThe main and mostwidened aim of anyspyware is collecting dataabout the user. Browsinghabits, passwords andplenty of other databecomes vulnerable. Aftercollecting and sorting outthe data is used fordifferent illegal purposesincluding ID theft andcarding. spywareguide.net
  • 11. System resources wasting As a rule, spyware has access practically to any system setting. It changes the priority of processes in order to intercept data, and that makes the computer slower – as far as all resources are primarily maintaining the spyware and only secondarily – all other tasks. All these make the machine slow. spywareguide.net
  • 12. Spyware recognition PC performance is reduced Browser settings are changed, the homepage is different from the normal one Internet traffic increases, especially outgoing traffic Computer turns to HDD without any reason – it can be easily seen on the system block Antivirus programs warnings spywareguide.net
  • 13. Browser warningsRemember that browsercannot change usersettings on its own. Onceyou detect any changes inthe homepage, newtoolbars or anything likethat – it might be a badsignal. Also do rememberthat spontaneous webpageredirection can also be awarning sign to check yourPC for spyware spywareguide.net
  • 14. Unusual HDD activityA sure sign of spywarepresence is launching theHDD when the machine isidle. It happens due tocertain features of thespyware, as it may collectinfo independently. So whenthe machine is idle and theHDD suddenly startsworking (it’s a specific soundthat all of us know), it couldbe the sign of spywarepresence spywareguide.net
  • 15. Ways of protection Use appropriate anti-spyware applications Don’t download anything from suspicious websites Remember to update you IE, even if you don’t use it Use firewalls and web proxies spywareguide.net
  • 16. IE regular update Even if you don’t use Internet Explorer as your chief browser, don’t forget to update it regularly. It is very vulnerable even being disabled. Do remember to use a reliable browser like Opera, Firefox, Google Chrome etc. In general – always keep your system updated. spywareguide.net
  • 17. Use anti-spyware programs The most powerful and secure tool to keep PC safe from spyware is buying a good anti-spyware program like PCKeeper or Malwarebytes. It’s highly advisable to keep them updated. Choose the respectable ones because some anti-spyware applications are spyware on their own. spywareguide.net
  • 18. Learn more at spywareguide.net spywareguide.net