Spyware Information |
|
Who’s Watching What You TypeRobert Palmer If someone entered your home, uninvited and installed numerous cameras and listening devices in order to monitor your activities, you would quite rightly be outraged. While such a situation, unless you are living in the Big Brother House, would be considered ridiculous, the same cannot be said for the humble home computer. Recently released research alarmingly shows that home PC’s are increasingly likely to host software which can watch each and every keystroke the user inputs. According to the research compiled from an audit conducted jointly by the software firm, WebRoot and services provider, EarthLink, the average home PC hosts 28 so-called spyware programs. Whilst the worst examples of spyware are written by virus writers to steal passwords and hijack computers to launch “denial of service” attacks against web-servers, the vast majority are used to collate marketing information and then target advertising according to the end-users web surfing habits. The WebRoot/EarthLink audit surveyed more than 1.5 million PC’s during the last 12 months and discovered an amazing 41 million incidents of spyware; adware, Trojans, tracking cookies and other undesirable programs. Most of these programs are loaded into the computer memory when the PC is started up. From here, the program will work silently, often giving no clues as to its existence. However, unexplained browser window pop-up’s, often advertising adult services and mysterious alterations to the browsers homepage setting are more often than not an indication that spyware is present and active on a computer. One particular piece of spyware, which is proving to be very expensive for many home users, is that of Trojan Diallers. Diallers, often without any warning to the end-user, hangs up the current net connection and then automatically reconnects using a Premium Rate telephone number, thus running up huge telephone bills. The activities of companies using this technology as a revenue stream are currently under investigation in the UK by government watchdogs. A hard-disk and memory overflowing with spyware used to be one of the unfortunate consequences of visiting sex and adult orientated sites; a kind of eSTD. Like most Internet marketing technologies, from the pop-up to the pop-under and the first snowball of Spam, spyware began life serving the adult industry. Then, just like pop-up, spyware filtered through all aspects of ecommerce. In an interview to the BBC, David Moll, CEO of WebRoot, said that spyware has now become so common across the whole of the Internet, that it can be contracted from nearly anywhere. So-called “drive-by downloads” are now responsible for most infections of spyware. The term “drive-by” refers to the casualness of the infection. By simply visiting an ordinary webpage a user can unwittingly initiate an automatic download of spyware onto their computer. There are no clues and no warnings. In a recent, carefully controlled and closed demonstration, it took me less than 20 minutes to create a spyware program and embed it into a webpage. Using colleagues who had previously been made aware of the nature of the experiment, I invited them to take a look at this “special” but very ordinary looking webpage. Within seconds of visiting this webpage, the spyware went to work taking a snapshot of their hard disk, a snapshot of their Favourites folder and a copy of their browsing history. Before they had even finished reading the webpage, the spyware was already transferring their information to my server. It’s as easy as that! Equally that same code could be manipulated to perform a total trash of the hard disk or some other equally miserable and criminal act. Speaking to the BBC, David Moll explained. "Some spyware programs lurk on misspelled URLs and strike those that type faster than their fingers can carry them. As a result you do not end up where you expect to be." Alarmingly, users do not even need to visit a website to contract spyware. The preview window in Microsoft’s Outlook Express allows emails containing HTML and any other code which can be placed on a normal webpage, to be loaded, without warning. Companies looking to implant spyware using the “drive-by” principal are regularly exploiting this glaringly obvious flaw in the design of Outlook Express. "If you get one piece of spyware, you will get five because the business model says they pay each other to pass on information about victims," said Mr Moll. Thankfully anti-spyware/adware programs such as Ad-Aware free and WebRoot’s own offering, Spy Sweeper can clean up a PC and even help prevent further infections, but just like anti-virus software, anti-spyware software needs to be kept up-to-date to remain effective. In addition to providing software solutions to this problem, legislators too are seeking to end this electronic intrusion. In the USA an anti-spyware bill is moving towards approval in Congress. If successfully implemented, this bill will force firms who wish to use spyware to first receive permission from the end-user before it is installed. But even before any new laws come into place, spyware makers are already working on next generation coding which keep their programs intact and operational….perhaps even on your PC. Related Links: WebRoot Spyware Audit http://www.webroot.com/services/spyaudit_03.htm Ad-Aware http://www.lavasoftusa.com/software/adaware/ WebRoot http://www.webroot.com/
|
RELATED ARTICLES
Why Use Antivirus Software This is a really simple question to answer – you need to use antivirus software to protect your own computer, and to prevent your computer from being used to pass on infections to other machines without your knowledge. If you use the internet and you don’t take precautions, you’re going to get infected. And you’ll infect others, including those you care about most like your friends, family, and business contacts because their information is in your email address book and other files on your computer. Rid Your Computer of ITD - Internet Transmitted Diseases Spyware or malware has become very prolific in the past year but there are some things you can do to limit your infection by it. Spyware: What It Is and How to Combat It Spyware is software or hardware installed on a computer without the users knowledge which gathers information about that user for later retrieval by whomever controls the spyware. Small Business Computer Security, the Basics Anyone in business today realizes both the natural dependency on computers in the workplace, and also the potential dangers associated with storing important data on them. Today’s business owners are constantly being reminded that