SlideShare a Scribd company logo
1 of 12
MALWARE PROGRAM
SPYWARE, WORM, ADWARE, TROJAN
PRESENTED BY
MOHSIN ALI DAHAR
SPYWARE
• Spyware is any technology that aids in gathering information about a person
or organization without their knowledge. On the Internet (where it is
sometimes called a spybot or tracking software), spyware is programming
that is put in someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
EXAMPLE
• 1.) CoolWebSearch. This is a group of programs that has the ability to exploit the weaknesses of
Internet Explorer. This spyware can manipulate direct traffic to advertisements on coolwebsearch.com.
Also, it has the ability to display pop-up ads,
• 2.) Internet Optimizer (also known as DyFuCa). Ever see an error page by internet explorer? Well this
spyware takes you to advertisements instead of the error page. For example, when a user follows a
broken link or enters a wrong URL, they are directed to a page of advertisements that are strategically
placed. However, one weakness of this spyware, is that it can¡¯t access password-protected sites
because of HTTP Basic authentication
• 3.) Zango (formerly 180 Solutions). This spyware transmits detailed information to advertisers about the
Web sites which you visit. Also, it has the ability to alter HTTP request for affiliates linked from a web
site, so the advertisers can make unearned profits.
• 4.) HuntBar (also know as WinTools). Used by ActiveX, which is downloaded at affiliate websites, or by
advertisements displayed by other spyware programs. This is a prime example of how spyware can
install more syware. These spyware can add toolbars to internet explorer, track your browsing behavior,
and redirect you to affiliate references, which display even more advertisements.
5.) Zlob Trojan. This spyware downloads itself to your computer via ActiveX code and reports your
information back to control server. Some of this information that is stolen from you can be your search
history, keystrokes, and the Zlob Trojan can hijack routers set to defaults.
LATEST RELEASE
• WikiLeaks has released a new set of documents in the CIA Vault 7 leak, detailing a CIA spyware project
called ‘Athena/Hera’.
• The Athena malware targets computers running Windows XP to Windows 10, while the Hera variant
was created for Windows 8 to Windows 10.
• Protection for Spyware
• Here are five simple, but critical steps to protect your computer,
• Install Firewall
• Install Antivirus Software
• Install Anti-Spyware Software
• Use Complex and Secure Passwords
• Check on the Security Settings of the Browser
WORM
• A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers.
Worms often use parts of an operating system that are automatic and invisible to the user. It is common
for worms to be noticed only when their uncontrolled replication consumes system resources, slowing
or halting other tasks.
EXAMPLE
1. Morris Worm (also known as the Great Worm)
• How big is the Internet, you ask? In 1988, Cornell University student named Robert Tappan Morris launched
• 99 lines of codein his quest for the answer.
2. Nimda
• In the fall of 2001, Nimda ("admin" spelled backwards) infected a variety of Microsoft machines very rapidly th
rough an emailexploit. Nimda spread by finding email addresses in .html files located in the user's web cache f
older and by looking at theuser's email contacts as retrieved by the MAPI service.
3. Code Red
• Friday the 13th was a bad day in July of 2001; it was the day Code Red was released. The worm took advantag
e of a bufferoverflow vulnerability in Microsoft IIS servers and would self-
replicate by exploiting the same vulnerability in other Microsoft IISmachines.
4. MSBlast
• The summer of 2003 wasn't much easier for those building anti-
virus definitions or those at businesses or academicinstitutions
5. Storm Worm
• One of the newest worms to hit the Internet was the Storm Worm, which debuted in January of 2007. Its nam
e came from awidely circulated email about the Kyrill weather storm in Europe, and its subject was "230 dead
