SlideShare una empresa de Scribd logo
1 de 29
PRESENT BY :
Ankit Mistry (130280105026)
KEY LOGGERSKEY LOGGERS
&&
SPYWARESSPYWARES
WHAT IS KEY LOGGER????
 A key logger is a program that runs in the
background or hardware, recording all the keystrokes.
Once keystrokes are logged, they are hidden in the
machine for later retrieval, or shipped raw to the
attacker
 Attacker checks files carefully in the hopes of either
finding passwords, or possibly other useful
information.
 Key loggers, as a surveillance tool, are often used by
employers to ensure employees use work computers
for business purposes only
 Such systems are also highly useful for law
enforcement and espionage
 Keystroke logging can be achieved by both hardware
and software means.
 There are two types of keyloggers :
1. Hardware Keylogger
2. Software Keylogger
HARDWARE KEYLOGGER
 Hardware keyloggers are used for keystroke
logging, a method of capturing and recording
computer users' keystrokes, including sensitive
passwords.
 Generally, recorded data is retrieved by typing
a special password into a computer text editor.
 The hardware keyloggers plugged in between
the keyboard and computer detects that the
password has been typed and then presents the
computer with "typed" data to produce a menu.
HARDWARE KEYLOGGERS
Come in three types:
 Inline devices that are attached to the
keyboard cable.
 Devices which can be installed inside
standard keyboards.
 Replacement keyboards that contain the
key logger already built-in.
SOME HARDWARE KEYLOGGERS
 Hardware KeyLogger Stand-alone Edition
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Hardware KeyLogger Keyboard Edition
looks and behaves exactly like a normal keyboard,
but it keeps a record of all keystrokes typed on it.
 KeyGhost Hardware Keylogger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 KeyKatcher Keystroke Logger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Advantages :
1. Antivirus techniques cannot catch these.
2. Work on all computing platforms.
 Disadvantages :
1. It can be spotted by a suspicious user.
SOFTWARE KEYLOGGERS
 Software keyloggers track system , collect
keystoke data within the target operating
system , store them on disk or in remote location
, and send them to the attacker who installed the
keyloggers.
 Anti malware, personal firewall, and Host-based
Intrusion prevention(HIPS) solution detect and
remove application keyloggers.
Software keylogger detection methods include:
Scan local drive for log.txt or other log file names
associate with known keyloggers.
Implement solution that detect unauthorized file
transfer via FTP or other protocols;
Scan content sent via email or other authorized means
looking for sensitive information;
Detect encrypted files transmitted to questionable
destinations.
Advantages :
1.Are hard to detect
2.Can be deployed remotely via a software vulnerability
attack
3.Are fairly easy to write
Disadvantage :
1.A good antivirus scheme could sniff these out.
2.Far fewer cons with the software, so these are much
more common than hardware-type keyloggers.
EXAMPLE OF WINDOWS
KEYLOGGERS
 Badtrans : a keylogger worm that
exploited vulnerability in outlook
express and internet explorer. It collect
keystrokes and them to various e mail
address.
 Magic lantern: FBI’s own software to
wire tap|log email passing through ISPs.
What Is Spyware ?
 Applications that send information from
your computer to the creator of the
spyware
 Sometimes consists of an apparent core
functionality and a hidden functionality
of information gathering (Trojan)
 Can be used by web sites for marketing
information, to determine their stance
with regard to competitors and market
trends
 Can also be used to log keystrokes and
