SlideShare a Scribd company logo
1 of 35
Spywares
By:Murad M. Ali
Supervised By: Dr. Lo'ai Tawalbeh
New York Institute of technology (NYIT)-Jordan’s campus 2006
Spyware
 What Is spyware ?
 Spyware Vs Trojan horse
 Spyware Vs Virus
 Computer Get Infected
 Spyware Symptoms
 Spyware Prevalence
 Class of Spyware
 Spyware Programs
 FTC
 State Law
 Preventive Techniques
What Is Spyware ?
 Applications that send information from your
computer to the creator of the spyware
 Sometimes consists of an apparent core
functionality and a hidden functionality of
information gathering (Trojan)
 Can be used by web sites for marketing
information, to determine their stance with
regard to competitors and market trends
 Can also be used to log keystrokes and send
those to whomever
What Is Spyware ?
 Software or hardware installed on a computer without
the user's knowledge which gathers information about
that user for later retrieval by whomever controls the
spyware.
 Spyware can be broken down into two different
categories:
 surveillance spyware
 advertising spyware.
What Is Spyware ?
 Surveillance software:
 Includes key loggers, screen capture devices, and Trojans.
These would be used by corporations, private detectives, law
enforcement, intelligence agencies, suspicious spouses.
 Advertising spyware:
 Software that is installed alongside other software or via active x
controls on the internet, often without the user's knowledge, or
without full disclosure that it will be used for gathering personal
information and/or showing the user ads.
 Advertising spyware logs information about the user, possibly
including passwords, email addresses, web browsing history,
online buying habits, the computer's hardware and software
configuration, the name, age, sex,etc.
What Is Spyware ?
 software that is downloaded onto a person’s computer without
their knowledge. Spyware may collect information about a
computer user’s activities and transmit that information to
someone else. It may change computer settings, or cause
“pop-up” advertisements to appear (in that context, it is called
“adware”). Spyware may redirect a Web browser to a site
different from what the user intended to visit, or change the
user’s home page. A type of spyware called “keylogging”
software records individual keystrokes, even if the author
modifies or deletes what was written, or if the characters do
not appear on the monitor. Thus, passwords, credit card
numbers, and other personally identifiable information may be
captured and relayed to unauthorized recipients.
Spyware Vs Trojan Horse
 Spyware programs are sometimes installed as Trojan
horses of one sort or another.They differ in that their
creators present themselves openly as businesses, for
instance by selling advertising space on the pop-ups
created by the malware. Most such programs present
the user with an End-User License Agreement which
purportedly protects the creator from prosecution under
computer contaminant laws. However, spyware EULAs
have not yet been upheld in court.
Spyware Vs Virus
 Spyware
 Motivation Profit
 Monitor online activities for commercial gain
 Difficult to relate symptoms with spyware infection:
Sluggish PC performance, increased pop-up ads,
unexplained home page change, mysterious search
results.
 New technology (less than 5 years)
Spyware Vs Virus
 Virus
 Intent Harmful
 Damage computer system, corrupt files and destroy
data
 Easy to relate symptoms with virus infecton: Corrupt
program files, loss of computer storage memory,
deletion of critical files.
 Old Technology
Computers Get Infected
 Basic forms of spyware can be picked up simply by visiting a Web
page.
 Spyware may also be picked up through email.
 You are particularly likely to be exposed by downloading software, in
particular "freeware" and "shareware" offerings.
 Many software downloads are "free," but within the End User
License Agreement (EULA) are provisions to use information from
your computer or your email and other contact information. You
have to agree to the EULA to download or install, so you essentially
agree to allowing someone else to use information about your
computer.
 That's why the definition of spyware is "generally without your
knowledge or consent." Often, you've consented. You just don't
realize it because you didn't read the fine print. This is why the
