2. SpyWare
Is a piece of software intended to
monitor computer usage.
?
This data can be collected anonymously for
statistical purpose or with knowledge of whose
usage they are tracking.
3. History
First used 16 Oct 1995
on ther usernet
Parental tools
in home Networks
Origins in Marketing
Spyware was overtaken for
clandestine means
Scan hard drive for personal
information
Tracking web usage
4. Spyware is not a Virus
Cannot replicate Itself
Cannot be detected by anti-virus software
You have to agree to be spied on
5. Spyware Can ...
Track Browsing
Steal Identity
Corrupt Data
Create Profiles
Slow the computer
slow the Network
Change HomePage
Modify hosts File
Download Malware
Modify Registry
Change Settings
Hijack Computer
Leak Information
Violate HIPPA
6. Where is Spyware Found?
Spyware is most often found in Downloading/Sharing
utilities and Media player
Spyware is almost always associated with free
software.
Targeted pop-up ads from observed website visits.
May install other software or remove competitors
software.
7. Cookies
Cookies are Unique
identifiers placed on
your computet/mpbile
by a web server.
Browser Hijack
Can include altering
the Homepage,Url
prefilx Dns spoofing
P2P file sharing
Get private
information
Gmail, SMS, & access
to all data (account
number ,credit card
,password)
Personal
Data
Motivation
Ads
8. A
T
K
M
Adware
any software application
that displays advertisement
while the program is running.
Trojans
a software applcation that
appears harmless but can
inflict damage or data loss
to a system.
Keyboard Loggers
A type of surveillance
technology used to monitor and
record keystrokes. Cyber
criminals can use these to steal
sensitive information such as
authorization credentials,
enterprise data & computer
Mobile Spyware
A type of spyware that can
infect mobile devices that
typically enters via SMS &
MMS etc.
Type of Spyware
9. 80%
How prevalent is spyware ?
95%
93% 89%
Internet users
interface
Never granted
permission
AOL Survy Results
Spyware components
present in infected CPUs
Users are unaware of
spyware's presence
11. People
Prevention
analysis
Awareness
Reaction to social engineering ploys
Extreme caution when loading software
Know how to recognize problems.
Know how to use the tools.
Understand the policies.
Don't click on links in pop-ups.
Don't believe spam reports.
13. Policy
Prevention
analysis
Product Updates
Restrict or forbid dangerous practices.
Use appropriate settings
Consider notebook & home systems.
Report problems promptly.
P2P file sharing
public instant messaging
Unapproved software installation
14. Spyware Tools
System Mechanic
Ultimate Defense
Restoro Spybot SpywareBlaster
Cleaning and
repairing your pc.
Full Featured free
Antivirus.
Internet Security and
Malware removal.
Best for virus & spyware
removal.
Best for spyware
removal for advanced
users.
Best for browser protection
by blocking New Spyware
threats.
AVG Antivirus Comodo
15. Conclusion
Spyware, though not a particularly new problem
when defined generally, remains a problem that is
difficult to manage. While there is no silver bullet
to solve all of these problems, there is hope.