send those to whomever
WHAT IS SPYWARE ?
 Software that is installed on a computer without the
user’s knowledge which monitors user activity and
transmits it to another computer. Many spyware
programs are set to monitor what web sites you
visit them generally for advertising /marketing
purposes.
 Software or hardware installed on a
computer without the user's knowledge
which gathers information about that
user for later retrieval by whomever
controls the spyware.
 Spyware can be broken down into two
different categories:
 surveillance spyware
 advertising spyware.
 Spyware oriented in the 1990’s with programs that
secretly observed and logged user web surfing
habits. It can do more than steal your personal
information but also job user PC of its speeds,
stability and Internet acess efficiency
CLASS OF SPYWARE
TRACKING COOKIES
 Cookies that can track your Web
activities
 May include cookies that contain
user names
passwords
other private information that you
enter on web sites (SSN, banking
info, credit cards)
BROWSER HIJACKING
 Hosts File
Redefine the addresses of trusted
sources, i.e. anti-virus tools, software
patches and upgrades
 Home Page
Redefine the page that opens up when
you start your browser
BROWSER HIJACKING
 Search Page
Redefine the page that opens up when
you enter an undefined URL
Redefine the page that opens up when
you click your “Search” button
 Error Pages
Redefine the pages that open when an
error occurs.
KEYLOGGERS
 Were originally designed to record all
keystrokes of users in order to find
passwords, credit card numbers, and
other sensitive information
SPYBOTS
 Spybots are the prototypical example of
“spyware.” A spybot monitors a user’s
behavior, collecting logs of activity and
transmitting them to third parties.
 A spybot may be installed as a browser
helper object, it may exist as a DLL on
the host computer, or it may run as a
separate process launched whenever the
host OS boots.
MALWARE & ADWARE
 Malware
Refers to a variety of malicious
software, including viruses, worms,
Trojan horses.
 Adware
Software that displays advertisements
tuned to the user’s current activity,
potentially reporting aggregate or
anonymized browsing behavior to a
third party
Spyware Vs Virus
1. Motivation Profit
2. Monitor online
activities for
commercial gain
3. Difficult to relate
symptoms with
spyware infection.
4. New technology
(less than 5 years)
1. Intent Harmful
2. Damage computer
system, corrupt files
and destroy data
3. Easy to relate
symptoms with virus
infection: Corrupt
program files, loss of
computer storage
memory, deletion of
critical files.
4. Old Technology
SPYWARE VS TROJAN
HORSE
 Spyware programs are sometimes
installed as Trojan horses of one sort or
another.They differ in that their creators
present themselves openly as businesses,
for instance by selling advertising space
on the pop-ups created by the malware.
Most such programs present the user
with an End-User License Agreement
which purportedly protects the creator
from prosecution under computer
contaminant laws. However, spyware
EULAs have not yet been upheld in
court.
SPAYWARE PREVALENCE
April 16, 2004; BBC News (UK) - PCs
'infested' with spy programs. Internet
provider EarthLink says it uncovered
29.5 million examples of spyware on
over 1 million computers scanned
between January and March. These
parasite programs sometimes come
attached to software downloaded from
the Web.
PRESERVATION OF SPYWARE
 Do not installed free software availble
on internet.
 Do not click on email attachments or
links of you don’t know the sender or
even if you send know the sender, but
the content is unexpected.
 Do not installed unknown software.
 Do not click on links or buttons or pop-
up windows.
THANKTHANK
YOUYOU