definition of spyware sometimes includes the lawyerism "potentially
unwanted technologies."
Spyware Symptoms
 Adware forms of spyware often operate silently, monitoring your Web
surfing activities and reporting back what sites you have visited to
a marketing organization. Others display "pop-up" ads on your computer's
desktop or on top of other Web pages.
 More aggressive spyware will reset your browser's home page (the page
that appears when the browser starts up), change the service your
browser uses for Web searches, or add new sites to your favorites list. Or
produce even more invasive advertisements.
 The most damaging spyware programs can actually install "trojans" --
computer programs which allow other people to remotely access an infected
computer. Such spyware programs can run silently "in the background" and
are capable of doing anything that a typical computer program can do which
does not require your intervention.
 Sometimes a spyware-infected computer will run more slowly due to all the
activity going on in the background. But just because your computer seems
to be running at normal speed doesn't mean you are safe.
 Increase in system crashes
Spayware Prevalence
April 16, 2004; BBC News (UK) - PCs 'infested' with spy
programs. Internet provider EarthLink says it uncovered
29.5 million examples of spyware on over 1 million
computers scanned between January and March. These
parasite programs sometimes come attached to software
downloaded from the Web. The details are often
included in the license agreement small print that most
users click through without reading. But sometimes they
do not even need your permission to download, but just
bury themselves on a hard drive as you browse the
Internet.
Spayware Prevalence
 In October 2004, America Online (AOL) and the National Cyber
Security Alliance (NCSA) released the results of a survey of 329
dial-up and broadband computer users regarding online threats,
including spyware. According to the study:
 80% of the computers they tested were infected with spyware or
adware, and 89% of the users of those computers were unaware of it
 the average infected computer had 93 spyware/adware components on
it, and the most found on a single computer was 1,059
 most users do not recognize the symptoms of spyware — 63% of users
with a pop-up blocker said they got pop-up ads anyway, 43% of users
said their home page had been changed without their permission, and
40% said their search results are being redirected or changed.
Class of Spyware
 Tracking Cookies
 Browser Hijacking
 Hosts File
 Home Page
 Search Page
 Error Pages
 Keyloggers
 Spybots
 Malware
 Adware
Tracking Cookies
 Cookies that can track your Web activities
 May include cookies that contain
user names
passwords
other private information that you enter on
web sites (SSN, banking info, credit cards)
Browser Hijacking
 Hosts File
Redefine the addresses of trusted sources,
i.e. anti-virus tools, software patches and
upgrades
 Home Page
Redefine the page that opens up when you
start your browser
Browser Hijacking
 Search Page
Redefine the page that opens up when you
enter an undefined URL
Redefine the page that opens up when you
click your “Search” button
 Error Pages
Redefine the pages that open when an error
occurs.
Keyloggers
 Were originally designed to record all
keystrokes of users in order to find
passwords, credit card numbers, and other
sensitive information
Spybots
 Spybots are the prototypical example of
“spyware.” A spybot monitors a user’s behavior,
collecting logs of activity and transmitting them
to third parties.
 A spybot may be installed as a browser helper
object, it may exist as a DLL on the host
computer, or it may run as a separate process
launched whenever the host OS boots.
Malware & Adware
 Malware
 Refers to a variety of malicious software, including
viruses, worms, Trojan horses.
 Adware
 Software that displays advertisements tuned to the
user’s current activity, potentially reporting aggregate
or anonymized browsing behavior to a third party
Gator, Cydoor, and eZula
 These three are spyware programs
 All three are “spybot” or “adware” class
programs
 They are typically packaged with popular free
software.
 They all send and retrieve information from
remote servers using the HTTP protocol.
Gator
