SlideShare una empresa de Scribd logo
1 de 21
PEEYUSH     SHARMA
  3rd NOVEMBER,2011
   Spyware programs have a tendency to hide as
    cookie or temporary internet files

   Broad Definition
     -Software that is installed on my PC without
    my full understanding and permission
   Narrow Definition
      -Software that specifically tracks my personal
    information without my full understanding
    and permission
SPYWARE         ENTRY
   Advertising companies uses
    spyware to “mine data” to
    further help them advertise
    better.
   Uses your Internet
    connection and reports
    statistical data about you and
    your surfing habits a 3rd
    party
   Violating your privacy.
   And is a completely LEGAL
    program!
   Spyware              Virus
   Program                File
   Commercial             Academic
   Revenue                Fame
   Dynamic but
                           Replication
    stationary
                           Destructive
   Consume Resources
   Sometimes Wanted       Never Desired VS
   1 in 5 got attacked electronically
     -Down from 35% in 2005
   Virus and Worm infection most common attack
   More public sector attack reports than private sector
   Of those reporting trojan/rootkitattack 60% were
    public sector and 40% were private sector
   61%of all PCs scanned had Spyware (down from 80%
    in 2004 study)
   96%of PC users are aware of Spyware
   The average PC has 93 Spyware componentson it.
   54%of infected users were unaware of the Spyware
    found on their machines (down from 89% in 2004
    study)
   95%of infected users did not give permission for the
    software identified to be installed on their machines
   20%of calls to Dell’s helpdesk are Spyware related
    (source: Dell)
   Microsoft estimates that 50%of all PC crashes are a
    result of Spyware (Source:InformationWeek April 26,
    2004)
   Adware is created by real businesses
      -They have business plans, sophisticated
    development groups, and venture capital
      -They generate revenue
   Spyware is created by real businesses (and
    sometimes.. organized crime)
    -They have business plans, and sophisticated
    development groups
     -They generate revenue
   Competition! They all want your desktop.
    Personal Identifiable Information collection
     -Identity theft = revenue
    Personal Information collection
     -Surfing habits = revenue
    Click-through revenue
    Software Sales revenue
    SPAM propagation
    -Sales Revenue

    The bottom line is the bottom line $$$.
   Adware
   BHO
   Keylogger
   Hijacker
    -Browser
    -Homepage
    -Errors
    -Typo-Squatting
   Rogue Anti-Spyware
   Dialer
   Tracking Cookie
   Ransomware
   Social Engineering
     -Free giveaways of bundled apps
     -Deceptive installations
   Drive-by-Download
     -WMF exploit
     -CreateTextRangeexploit
     -Hostile ActiveX or Javascript
   Trojan Install
   Search Engine Results/ Sponsored Ads
   Continuous popups
   Persistent change in your homepage.
   Slower computer processing, takes the computer
    longer to process or startup.
   Internet browser does
    not start up.
   Parts of your computer
    you cannot access
    without freezing.
   Major core data is lost
    or changed.
   Polymorphism
   No-uninstall
   Active Defense with Reinstallation
   Rootkit
   Brand Obscurity
   Security Product Disabling
   Cool WebSearch
   Spy Sherriff via WMF Exploit
   Create TextRange Exploit Code
   Crypt. Aand Ransom.A
   Social Engineering
   TypoSquatting
   Preventing spyware from getting onto
    your computer is your first step!
      Do not download unnecessary software from the
       internet, especially free ones because they most likely have
       spyware inside them.
         If a download screen appears, asking you to confirm your
          download, click no if you not trying to install anything.
         Avoid clicking advertised popups especially ones that
          mention “free” stuff if possible.
   Technical Recommendations
       Some adware/spyware files like to hide in the temporary internet folders.
       Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary Internet
        Files Settings, Check Never under “Check for Newer Version of Stored Pages”.
       Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet Options, Delete
        Cookies and Delete Temporary Files.
       Remember though, adware and spyware can be tricky, no matter how cautious
        you are, there are bound to be adware or spyware programs that install into your
        computer.
         Always constantly scan your computer for adware and spyware and keep your
          Adware/Spyware killer programs fully updated at all times.
   Recommended Spyware/ Adware Killers without any restraints
       The “Tri-Killer” combination:
         Ad-aware 6.0 Professional Edition: Primary scanner
         Spy-sweeper paid version: Primary scanner and use their immune guards.
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
   Recommended Spyware/ Adware Killers with a price restraints
         Ad-aware 6.0 Free Edition: Primary Scanner
         Spy-Sweeper paid version: Primary Scanner
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
   Recommended Spyware/ Adware Killers with a time restraints
    (not recommended)
         Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
         Spybot Free Edition:
         Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
           restraints, turn on the scanners, leave them running and go do something.
Spyware
Spyware

