SlideShare una empresa de Scribd logo
1 de 21
PEEYUSH     SHARMA
  3rd NOVEMBER,2011
   Spyware programs have a tendency to hide as
    cookie or temporary internet files

   Broad Definition
     -Software that is installed on my PC without
    my full understanding and permission
   Narrow Definition
      -Software that specifically tracks my personal
    information without my full understanding
    and permission
SPYWARE         ENTRY
   Advertising companies uses
    spyware to “mine data” to
    further help them advertise
    better.
   Uses your Internet
    connection and reports
    statistical data about you and
    your surfing habits a 3rd
    party
   Violating your privacy.
   And is a completely LEGAL
    program!
   Spyware              Virus
   Program                File
   Commercial             Academic
   Revenue                Fame
   Dynamic but
                           Replication
    stationary
                           Destructive
   Consume Resources
   Sometimes Wanted       Never Desired VS
   1 in 5 got attacked electronically
     -Down from 35% in 2005
   Virus and Worm infection most common attack
   More public sector attack reports than private sector
   Of those reporting trojan/rootkitattack 60% were
    public sector and 40% were private sector
   61%of all PCs scanned had Spyware (down from 80%
    in 2004 study)
   96%of PC users are aware of Spyware
   The average PC has 93 Spyware componentson it.
   54%of infected users were unaware of the Spyware
    found on their machines (down from 89% in 2004
    study)
   95%of infected users did not give permission for the
    software identified to be installed on their machines
   20%of calls to Dell’s helpdesk are Spyware related
    (source: Dell)
   Microsoft estimates that 50%of all PC crashes are a
    result of Spyware (Source:InformationWeek April 26,
    2004)
   Adware is created by real businesses
      -They have business plans, sophisticated
    development groups, and venture capital
      -They generate revenue
   Spyware is created by real businesses (and
    sometimes.. organized crime)
    -They have business plans, and sophisticated
    development groups
     -They generate revenue
   Competition! They all want your desktop.
    Personal Identifiable Information collection
     -Identity theft = revenue
    Personal Information collection
     -Surfing habits = revenue
    Click-through revenue
    Software Sales revenue
    SPAM propagation
    -Sales Revenue

    The bottom line is the bottom line $$$.
   Adware
   BHO
   Keylogger
   Hijacker
    -Browser
    -Homepage
    -Errors
    -Typo-Squatting
   Rogue Anti-Spyware
   Dialer
   Tracking Cookie
   Ransomware
   Social Engineering
     -Free giveaways of bundled apps
     -Deceptive installations
   Drive-by-Download
     -WMF exploit
     -CreateTextRangeexploit
     -Hostile ActiveX or Javascript
   Trojan Install
   Search Engine Results/ Sponsored Ads
   Continuous popups
   Persistent change in your homepage.
   Slower computer processing, takes the computer
    longer to process or startup.
   Internet browser does
    not start up.
   Parts of your computer
    you cannot access
    without freezing.
   Major core data is lost
    or changed.
   Polymorphism
   No-uninstall
   Active Defense with Reinstallation
   Rootkit
   Brand Obscurity
   Security Product Disabling
   Cool WebSearch
   Spy Sherriff via WMF Exploit
   Create TextRange Exploit Code
   Crypt. Aand Ransom.A
   Social Engineering
   TypoSquatting
   Preventing spyware from getting onto
    your computer is your first step!
      Do not download unnecessary software from the
       internet, especially free ones because they most likely have
       spyware inside them.
         If a download screen appears, asking you to confirm your
          download, click no if you not trying to install anything.
         Avoid clicking advertised popups especially ones that
          mention “free” stuff if possible.
   Technical Recommendations
       Some adware/spyware files like to hide in the temporary internet folders.
       Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary Internet
        Files Settings, Check Never under “Check for Newer Version of Stored Pages”.
       Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet Options, Delete
        Cookies and Delete Temporary Files.
       Remember though, adware and spyware can be tricky, no matter how cautious
        you are, there are bound to be adware or spyware programs that install into your
        computer.
         Always constantly scan your computer for adware and spyware and keep your
          Adware/Spyware killer programs fully updated at all times.
   Recommended Spyware/ Adware Killers without any restraints
       The “Tri-Killer” combination:
         Ad-aware 6.0 Professional Edition: Primary scanner
         Spy-sweeper paid version: Primary scanner and use their immune guards.
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
   Recommended Spyware/ Adware Killers with a price restraints
         Ad-aware 6.0 Free Edition: Primary Scanner
         Spy-Sweeper paid version: Primary Scanner
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
   Recommended Spyware/ Adware Killers with a time restraints
    (not recommended)
         Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
         Spybot Free Edition:
         Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
           restraints, turn on the scanners, leave them running and go do something.
How spyware hides and tracks users without consent
How spyware hides and tracks users without consent