 Gator is adware that collects and transmits information about
a user’s Web activity.
 Goal is to gather demographic information and generate a
profile of the user’s interests for targeted advertisements.
 Gator may log and transmit URLs that the user visits, partially
identifying information such as the user’s first name and zip
code, and information about the configuration and installed
software on the user’s machine.
 Gator can be installed on a user’s computer in several ways.
When a user installs one of several free software programs
produced by Claria Corporation (the company that produces
Gator), such as a free calendar application or a time
synchronization client
Cydoor
 Cydoor displays targeted pop-up advertisements
 whose contents are dictated by the user’s
browsing history. When a user is connected to
the Internet, the Cydoor client prefetches
advertisements from the Cydoor servers. These
advertisements are displayed whenever the user
runs an application that contains Cydoor,
whether the user is online or offline.
eZula
 eZula attaches itself to a client’s Web browser and modifies
incoming HTML to create links to advertisers from specific
keywords. When a client is infected with eZula, these artificial
links are displayed and highlighted within rendered HTML. It
has been reported that eZula can modify existing HTML links
to redirect them to its own advertisers, but we have not
observed this ourselves.
 It is also known as TopText, ContextPro or HotText.
 It is bundled with several popular filesharing applications
(such as Kazaa and LimeWire), and it can also be
downloaded as a standalone tool. eZula runs as a separate
process (ezulamain.exe) and it includes the ability to self-
update
FTC Advice to Consumers
 The Federal Trade Commission (FTC) issued a consumer alert about
spyware in October 2004 offering a list of warning signs that might indicate
that a computer is infected with spyware. The FTC alert listed the following
clues:
 a barrage of pop-up ads;
 a hijacked browser — that is, a browser that takes you to sites other than those
you type into the address box;
 a sudden or repeated change in your computer’s Internet home page;
 new and unexpected toolbars;
 new and unexpected icons on the system tray at the bottom of your computer
screen;
 keys that don’t work (for example, the “Tab” key that might not work when you try
to move to the next field in a Web form);
 random error messages; and
 sluggish or downright slow performance when opening programs or saving files
FTC Advice to Consumers
 The FTC alert also offered preventive actions consumers can take.
 update your operating system and Web browser software;
 download free software only from sites you know and trust;
 don’t install any software without knowing exactly what it is;
 minimize “drive-by” downloads by ensuring that your browser’s security setting is
high enough to detect unauthorized downloads;
 don’t click on any links within pop-up windows;
 don’t click on links in spam that claim to offer anti-spyware software; and
 install a personal firewall to stop uninvited users from accessing your computer.
 FTC alert advised consumers who think their computers are infected to get
an anti-spyware program from a vendor they know and trust; set it to scan
on a regular basis, at startup and at least once a week; and delete any
software programs detected by the anti-spyware program that the consumer
does not want.
State Laws
 In March 2004, Utah became the first state to
enact spyware legislation, then California joined
Utah in enacting spyware legislation in 2004.
 In 2005 Twelve states enacted spyware
legislation:
 Alaska, Arizona, Arkansas, California, Georgia,
Indiana, Iowa, New Hampshire, Texas, Utah, Virginia,
and Washington.
Preventive Techniques
 Don't install any application unless you are certain of what it does or
where it came from.
 Always read the license agreement
 Software and OS upgrades
 Utilize browser’s security settings
 Use Anti-Spyware
 Spy Sweeper
 Microsoft Windows AntiSpyware
 Spyware Doctor
 Spyware Slayer
 Spy Killer
 Spy Remover
Spy Sweeper
Spy Sweeper
Microsoft Windows AntiSpyware
Microsoft Windows AntiSpyware
Spyware Doctor
References
 http://www.webopedia.com
 http://www.wikipedia.org
 http://www.bendelmen.org
 http://lavasoftusa.com
 http://commerce.senate.gov
Spyware (1).ppt