as storm batters Europe." Thevirus first hit on January 19th, and three days later, the virus accounted for 8% of
all infected machines.
LATEST RELEASE WORM
• A highly virulent new strain of self-replicating ransomware shut down computers all over the world, in
part by appropriating a National Security Agency exploit that was publicly released last month by the
mysterious group calling itself Shadow Brokers.
• The malware, known as Wanna, Wannacry, or Wcry, has infected at least 75,000 computers,
ADWARE
• Adware is any software application in which advertising banners are displayed while a program is
running. The ads are delivered through pop-up windows or bars that appear on the program's user
interface. Adware is commonly created for computers, but may also be found on mobile devices.
• Example
• A perfect eDeskAd is considered to be malicious software, a destructive adware program that has
infected several homes users and many more businesses. It is packaged as ad-supported software that
provides targeted advertisements. It starts off in subtle fashion, functioning in stealth mode to avoid
detection. Over time, it begins to seize control, making alterations to your web browser with additional
buttons, toolbars and links.
PROTECTION
• # 1 - Keep your Windows security up to date: Though widely used, Microsoft Windows is one of the
most vulnerable systems on the market. It does provide you with a few tools that should always be
used. Be sure to keep your system current with weekly updates. This can be done directly from the
Microsoft website where configurations can be made to receive automatic updates.
• # 2 - Install a Firewall: Firewall applications are an essential part of any security system these days. It
will keep hackers out of your system while tracking outbound communications, a feature that will help
to determine if you've been infected with adware.
• # 3 - Install a reliable spyware program: A program such as DeskAd is so complex that it may go
undetected by anti-virus software. Because of this, your computer should be protected by an anti-
spyware scanner. This type of program is built with the technology specifically designed to detect and
remove these stubborn infections
LATEST RELAESE
YeaDesktop
Adware.YeaDesktop is an adware program that modifies browser settings and displays out of context pop-up
advertisements on the computer. It also redirects browsing activity to show advertisements.
TORJAN
• A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can
be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically
tricked by some form of social engineering into loading and executing Trojans on their systems. Once
activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor
access to your system. These actions can include:
• Deleting data
• Blocking data
• Modifying data
• Copying data
• Disrupting the performance of computers or computer networks
Example
• Trojan-Spy programs can spy on how you’re using your computer –
• for example, by tracking the data you enter via your keyboard, taking
• screen shots or getting a list of running applications.
LATEST TROJAN
• Shedun Android malware – 2015 (discovered)
• We've seen Android malware that takes your photos and videos for ransom, and there's one that can mimic your
phone's shutdown process and spy on you even though the phone appears to be off.
Protection
Protecting against Trojan Attacks
– Get an anti-virus scanner of the highest quality and, keep it up to date.
– Install a firewall to prevent hackers from entering the user system.
– Educate users to avoid opening e-mail files, sites, attachments etc.
– In Windows, do not open questionable file extensions such as “exe”, “vbs”, “com”, “bat” and, ensure you can view all
file extensions. Windows hides long extensions so the file maybe “xyz.vbs.jpg and, you see only exyz.jpg
– Install an executable server at mail server level as well as a virus scanner on the network.
Malware program by mohsin ali dahar khairpur