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Steganography
Steganography Steganography
Steganography
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Program security
Program securityProgram security
Program security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Malware
MalwareMalware
Malware
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 

Similar a Keyloggers and Spywares

Similar a Keyloggers and Spywares (20)

ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 

Último

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Último (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Keyloggers and Spywares

  • 1. PRESENT BY : Ankit Mistry (130280105026) KEY LOGGERSKEY LOGGERS && SPYWARESSPYWARES
  • 2. WHAT IS KEY LOGGER????  A key logger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker  Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.
  • 3.  Key loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only  Such systems are also highly useful for law enforcement and espionage  Keystroke logging can be achieved by both hardware and software means.
  • 4.  There are two types of keyloggers : 1. Hardware Keylogger 2. Software Keylogger
  • 5. HARDWARE KEYLOGGER  Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.  Generally, recorded data is retrieved by typing a special password into a computer text editor.  The hardware keyloggers plugged in between the keyboard and computer detects that the password has been typed and then presents the computer with "typed" data to produce a menu.
  • 6.
  • 7. HARDWARE KEYLOGGERS Come in three types:  Inline devices that are attached to the keyboard cable.  Devices which can be installed inside standard keyboards.  Replacement keyboards that contain the key logger already built-in.
  • 8. SOME HARDWARE KEYLOGGERS  Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer.  Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it.  KeyGhost Hardware Keylogger a tiny hardware device that can be attached in between a keyboard and a computer.  KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.
  • 9.  Advantages : 1. Antivirus techniques cannot catch these. 2. Work on all computing platforms.  Disadvantages : 1. It can be spotted by a suspicious user.
  • 10. SOFTWARE KEYLOGGERS  Software keyloggers track system , collect keystoke data within the target operating system , store them on disk or in remote location , and send them to the attacker who installed the keyloggers.  Anti malware, personal firewall, and Host-based Intrusion prevention(HIPS) solution detect and remove application keyloggers.
  • 11. Software keylogger detection methods include: Scan local drive for log.txt or other log file names associate with known keyloggers. Implement solution that detect unauthorized file transfer via FTP or other protocols; Scan content sent via email or other authorized means looking for sensitive information; Detect encrypted files transmitted to questionable destinations.
  • 12. Advantages : 1.Are hard to detect 2.Can be deployed remotely via a software vulnerability attack 3.Are fairly easy to write Disadvantage : 1.A good antivirus scheme could sniff these out. 2.Far fewer cons with the software, so these are much more common than hardware-type keyloggers.
  • 13. EXAMPLE OF WINDOWS KEYLOGGERS  Badtrans : a keylogger worm that exploited vulnerability in outlook express and internet explorer. It collect keystrokes and them to various e mail address.  Magic lantern: FBI’s own software to wire tap|log email passing through ISPs.
  • 14. What Is Spyware ?  Applications that send information from your computer to the creator of the spyware  Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan)  Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends  Can also be used to log keystrokes and send those to whomever
  • 15. WHAT IS SPYWARE ?  Software that is installed on a computer without the user’s knowledge which monitors user activity and transmits it to another computer. Many spyware programs are set to monitor what web sites you visit them generally for advertising /marketing purposes.
  • 16.  Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.  Spyware can be broken down into two different categories:  surveillance spyware  advertising spyware.
  • 17.  Spyware oriented in the 1990’s with programs that secretly observed and logged user web surfing habits. It can do more than steal your personal information but also job user PC of its speeds, stability and Internet acess efficiency
  • 19. TRACKING COOKIES  Cookies that can track your Web activities  May include cookies that contain user names passwords other private information that you enter on web sites (SSN, banking info, credit cards)
  • 20. BROWSER HIJACKING  Hosts File Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades  Home Page Redefine the page that opens up when you start your browser
  • 21. BROWSER HIJACKING  Search Page Redefine the page that opens up when you enter an undefined URL Redefine the page that opens up when you click your “Search” button  Error Pages Redefine the pages that open when an error occurs.
  • 22. KEYLOGGERS  Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 23. SPYBOTS  Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties.  A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.
  • 24. MALWARE & ADWARE  Malware Refers to a variety of malicious software, including viruses, worms, Trojan horses.  Adware Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
  • 25. Spyware Vs Virus 1. Motivation Profit 2. Monitor online activities for commercial gain 3. Difficult to relate symptoms with spyware infection. 4. New technology (less than 5 years) 1. Intent Harmful 2. Damage computer system, corrupt files and destroy data 3. Easy to relate symptoms with virus infection: Corrupt program files, loss of computer storage memory, deletion of critical files. 4. Old Technology
  • 26. SPYWARE VS TROJAN HORSE  Spyware programs are sometimes installed as Trojan horses of one sort or another.They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an End-User License Agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.
  • 27. SPAYWARE PREVALENCE April 16, 2004; BBC News (UK) - PCs 'infested' with spy programs. Internet provider EarthLink says it uncovered 29.5 million examples of spyware on over 1 million computers scanned between January and March. These parasite programs sometimes come attached to software downloaded from the Web.
  • 28. PRESERVATION OF SPYWARE  Do not installed free software availble on internet.  Do not click on email attachments or links of you don’t know the sender or even if you send know the sender, but the content is unexpected.  Do not installed unknown software.  Do not click on links or buttons or pop- up windows.