More Related Content

Similar to Spyware (1).ppt

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & KeyloggersJithin James
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 

Similar to Spyware (1).ppt (20)

Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer security
Computer securityComputer security
Computer security
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Malware
MalwareMalware
Malware
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Spyware
SpywareSpyware
Spyware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 

Recently uploaded

FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiFULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiMalviyaNagarCallGirl
 
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineSHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineShivna Prakashan
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiMalviyaNagarCallGirl
 
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...wdefrd
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiMalviyaNagarCallGirl
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMroute66connected
 
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service HisarVip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisarsrsj9000
 
Gomti Nagar & High Profile Call Girls in Lucknow (Adult Only) 8923113531 Esc...
Gomti Nagar & High Profile Call Girls in Lucknow  (Adult Only) 8923113531 Esc...Gomti Nagar & High Profile Call Girls in Lucknow  (Adult Only) 8923113531 Esc...
Gomti Nagar & High Profile Call Girls in Lucknow (Adult Only) 8923113531 Esc...gurkirankumar98700
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboardthephillipta
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...akbard9823
 
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad EscortsCall girls in Ahmedabad High profile
 
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiFULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiMalviyaNagarCallGirl
 
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comBridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comthephillipta
 
Patrakarpuram ) Cheap Call Girls In Lucknow (Adult Only) 🧈 8923113531 𓀓 Esco...
Patrakarpuram ) Cheap Call Girls In Lucknow  (Adult Only) 🧈 8923113531 𓀓 Esco...Patrakarpuram ) Cheap Call Girls In Lucknow  (Adult Only) 🧈 8923113531 𓀓 Esco...
Patrakarpuram ) Cheap Call Girls In Lucknow (Adult Only) 🧈 8923113531 𓀓 Esco...akbard9823
 
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiMalviyaNagarCallGirl
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMroute66connected
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024samlnance
 
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...gurkirankumar98700
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escortswdefrd
 

Recently uploaded (20)

FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiFULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
 
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 MagazineSHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
SHIVNA SAHITYIKI APRIL JUNE 2024 Magazine
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
 
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NM
 
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service HisarVip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
 
Gomti Nagar & High Profile Call Girls in Lucknow (Adult Only) 8923113531 Esc...
Gomti Nagar & High Profile Call Girls in Lucknow  (Adult Only) 8923113531 Esc...Gomti Nagar & High Profile Call Girls in Lucknow  (Adult Only) 8923113531 Esc...
Gomti Nagar & High Profile Call Girls in Lucknow (Adult Only) 8923113531 Esc...
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboard
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
 
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts
(NEHA) Call Girls Ahmedabad Booking Open 8617697112 Ahmedabad Escorts
 
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiFULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
 
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comBridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
 
Patrakarpuram ) Cheap Call Girls In Lucknow (Adult Only) 🧈 8923113531 𓀓 Esco...
Patrakarpuram ) Cheap Call Girls In Lucknow  (Adult Only) 🧈 8923113531 𓀓 Esco...Patrakarpuram ) Cheap Call Girls In Lucknow  (Adult Only) 🧈 8923113531 𓀓 Esco...
Patrakarpuram ) Cheap Call Girls In Lucknow (Adult Only) 🧈 8923113531 𓀓 Esco...
 
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NM
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024
 
