SlideShare a Scribd company logo
1 of 21
PEEYUSH     SHARMA
  3rd NOVEMBER,2011
   Spyware programs have a tendency to hide as
    cookie or temporary internet files

   Broad Definition
     -Software that is installed on my PC without
    my full understanding and permission
   Narrow Definition
      -Software that specifically tracks my personal
    information without my full understanding
    and permission
SPYWARE         ENTRY
   Advertising companies uses
    spyware to “mine data” to
    further help them advertise
    better.
   Uses your Internet
    connection and reports
    statistical data about you and
    your surfing habits a 3rd
    party
   Violating your privacy.
   And is a completely LEGAL
    program!
   Spyware              Virus
   Program                File
   Commercial             Academic
   Revenue                Fame
   Dynamic but
                           Replication
    stationary
                           Destructive
   Consume Resources
   Sometimes Wanted       Never Desired VS
   1 in 5 got attacked electronically
     -Down from 35% in 2005
   Virus and Worm infection most common attack
   More public sector attack reports than private sector
   Of those reporting trojan/rootkitattack 60% were
    public sector and 40% were private sector
   61%of all PCs scanned had Spyware (down from 80%
    in 2004 study)
   96%of PC users are aware of Spyware
   The average PC has 93 Spyware componentson it.
   54%of infected users were unaware of the Spyware
    found on their machines (down from 89% in 2004
    study)
   95%of infected users did not give permission for the
    software identified to be installed on their machines
   20%of calls to Dell’s helpdesk are Spyware related
    (source: Dell)
   Microsoft estimates that 50%of all PC crashes are a
    result of Spyware (Source:InformationWeek April 26,
    2004)
   Adware is created by real businesses
      -They have business plans, sophisticated
    development groups, and venture capital
      -They generate revenue
   Spyware is created by real businesses (and
    sometimes.. organized crime)
    -They have business plans, and sophisticated
    development groups
     -They generate revenue
   Competition! They all want your desktop.
    Personal Identifiable Information collection
     -Identity theft = revenue
    Personal Information collection
     -Surfing habits = revenue
    Click-through revenue
    Software Sales revenue
    SPAM propagation
    -Sales Revenue

    The bottom line is the bottom line $$$.
   Adware
   BHO
   Keylogger
   Hijacker
    -Browser
    -Homepage
    -Errors
    -Typo-Squatting
   Rogue Anti-Spyware
   Dialer
   Tracking Cookie
   Ransomware
   Social Engineering
     -Free giveaways of bundled apps
     -Deceptive installations
   Drive-by-Download
     -WMF exploit
     -CreateTextRangeexploit
     -Hostile ActiveX or Javascript
   Trojan Install
   Search Engine Results/ Sponsored Ads
   Continuous popups
   Persistent change in your homepage.
   Slower computer processing, takes the computer
    longer to process or startup.
   Internet browser does
    not start up.
   Parts of your computer
    you cannot access
    without freezing.
   Major core data is lost
    or changed.
   Polymorphism
   No-uninstall
   Active Defense with Reinstallation
   Rootkit
   Brand Obscurity
   Security Product Disabling
   Cool WebSearch
   Spy Sherriff via WMF Exploit
   Create TextRange Exploit Code
   Crypt. Aand Ransom.A
   Social Engineering
   TypoSquatting
   Preventing spyware from getting onto
    your computer is your first step!
      Do not download unnecessary software from the
       internet, especially free ones because they most likely have
       spyware inside them.
         If a download screen appears, asking you to confirm your
          download, click no if you not trying to install anything.
         Avoid clicking advertised popups especially ones that
          mention “free” stuff if possible.
   Technical Recommendations
       Some adware/spyware files like to hide in the temporary internet folders.
       Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary Internet
        Files Settings, Check Never under “Check for Newer Version of Stored Pages”.
       Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet Options, Delete
        Cookies and Delete Temporary Files.
       Remember though, adware and spyware can be tricky, no matter how cautious
        you are, there are bound to be adware or spyware programs that install into your
        computer.
         Always constantly scan your computer for adware and spyware and keep your
          Adware/Spyware killer programs fully updated at all times.
   Recommended Spyware/ Adware Killers without any restraints
       The “Tri-Killer” combination:
         Ad-aware 6.0 Professional Edition: Primary scanner
         Spy-sweeper paid version: Primary scanner and use their immune guards.
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
   Recommended Spyware/ Adware Killers with a price restraints
         Ad-aware 6.0 Free Edition: Primary Scanner
         Spy-Sweeper paid version: Primary Scanner
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
   Recommended Spyware/ Adware Killers with a time restraints
    (not recommended)
         Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
         Spybot Free Edition:
         Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
           restraints, turn on the scanners, leave them running and go do something.
Spyware
Spyware