their company’s data is at risk by the daily reports on various news stations, or even their favorite business-related website. But what can a typical small business owner do to protect their network from these threats that are broadcasted in so many ways Dangers lurk at every turn on the Internet. There are thousands of attacks or areas of security that could be discussed, but I am going to try and focus on three general nuisances associated with today’s computers: viruses, spy-ware, and traditional “hackers” that will intentionally try to exploit your computer systems for various reasons. All of these attacks, although different, serve a specific purpose for the attacker, yet basically translate into three things for a business: lost productivity, lost data, and the end result… lost money. Here is brief descriptions of what the aforementioned attacks are, consist of, and what a typical small business can do to protect their technology investments. Learn Simple Strategies That Will Stop Spammers From Bombarding Your Inbox! Spam filter is the solution that most people resort when they try to steam the flood of junk mails and spam. Protect Your System From the Internet Evils Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was quickly developed that would attempt to block these ads from loading and being displayed leaving the Internet free from irritants so the user could just view the information that they were after. Not surprisingly the Internet fought back with ads becoming more and more tricky in their execution. Arm Yourself Against Snoops With Spyware Counterintelligence Spyware is the cyber-equivalent of a peeping Tom. No one would think of sitting by while someone hide in the bushes watching their every move, so why do so many allow spyware snoops to moniter them online In some cases the answer is simple. They may not even know that they are being watched. The Benefits of the New Firefox Browser You probably heard of the new Firefox browser version 1.0 recently released by Mozilla. If you are currently using Internet Explorer or Netscape, you are probably wondering if Firefox is better and why is it better. In order to answer these questions it is necessary to take a look at all the benefits that Firefox offers you as a user. The Dangers of Peer-to-Peer Systems Peer-to-Peer P2P systems do not operate on secure lines, thus providing a conduit for hackers to enter a network or computer, access personal and confidential information, as well as deploy viruses or worms. Users of P2P systems are prime targets and/or launching points for malicious hacker attacks simply because it requires downloading and sharing electronic files or programs, not to mention usage on publicly open and interpretable industry standard protocols and industry standard codec. Microsoft Blues With the advent of Service Pack 2 for Windows XP operating system, Microsoft have really made the forums hum. Beware of the Newest Activity Online… Phishing. No. I’m not talking here about the outdoor activity enjoyed by many. And no again; I did not misspell it. Phishing is the name given to the latest online scam where millions of unwary Americans are getting their identities stolen. Watch Out For Spyware Programs That Slows Down Your Computer System Spyware is a program that once loaded on your computer unknowingly collects information from your PC and sends it to another party. The most dangerous types of Spyware programs copies personal information that you would not share with anyone such as passwords, files and credit card numbers. Tops In Toolbars Most internet marketers are aware of, and probably use, the Google Toolbar. After all, it has been the only indicator of Googles PageRank number that has been assigned to a given web page. Whether the number is accurate, important, or even updated any more is a matter of debate on the marketing forums. But the only feature that was really worthwhile for more casual surfers, other than being able to use the Google search box directly, was the popup window blocker feature, which oddly enough, is the least favorite feature of many an internet marketer. But for many surfers now, the Yahoo Toolbar may well be a better choice. A 3 megabyte download for computers running Windows 98 or higher and Internet Explorer 5.0 or higher, the Yahoo Toolbar not only offers greater interactivity with Yahoo and My Yahoo, but now offers some benefits for your PC as well. How to Protect your PC from Spyware in the Cyber Age. Wouldnt you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes Even worse... I Spy...Something Terribly Wrong In Your Computer I Spy...Something Terribly Wrong In Your Computer The Identity Theft Epidemic : What The “Experts” Aren’t Telling You Picture yourself walking down the street, all alone. Its late at night. Its a bit brisk, and the wind is blowing through the tall buildings on both sides of you. Suddenly, from out of nowhere, someone runs by you, knocks you over, grabs your wallet, and takes off. Is Your Web Browser Putting You At Risk Its free, it comes with Windows and its used by approximately 94% of the Internet population. It also poses an unacceptable security risk. What am I talking about If you guessed Internet Explorer, youre right on the money. So, is your web browser putting you at risk If youre one of the 94% using Internet Explorer, the answer is a definite *yes*. By my math, quite a few people require critical information for protection. How To Stop Spyware From Infecting Your System Spyware is becoming more and more of a problem. When I visit a cusomters site and inspect the computers I always find some kind of spyware on the system. I know that many people have been unaware of spyware, but hopefully now that the word is spreading that people will be more aware of the problem and setup a good defense. I get a get calls or questions to the effect of "Why is my computer running so slow I just bought the computer recently". Most of the time this is because of spyware. Spyware programs will load on boot up and take up your computer memory that will reduce your performance. I will go over my typical setup to prevent and battle spyware. This system works if all of the current spyware has been removed properly. I will leave that to another article. How To Manage Your Username And Password The Easy And Secure Way Have been an Internet user for more than 9 years, I have 100s of logins and passwords to keep. Im paranoid. Im now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily. Network Monitoring for Serious eCommerce In the real world, businesses come in every size, from self-employed entrepreneurs like me to mega malls like Wal-Mart. |
home | site map |
© 2005 |