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
 

Spyware (1).ppt

  • 1. Spywares By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of technology (NYIT)-Jordan’s campus 2006
  • 2. Spyware  What Is spyware ?  Spyware Vs Trojan horse  Spyware Vs Virus  Computer Get Infected  Spyware Symptoms  Spyware Prevalence  Class of Spyware  Spyware Programs  FTC  State Law  Preventive Techniques
  • 3. What Is Spyware ?  Applications that send information from your computer to the creator of the spyware  Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan)  Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends  Can also be used to log keystrokes and send those to whomever
  • 4. What Is Spyware ?  Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.  Spyware can be broken down into two different categories:  surveillance spyware  advertising spyware.
  • 5. What Is Spyware ?  Surveillance software:  Includes key loggers, screen capture devices, and Trojans. These would be used by corporations, private detectives, law enforcement, intelligence agencies, suspicious spouses.  Advertising spyware:  Software that is installed alongside other software or via active x controls on the internet, often without the user's knowledge, or without full disclosure that it will be used for gathering personal information and/or showing the user ads.  Advertising spyware logs information about the user, possibly including passwords, email addresses, web browsing history, online buying habits, the computer's hardware and software configuration, the name, age, sex,etc.
  • 6. What Is Spyware ?  software that is downloaded onto a person’s computer without their knowledge. Spyware may collect information about a computer user’s activities and transmit that information to someone else. It may change computer settings, or cause “pop-up” advertisements to appear (in that context, it is called “adware”). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user’s home page. A type of spyware called “keylogging” software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients.
  • 7. Spyware Vs Trojan Horse  Spyware programs are sometimes installed as Trojan horses of one sort or another.They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an End-User License Agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.
  • 8. Spyware Vs Virus  Spyware  Motivation Profit  Monitor online activities for commercial gain  Difficult to relate symptoms with spyware infection: Sluggish PC performance, increased pop-up ads, unexplained home page change, mysterious search results.  New technology (less than 5 years)
  • 9. Spyware Vs Virus  Virus  Intent Harmful  Damage computer system, corrupt files and destroy data  Easy to relate symptoms with virus infecton: Corrupt program files, loss of computer storage memory, deletion of critical files.  Old Technology
  • 10. Computers Get Infected  Basic forms of spyware can be picked up simply by visiting a Web page.  Spyware may also be picked up through email.  You are particularly likely to be exposed by downloading software, in particular "freeware" and "shareware" offerings.  Many software downloads are "free," but within the End User License Agreement (EULA) are provisions to use information from your computer or your email and other contact information. You have to agree to the EULA to download or install, so you essentially agree to allowing someone else to use information about your computer.  That's why the definition of spyware is "generally without your knowledge or consent." Often, you've consented. You just don't realize it because you didn't read the fine print. This is why the definition of spyware sometimes includes the lawyerism "potentially unwanted technologies."
  • 11. Spyware Symptoms  Adware forms of spyware often operate silently, monitoring your Web surfing activities and reporting back what sites you have visited to a marketing organization. Others display "pop-up" ads on your computer's desktop or on top of other Web pages.  More aggressive spyware will reset your browser's home page (the page that appears when the browser starts up), change the service your browser uses for Web searches, or add new sites to your favorites list. Or produce even more invasive advertisements.  The most damaging spyware programs can actually install "trojans" -- computer programs which allow other people to remotely access an infected computer. Such spyware programs can run silently "in the background" and are capable of doing anything that a typical computer program can do which does not require your intervention.  Sometimes a spyware-infected computer will run more slowly due to all the activity going on in the background. But just because your computer seems to be running at normal speed doesn't mean you are safe.  Increase in system crashes
  • 12. Spayware Prevalence April 16, 2004; BBC News (UK) - PCs 'infested' with spy programs. Internet provider EarthLink says it uncovered 29.5 million examples of spyware on over 1 million computers scanned between January and March. These parasite programs sometimes come attached to software downloaded from the Web. The details are often included in the license agreement small print that most users click through without reading. But sometimes they do not even need your permission to download, but just bury themselves on a hard drive as you browse the Internet.
  • 13. Spayware Prevalence  In October 2004, America Online (AOL) and the National Cyber Security Alliance (NCSA) released the results of a survey of 329 dial-up and broadband computer users regarding online threats, including spyware. According to the study:  80% of the computers they tested were infected with spyware or adware, and 89% of the users of those computers were unaware of it  the average infected computer had 93 spyware/adware components on it, and the most found on a single computer was 1,059  most users do not recognize the symptoms of spyware — 63% of users with a pop-up blocker said they got pop-up ads anyway, 43% of users said their home page had been changed without their permission, and 40% said their search results are being redirected or changed.