More Related Content

What's hot (20)

What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
What is malware
What is malwareWhat is malware
What is malware
 
Spyware
SpywareSpyware
Spyware
 
Ransomware
RansomwareRansomware
Ransomware
 
spyware
spywarespyware
spyware
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Ransomware
RansomwareRansomware
Ransomware
 
Phishing
PhishingPhishing
Phishing
 
MALWARE
MALWAREMALWARE
MALWARE
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Malware
MalwareMalware
Malware
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
 

Viewers also liked

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alamsahibe alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)WCN Transmedia Group
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Brent Csutoras
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 

Viewers also liked (20)

Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Freenet
FreenetFreenet
Freenet
 
Smart memories
Smart memoriesSmart memories
Smart memories
 

Similar to Spyware

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 

Similar to Spyware (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Malware
MalwareMalware
Malware
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Spyware

  • 1. PEEYUSH SHARMA 3rd NOVEMBER,2011
  • 2.
  • 3. Spyware programs have a tendency to hide as cookie or temporary internet files  Broad Definition -Software that is installed on my PC without my full understanding and permission  Narrow Definition -Software that specifically tracks my personal information without my full understanding and permission
  • 4. SPYWARE ENTRY  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party  Violating your privacy.  And is a completely LEGAL program!
  • 5.
  • 6. Spyware  Virus  Program  File  Commercial  Academic  Revenue  Fame  Dynamic but  Replication stationary  Destructive  Consume Resources  Sometimes Wanted  Never Desired VS
  • 7. 1 in 5 got attacked electronically -Down from 35% in 2005  Virus and Worm infection most common attack  More public sector attack reports than private sector  Of those reporting trojan/rootkitattack 60% were public sector and 40% were private sector
  • 8. 61%of all PCs scanned had Spyware (down from 80% in 2004 study)  96%of PC users are aware of Spyware  The average PC has 93 Spyware componentson it.  54%of infected users were unaware of the Spyware found on their machines (down from 89% in 2004 study)  95%of infected users did not give permission for the software identified to be installed on their machines  20%of calls to Dell’s helpdesk are Spyware related (source: Dell)  Microsoft estimates that 50%of all PC crashes are a result of Spyware (Source:InformationWeek April 26, 2004)
  • 9. Adware is created by real businesses -They have business plans, sophisticated development groups, and venture capital -They generate revenue  Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and sophisticated development groups -They generate revenue  Competition! They all want your desktop.
  • 10. Personal Identifiable Information collection -Identity theft = revenue  Personal Information collection -Surfing habits = revenue  Click-through revenue  Software Sales revenue  SPAM propagation -Sales Revenue The bottom line is the bottom line $$$.
  • 11. Adware  BHO  Keylogger  Hijacker -Browser -Homepage -Errors -Typo-Squatting  Rogue Anti-Spyware  Dialer  Tracking Cookie  Ransomware
  • 12. Social Engineering -Free giveaways of bundled apps -Deceptive installations  Drive-by-Download -WMF exploit -CreateTextRangeexploit -Hostile ActiveX or Javascript  Trojan Install  Search Engine Results/ Sponsored Ads
  • 13. Continuous popups  Persistent change in your homepage.  Slower computer processing, takes the computer longer to process or startup.
  • 14. Internet browser does not start up.  Parts of your computer you cannot access without freezing.  Major core data is lost or changed.
  • 15. Polymorphism  No-uninstall  Active Defense with Reinstallation  Rootkit  Brand Obscurity  Security Product Disabling
  • 16. Cool WebSearch  Spy Sherriff via WMF Exploit  Create TextRange Exploit Code  Crypt. Aand Ransom.A  Social Engineering  TypoSquatting
  • 17. Preventing spyware from getting onto your computer is your first step!  Do not download unnecessary software from the internet, especially free ones because they most likely have spyware inside them.  If a download screen appears, asking you to confirm your download, click no if you not trying to install anything.  Avoid clicking advertised popups especially ones that mention “free” stuff if possible.
  • 18. Technical Recommendations  Some adware/spyware files like to hide in the temporary internet folders.  Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”.  Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files.  Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer.  Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times.
  • 19. Recommended Spyware/ Adware Killers without any restraints  The “Tri-Killer” combination:  Ad-aware 6.0 Professional Edition: Primary scanner  Spy-sweeper paid version: Primary scanner and use their immune guards.  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.  Recommended Spyware/ Adware Killers with a price restraints  Ad-aware 6.0 Free Edition: Primary Scanner  Spy-Sweeper paid version: Primary Scanner  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed  Recommended Spyware/ Adware Killers with a time restraints (not recommended)  Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode  Spybot Free Edition:  Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something.