More Related Content

What's hot

Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malware
MalwareMalware
Malware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
What is malware
What is malwareWhat is malware
What is malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Computer security
Computer securityComputer security
Computer security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Adware
AdwareAdware
Adware
 
information about virus
information about virusinformation about virus
information about virus
 

Similar to Malware program by mohsin ali dahar khairpur

Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 

Similar to Malware program by mohsin ali dahar khairpur (20)

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Computer virus
Computer virusComputer virus
Computer virus
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Spyware
SpywareSpyware
Spyware
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Mitppt
MitpptMitppt
Mitppt
 

Recently uploaded

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Recently uploaded (20)

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 

Malware program by mohsin ali dahar khairpur

  • 1. MALWARE PROGRAM SPYWARE, WORM, ADWARE, TROJAN PRESENTED BY MOHSIN ALI DAHAR
  • 2. SPYWARE • Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 3. EXAMPLE • 1.) CoolWebSearch. This is a group of programs that has the ability to exploit the weaknesses of Internet Explorer. This spyware can manipulate direct traffic to advertisements on coolwebsearch.com. Also, it has the ability to display pop-up ads, • 2.) Internet Optimizer (also known as DyFuCa). Ever see an error page by internet explorer? Well this spyware takes you to advertisements instead of the error page. For example, when a user follows a broken link or enters a wrong URL, they are directed to a page of advertisements that are strategically placed. However, one weakness of this spyware, is that it can¡¯t access password-protected sites because of HTTP Basic authentication • 3.) Zango (formerly 180 Solutions). This spyware transmits detailed information to advertisers about the Web sites which you visit. Also, it has the ability to alter HTTP request for affiliates linked from a web site, so the advertisers can make unearned profits. • 4.) HuntBar (also know as WinTools). Used by ActiveX, which is downloaded at affiliate websites, or by advertisements displayed by other spyware programs. This is a prime example of how spyware can install more syware. These spyware can add toolbars to internet explorer, track your browsing behavior, and redirect you to affiliate references, which display even more advertisements. 5.) Zlob Trojan. This spyware downloads itself to your computer via ActiveX code and reports your information back to control server. Some of this information that is stolen from you can be your search history, keystrokes, and the Zlob Trojan can hijack routers set to defaults.
  • 4. LATEST RELEASE • WikiLeaks has released a new set of documents in the CIA Vault 7 leak, detailing a CIA spyware project called ‘Athena/Hera’. • The Athena malware targets computers running Windows XP to Windows 10, while the Hera variant was created for Windows 8 to Windows 10. • Protection for Spyware • Here are five simple, but critical steps to protect your computer, • Install Firewall • Install Antivirus Software • Install Anti-Spyware Software • Use Complex and Secure Passwords • Check on the Security Settings of the Browser
  • 5. WORM • A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers. Worms often use parts of an operating system that are automatic and invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.
  • 6. EXAMPLE 1. Morris Worm (also known as the Great Worm) • How big is the Internet, you ask? In 1988, Cornell University student named Robert Tappan Morris launched • 99 lines of codein his quest for the answer. 2. Nimda • In the fall of 2001, Nimda ("admin" spelled backwards) infected a variety of Microsoft machines very rapidly th rough an emailexploit. Nimda spread by finding email addresses in .html files located in the user's web cache f older and by looking at theuser's email contacts as retrieved by the MAPI service. 3. Code Red • Friday the 13th was a bad day in July of 2001; it was the day Code Red was released. The worm took advantag e of a bufferoverflow vulnerability in Microsoft IIS servers and would self- replicate by exploiting the same vulnerability in other Microsoft IISmachines. 4. MSBlast • The summer of 2003 wasn't much easier for those building anti- virus definitions or those at businesses or academicinstitutions 5. Storm Worm • One of the newest worms to hit the Internet was the Storm Worm, which debuted in January of 2007. Its nam e came from awidely circulated email about the Kyrill weather storm in Europe, and its subject was "230 dead as storm batters Europe." Thevirus first hit on January 19th, and three days later, the virus accounted for 8% of all infected machines.
  • 7. LATEST RELEASE WORM • A highly virulent new strain of self-replicating ransomware shut down computers all over the world, in part by appropriating a National Security Agency exploit that was publicly released last month by the mysterious group calling itself Shadow Brokers. • The malware, known as Wanna, Wannacry, or Wcry, has infected at least 75,000 computers,
  • 8. ADWARE • Adware is any software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly created for computers, but may also be found on mobile devices. • Example • A perfect eDeskAd is considered to be malicious software, a destructive adware program that has infected several homes users and many more businesses. It is packaged as ad-supported software that provides targeted advertisements. It starts off in subtle fashion, functioning in stealth mode to avoid detection. Over time, it begins to seize control, making alterations to your web browser with additional buttons, toolbars and links.
  • 9. PROTECTION • # 1 - Keep your Windows security up to date: Though widely used, Microsoft Windows is one of the most vulnerable systems on the market. It does provide you with a few tools that should always be used. Be sure to keep your system current with weekly updates. This can be done directly from the Microsoft website where configurations can be made to receive automatic updates. • # 2 - Install a Firewall: Firewall applications are an essential part of any security system these days. It will keep hackers out of your system while tracking outbound communications, a feature that will help to determine if you've been infected with adware. • # 3 - Install a reliable spyware program: A program such as DeskAd is so complex that it may go undetected by anti-virus software. Because of this, your computer should be protected by an anti- spyware scanner. This type of program is built with the technology specifically designed to detect and remove these stubborn infections LATEST RELAESE YeaDesktop Adware.YeaDesktop is an adware program that modifies browser settings and displays out of context pop-up advertisements on the computer. It also redirects browsing activity to show advertisements.
  • 10. TORJAN • A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: • Deleting data • Blocking data • Modifying data • Copying data • Disrupting the performance of computers or computer networks Example • Trojan-Spy programs can spy on how you’re using your computer – • for example, by tracking the data you enter via your keyboard, taking • screen shots or getting a list of running applications.
  • 11. LATEST TROJAN • Shedun Android malware – 2015 (discovered) • We've seen Android malware that takes your photos and videos for ransom, and there's one that can mimic your phone's shutdown process and spy on you even though the phone appears to be off. Protection Protecting against Trojan Attacks – Get an anti-virus scanner of the highest quality and, keep it up to date. – Install a firewall to prevent hackers from entering the user system. – Educate users to avoid opening e-mail files, sites, attachments etc. – In Windows, do not open questionable file extensions such as “exe”, “vbs”, “com”, “bat” and, ensure you can view all file extensions. Windows hides long extensions so the file maybe “xyz.vbs.jpg and, you see only exyz.jpg – Install an executable server at mail server level as well as a virus scanner on the network.