  • 14. Class of Spyware  Tracking Cookies  Browser Hijacking  Hosts File  Home Page  Search Page  Error Pages  Keyloggers  Spybots  Malware  Adware
  • 15. Tracking Cookies  Cookies that can track your Web activities  May include cookies that contain user names passwords other private information that you enter on web sites (SSN, banking info, credit cards)
  • 16. Browser Hijacking  Hosts File Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades  Home Page Redefine the page that opens up when you start your browser
  • 17. Browser Hijacking  Search Page Redefine the page that opens up when you enter an undefined URL Redefine the page that opens up when you click your “Search” button  Error Pages Redefine the pages that open when an error occurs.
  • 18. Keyloggers  Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 19. Spybots  Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties.  A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.
  • 20. Malware & Adware  Malware  Refers to a variety of malicious software, including viruses, worms, Trojan horses.  Adware  Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
  • 21. Gator, Cydoor, and eZula  These three are spyware programs  All three are “spybot” or “adware” class programs  They are typically packaged with popular free software.  They all send and retrieve information from remote servers using the HTTP protocol.
  • 22. Gator  Gator is adware that collects and transmits information about a user’s Web activity.  Goal is to gather demographic information and generate a profile of the user’s interests for targeted advertisements.  Gator may log and transmit URLs that the user visits, partially identifying information such as the user’s first name and zip code, and information about the configuration and installed software on the user’s machine.  Gator can be installed on a user’s computer in several ways. When a user installs one of several free software programs produced by Claria Corporation (the company that produces Gator), such as a free calendar application or a time synchronization client
  • 23. Cydoor  Cydoor displays targeted pop-up advertisements  whose contents are dictated by the user’s browsing history. When a user is connected to the Internet, the Cydoor client prefetches advertisements from the Cydoor servers. These advertisements are displayed whenever the user runs an application that contains Cydoor, whether the user is online or offline.
  • 24. eZula  eZula attaches itself to a client’s Web browser and modifies incoming HTML to create links to advertisers from specific keywords. When a client is infected with eZula, these artificial links are displayed and highlighted within rendered HTML. It has been reported that eZula can modify existing HTML links to redirect them to its own advertisers, but we have not observed this ourselves.  It is also known as TopText, ContextPro or HotText.  It is bundled with several popular filesharing applications (such as Kazaa and LimeWire), and it can also be downloaded as a standalone tool. eZula runs as a separate process (ezulamain.exe) and it includes the ability to self- update
  • 25. FTC Advice to Consumers  The Federal Trade Commission (FTC) issued a consumer alert about spyware in October 2004 offering a list of warning signs that might indicate that a computer is infected with spyware. The FTC alert listed the following clues:  a barrage of pop-up ads;  a hijacked browser — that is, a browser that takes you to sites other than those you type into the address box;  a sudden or repeated change in your computer’s Internet home page;  new and unexpected toolbars;  new and unexpected icons on the system tray at the bottom of your computer screen;  keys that don’t work (for example, the “Tab” key that might not work when you try to move to the next field in a Web form);  random error messages; and  sluggish or downright slow performance when opening programs or saving files
  • 26. FTC Advice to Consumers  The FTC alert also offered preventive actions consumers can take.  update your operating system and Web browser software;  download free software only from sites you know and trust;  don’t install any software without knowing exactly what it is;  minimize “drive-by” downloads by ensuring that your browser’s security setting is high enough to detect unauthorized downloads;  don’t click on any links within pop-up windows;  don’t click on links in spam that claim to offer anti-spyware software; and  install a personal firewall to stop uninvited users from accessing your computer.  FTC alert advised consumers who think their computers are infected to get an anti-spyware program from a vendor they know and trust; set it to scan on a regular basis, at startup and at least once a week; and delete any software programs detected by the anti-spyware program that the consumer does not want.
  • 27. State Laws  In March 2004, Utah became the first state to enact spyware legislation, then California joined Utah in enacting spyware legislation in 2004.  In 2005 Twelve states enacted spyware legislation:  Alaska, Arizona, Arkansas, California, Georgia, Indiana, Iowa, New Hampshire, Texas, Utah, Virginia, and Washington.
  • 28. Preventive Techniques  Don't install any application unless you are certain of what it does or where it came from.  Always read the license agreement  Software and OS upgrades  Utilize browser’s security settings  Use Anti-Spyware  Spy Sweeper  Microsoft Windows AntiSpyware  Spyware Doctor  Spyware Slayer  Spy Killer  Spy Remover
  • 34. References  http://www.webopedia.com  http://www.wikipedia.org  http://www.bendelmen.org  http://lavasoftusa.com  http://commerce.senate.gov