SlideShare a Scribd company logo
1 of 29
Spyware & Internet
Security
Different Types of Spyware
 Spyware
 Adware
 Embedded Programs
 Trojan Horse
 Browser Hijackers
 Dialers
 Malware
Why do people make Spyware?

 Profit
 A challenge
 Malice
 Boredom
 Business
How do I know if I’ve got Spyware?

 Computer is running slower than normal
 Popups (on or off the internet)
 New toolbars
 Home page changes
 Search results look different
 Error messages when accessing the web
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
How do I get rid of Spyware?
Use a legitimate spyware removal program
We suggest Spybot Search and Destroy in
 combination with Microsoft Antispyware
 (now called Defender)

Ad-aware is a good program and is free for
 home use but is no longer free for
 educational use.
Steps in Spyware Removal
1.   Add and Remove Programs Menu
2.   Reboot
3.   Run a Spybot Scan
4.   Reboot
5.   Run a Microsoft Antispyware Scan
6.   Reboot
7.   If still having problems manually remove
     registry and startup entries (Do NOT do
     this yourself)
How do I prevent Spyware?
 Be conscious of what you are clicking
  on/downloading
 Some pop-ups have what appears to be a
  close button, but will actually try to install
  spyware when you click on it. Always look
  for the topmost right red X.
 Remember that things on the internet are
  rarely free. “Free” Screensavers etc.
  generally contain ads or worse that pay
  the programmer for their time.
The Least Wanted List
Weatherbug (GAIN or Claria)   Begin2Search
Hotbar                        180Solutions
180 Search Assistant          Zango
MyWebSearch                   CoolWebSearch
Popular Screensavers          DyFuCA
Comet Cursors                 BonzaiBuddy
A Better Internet (Aurora)    BargainBuddy
Kazaa / Morpheus              Dashbar
GameSpy Arcade                Gator
WhenUSave                     WeatherScope
New.Net                       Best Offers Network
Starware Toolbar              Precision Time
MySearch                      FunWeb
Phishing
 Most commonly an Email stating your
  account Information needs updating
 Watch for URL’s that are numeric or
  different from the link you clicked on
 Best thing to do is to type in the URL and
  check your account directly without
  following any links in the Email
 Many legitimate emails no longer contain
  a link (Paypal)
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
How secure do you need to be?
 Be Prudent not Paranoid
 Did you initiate the action?
 Why is this free?
 Is the source trustworthy?
 When in doubt Google it
Safer Alternatives
 Download.com – All programs are
  adware/spyware free
 Freesaver.com – Screensavers from this
  site are safe DO NOT click on ads
 KFOR or News9
 Cleansoftware.org
The Bottom Line
   It is safe to install these programs:
     Microsoft AntiSpyware(Defender)
     Spybot Search & Destroy
     SpywareBlaster
     SpywareGuard
   If you are running a different Spyware
    program contact your Technology
    Specialist to make sure it is not a rogue

More Related Content

What's hot

How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me森泉 小
 
Foundations of Security
Foundations of SecurityFoundations of Security
Foundations of SecurityJoe Robb
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers JobArbin Godar
 
Identity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesIdentity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesJonathan LeBlanc
 
XSS (Cross Site Scripting)
XSS (Cross Site Scripting)XSS (Cross Site Scripting)
XSS (Cross Site Scripting)Shubham Gupta
 
Sammy Virus
Sammy VirusSammy Virus
Sammy Viruscoolkyle
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeierauexpo Conference
 
Digital safety
Digital safetyDigital safety
Digital safetypsusmith
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect viruscoseanonans
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Securitybos45
 
How to remove 7 ev3n ransomware
How to remove 7 ev3n ransomwareHow to remove 7 ev3n ransomware
How to remove 7 ev3n ransomwareharoNaroum
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programsDan Vasile
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricksSudhanshu Mishra
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebDonald McArthur
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsingjgswift
 

What's hot (20)

How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
Foundations of Security
Foundations of SecurityFoundations of Security
Foundations of Security
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Bug Bounty 101
Bug Bounty 101Bug Bounty 101
Bug Bounty 101
 
Identity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesIdentity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & Wearables
 