Más contenido relacionado

La actualidad más candente (20)

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Types of software
Types of softwareTypes of software
Types of software
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Ransomware
RansomwareRansomware
Ransomware
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Malware
MalwareMalware
Malware
 
Mobile security
Mobile security Mobile security
Mobile security
 
Computer virus
Computer virusComputer virus
Computer virus
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rootkits
RootkitsRootkits
Rootkits
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Mobile Application Development Process
Mobile Application Development ProcessMobile Application Development Process
Mobile Application Development Process
 

Destacado

Destacado (20)

Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Freenet
FreenetFreenet
Freenet
 

Similar a How spyware hides and tracks users without consent

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 

Similar a How spyware hides and tracks users without consent (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 

Último

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Último (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

How spyware hides and tracks users without consent

  • 1. PEEYUSH SHARMA 3rd NOVEMBER,2011
  • 2.
  • 3. Spyware programs have a tendency to hide as cookie or temporary internet files  Broad Definition -Software that is installed on my PC without my full understanding and permission  Narrow Definition -Software that specifically tracks my personal information without my full understanding and permission
  • 4. SPYWARE ENTRY  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party  Violating your privacy.  And is a completely LEGAL program!
  • 5.
  • 6. Spyware  Virus  Program  File  Commercial  Academic  Revenue  Fame  Dynamic but  Replication stationary  Destructive  Consume Resources  Sometimes Wanted  Never Desired VS
  • 7. 1 in 5 got attacked electronically -Down from 35% in 2005  Virus and Worm infection most common attack  More public sector attack reports than private sector  Of those reporting trojan/rootkitattack 60% were public sector and 40% were private sector
  • 8. 61%of all PCs scanned had Spyware (down from 80% in 2004 study)  96%of PC users are aware of Spyware  The average PC has 93 Spyware componentson it.  54%of infected users were unaware of the Spyware found on their machines (down from 89% in 2004 study)  95%of infected users did not give permission for the software identified to be installed on their machines  20%of calls to Dell’s helpdesk are Spyware related (source: Dell)  Microsoft estimates that 50%of all PC crashes are a result of Spyware (Source:InformationWeek April 26, 2004)
  • 9. Adware is created by real businesses -They have business plans, sophisticated development groups, and venture capital -They generate revenue  Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and sophisticated development groups -They generate revenue  Competition! They all want your desktop.
  • 10. Personal Identifiable Information collection -Identity theft = revenue  Personal Information collection -Surfing habits = revenue  Click-through revenue  Software Sales revenue  SPAM propagation -Sales Revenue The bottom line is the bottom line $$$.
  • 11. Adware  BHO  Keylogger  Hijacker -Browser -Homepage -Errors -Typo-Squatting  Rogue Anti-Spyware  Dialer  Tracking Cookie  Ransomware
  • 12. Social Engineering -Free giveaways of bundled apps -Deceptive installations  Drive-by-Download -WMF exploit -CreateTextRangeexploit -Hostile ActiveX or Javascript  Trojan Install  Search Engine Results/ Sponsored Ads
  • 13. Continuous popups  Persistent change in your homepage.  Slower computer processing, takes the computer longer to process or startup.
  • 14. Internet browser does not start up.  Parts of your computer you cannot access without freezing.  Major core data is lost or changed.
  • 15. Polymorphism  No-uninstall  Active Defense with Reinstallation  Rootkit  Brand Obscurity  Security Product Disabling
  • 16. Cool WebSearch  Spy Sherriff via WMF Exploit  Create TextRange Exploit Code  Crypt. Aand Ransom.A  Social Engineering  TypoSquatting
  • 17. Preventing spyware from getting onto your computer is your first step!  Do not download unnecessary software from the internet, especially free ones because they most likely have spyware inside them.  If a download screen appears, asking you to confirm your download, click no if you not trying to install anything.  Avoid clicking advertised popups especially ones that mention “free” stuff if possible.
  • 18. Technical Recommendations  Some adware/spyware files like to hide in the temporary internet folders.  Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”.  Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files.  Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer.  Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times.
  • 19. Recommended Spyware/ Adware Killers without any restraints  The “Tri-Killer” combination:  Ad-aware 6.0 Professional Edition: Primary scanner  Spy-sweeper paid version: Primary scanner and use their immune guards.  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.  Recommended Spyware/ Adware Killers with a price restraints  Ad-aware 6.0 Free Edition: Primary Scanner  Spy-Sweeper paid version: Primary Scanner  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed  Recommended Spyware/ Adware Killers with a time restraints (not recommended)  Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode  Spybot Free Edition:  Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something.