Agenda
• What is spyware?
• Types of Spyware?
• Spyware Propagation
• Prevent Infection
• Conclusion
• References
What is spyware?
• is software that aims to gather information
about a person or organization without their
knowledge, that may send such information to
another entity without the consumer's
consent, or that asserts control over a device
without the consumer's knowledge.
• Spyware hides its process, files similar to
Trojan horse.
What can it do?
• Spyware can collect almost any type of data,
including personal information like internet
surfing habits, user logins, and bank or credit
account information.
Spyware Propagation
Piggybacked software installation
Drive-by download
Browser add-ons/Browser hijackers
Masquerading as anti-spyware
• Web browser vulnerability exploits
• Cookies
Spyware types
• Domestic Spyware is software purchased to
monitor internet activity on a computer for
business purposes. Domestic spyware is
usually found in a work place.
• Commercial Spyware it used illegally by
companies to track internet activity for
advertisement purposes.
USB Spyware
Audio & Video Spyware
Cellphone Spyware(GPS ,SMS, …).
How can you
prevent Spyware?
• When installing any software on your
computer, make sure you carefully read all
disclosures, including the license agreement
and privacy statement. Sometimes unwanted
software in a given software installation may
be actually documented, might appear at the
end of a license agreement or privacy
statement.
By the Numbers
• 63% Percentage of people that accept End
User License Agreements without reading the
text, according to a Lavasoft poll.
• Try to avoid using any computer system
which is not totally under your control.
• Do not use administrative mode unless it is
necessary.
• Do not store personal information on any
computer system that is not totally under
your control
• Update Your Software
• Surf and Download More Safely
• Use a Firewall
Conclusion
• It should be part of your security awareness
program.
• You can Monitor your Childs and employees .
• It can be used in forensics investigations.
• Can be used in Pen. Testing .
• Counter measures.
References
• http://www.webopedia.com/TERM/S/spyware.html
• http://www.pandasecurity.com/mediacenter/src/upl
oads/2014/07/Annual-Report-PandaLabs-2013.pdf
• http://lavasoft.com/support/spywareeducationcente
r/spyware_statistics.php
• http://webpage.pace.edu/pc08759n/Final%20Projec
t/spyware3.html
• “Ethical Hacking” ,Dr. Adil Yousif,Jan 2017.

spyware