XSS (Cross Site Scripting)
XSS (Cross Site Scripting)XSS (Cross Site Scripting)
XSS (Cross Site Scripting)
 
Sammy Virus
Sammy VirusSammy Virus
Sammy Virus
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
 
E-safety
E-safetyE-safety
E-safety
 
Digital safety
Digital safetyDigital safety
Digital safety
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Bug bounty hunting
Bug bounty huntingBug bounty hunting
Bug bounty hunting
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Security
 
How to remove 7 ev3n ransomware
How to remove 7 ev3n ransomwareHow to remove 7 ev3n ransomware
How to remove 7 ev3n ransomware
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programs
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The Web
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 

Similar to Topic 12 internet security

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Antivirus spyware malware free
Antivirus spyware malware freeAntivirus spyware malware free
Antivirus spyware malware freeJason Quinlan
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-InteractiveGronHatchat
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of ComputersGronHatchat
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop upharoNaroum
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 

Similar to Topic 12 internet security (20)

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Spyware
SpywareSpyware
Spyware
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Mischievous Malware
Mischievous MalwareMischievous Malware
Mischievous Malware
 
Antivirus spyware malware free
Antivirus spyware malware freeAntivirus spyware malware free
Antivirus spyware malware free
 
Spyware
SpywareSpyware
Spyware
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop up
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 

Topic 12 internet security

  • 2. Different Types of Spyware  Spyware  Adware  Embedded Programs  Trojan Horse  Browser Hijackers  Dialers  Malware
  • 3. Why do people make Spyware?  Profit  A challenge  Malice  Boredom  Business
  • 4. How do I know if I’ve got Spyware?  Computer is running slower than normal  Popups (on or off the internet)  New toolbars  Home page changes  Search results look different  Error messages when accessing the web
  • 5. What does Spyware look like?
  • 6. What does Spyware look like?
  • 7. What does Spyware look like?
  • 8. What does Spyware look like?
  • 9. What does Spyware look like?
  • 10. What does Spyware look like?
  • 11. What does Spyware look like?
  • 12. What does Spyware look like?
  • 13. What does Spyware look like?
  • 14. What does Spyware look like?
  • 15. What does Spyware look like?
  • 16. How do I get rid of Spyware? Use a legitimate spyware removal program We suggest Spybot Search and Destroy in combination with Microsoft Antispyware (now called Defender) Ad-aware is a good program and is free for home use but is no longer free for educational use.
  • 17. Steps in Spyware Removal 1. Add and Remove Programs Menu 2. Reboot 3. Run a Spybot Scan 4. Reboot 5. Run a Microsoft Antispyware Scan 6. Reboot 7. If still having problems manually remove registry and startup entries (Do NOT do this yourself)
  • 18. How do I prevent Spyware?  Be conscious of what you are clicking on/downloading  Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X.  Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.
  • 19. The Least Wanted List Weatherbug (GAIN or Claria) Begin2Search Hotbar 180Solutions 180 Search Assistant Zango MyWebSearch CoolWebSearch Popular Screensavers DyFuCA Comet Cursors BonzaiBuddy A Better Internet (Aurora) BargainBuddy Kazaa / Morpheus Dashbar GameSpy Arcade Gator WhenUSave WeatherScope New.Net Best Offers Network Starware Toolbar Precision Time MySearch FunWeb
  • 20. Phishing  Most commonly an Email stating your account Information needs updating  Watch for URL’s that are numeric or different from the link you clicked on  Best thing to do is to type in the URL and check your account directly without following any links in the Email  Many legitimate emails no longer contain a link (Paypal)
  • 27. How secure do you need to be?  Be Prudent not Paranoid  Did you initiate the action?  Why is this free?  Is the source trustworthy?  When in doubt Google it
  • 28. Safer Alternatives  Download.com – All programs are adware/spyware free  Freesaver.com – Screensavers from this site are safe DO NOT click on ads  KFOR or News9  Cleansoftware.org
  • 29. The Bottom Line  It is safe to install these programs:  Microsoft AntiSpyware(Defender)  Spybot Search & Destroy  SpywareBlaster  SpywareGuard  If you are running a different Spyware program contact your Technology Specialist to make sure it is not a rogue