Más contenido relacionado

La actualidad más candente

Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
Ali Mattash
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 

La actualidad más candente (20)

Bug bounty
Bug bountyBug bounty
Bug bounty
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ransomware
RansomwareRansomware
Ransomware
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Spyware
SpywareSpyware
Spyware
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 

Destacado

Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 

Destacado (20)

Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Freenet
FreenetFreenet
Freenet
 
Smart memories
Smart memoriesSmart memories
Smart memories
 

Similar a Spyware

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

Similar a Spyware (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Spyware

  • 1. PEEYUSH SHARMA 3rd NOVEMBER,2011
  • 2.
  • 3. Spyware programs have a tendency to hide as cookie or temporary internet files  Broad Definition -Software that is installed on my PC without my full understanding and permission  Narrow Definition -Software that specifically tracks my personal information without my full understanding and permission
  • 4. SPYWARE ENTRY  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party  Violating your privacy.  And is a completely LEGAL program!
  • 5.
  • 6. Spyware  Virus  Program  File  Commercial  Academic  Revenue  Fame  Dynamic but  Replication stationary  Destructive  Consume Resources  Sometimes Wanted  Never Desired VS
  • 7. 1 in 5 got attacked electronically -Down from 35% in 2005  Virus and Worm infection most common attack  More public sector attack reports than private sector  Of those reporting trojan/rootkitattack 60% were public sector and 40% were private sector
  • 8. 61%of all PCs scanned had Spyware (down from 80% in 2004 study)  96%of PC users are aware of Spyware  The average PC has 93 Spyware componentson it.  54%of infected users were unaware of the Spyware found on their machines (down from 89% in 2004 study)  95%of infected users did not give permission for the software identified to be installed on their machines  20%of calls to Dell’s helpdesk are Spyware related (source: Dell)  Microsoft estimates that 50%of all PC crashes are a result of Spyware (Source:InformationWeek April 26, 2004)
  • 9. Adware is created by real businesses -They have business plans, sophisticated development groups, and venture capital -They generate revenue  Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and sophisticated development groups -They generate revenue  Competition! They all want your desktop.
  • 10. Personal Identifiable Information collection -Identity theft = revenue  Personal Information collection -Surfing habits = revenue  Click-through revenue  Software Sales revenue  SPAM propagation -Sales Revenue The bottom line is the bottom line $$$.
  • 11. Adware  BHO  Keylogger  Hijacker -Browser -Homepage -Errors -Typo-Squatting  Rogue Anti-Spyware  Dialer  Tracking Cookie  Ransomware
  • 12. Social Engineering -Free giveaways of bundled apps -Deceptive installations  Drive-by-Download -WMF exploit -CreateTextRangeexploit -Hostile ActiveX or Javascript  Trojan Install  Search Engine Results/ Sponsored Ads
  • 13. Continuous popups  Persistent change in your homepage.  Slower computer processing, takes the computer longer to process or startup.
  • 14. Internet browser does not start up.  Parts of your computer you cannot access without freezing.  Major core data is lost or changed.
  • 15. Polymorphism  No-uninstall  Active Defense with Reinstallation  Rootkit  Brand Obscurity  Security Product Disabling
  • 16. Cool WebSearch  Spy Sherriff via WMF Exploit  Create TextRange Exploit Code  Crypt. Aand Ransom.A  Social Engineering  TypoSquatting
  • 17. Preventing spyware from getting onto your computer is your first step!  Do not download unnecessary software from the internet, especially free ones because they most likely have spyware inside them.  If a download screen appears, asking you to confirm your download, click no if you not trying to install anything.  Avoid clicking advertised popups especially ones that mention “free” stuff if possible.
  • 18. Technical Recommendations  Some adware/spyware files like to hide in the temporary internet folders.  Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”.  Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files.  Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer.  Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times.
  • 19. Recommended Spyware/ Adware Killers without any restraints  The “Tri-Killer” combination:  Ad-aware 6.0 Professional Edition: Primary scanner  Spy-sweeper paid version: Primary scanner and use their immune guards.  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.  Recommended Spyware/ Adware Killers with a price restraints  Ad-aware 6.0 Free Edition: Primary Scanner  Spy-Sweeper paid version: Primary Scanner  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed  Recommended Spyware/ Adware Killers with a time restraints (not recommended)  Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode  Spybot Free Edition:  Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something.