SlideShare una empresa de Scribd logo
1 de 11
Spyware Spyware is computer software that is installed on a user's computer without the user's express consent with the purpose of collecting information about the user, their computer or browsing habits What Spyware can do to your system?  They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. Spyware hide in the background while they make unwanted changes to your user experience.  According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware. Wed., May 25, 2011 1 Nora Abuzokkar, Software Development / Network Engineering Specialist
How spyware gets installed on your computer?Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use tricks to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware. Wed., May 25, 2011 2 Nora Abuzokkar, Software Development / Network Engineering Specialist
Emails: If you receive any email from unknown or unexpected senders make sure that you scan it before opening it with your antivirus software and if you have any doubts do not open.Suspect Websites: Browsing some websites that are suspect can lead to infection because the spyware can be hidden as code in the web page itself Wed., May 25, 2011 3 Nora Abuzokkar, Software Development / Network Engineering Specialist
Peer to Peer File Sharing Software: Peer to peer software used to download illegal music, video and software is a common source of infection.A lot of the files available on peer to peer networks (Kazaa) have spyware hidden within them or are not the files you were expecting at all. Wed., May 25, 2011 4 Nora Abuzokkar, Software Development / Network Engineering Specialist
Popup Messages: Spyware can often infect your computer through popups or IP popups. IP popups are sent direct to your computers IP address and can not be stopped by popup blockers. Popups like this are often disguised as Windows error messages instructing you to 'click here' to rectify the error. When you click the button you are executing malware.  Wed., May 25, 2011 5 Nora Abuzokkar, Software Development / Network Engineering Specialist
Instant Messaging (IM) Software: This may be a surprise to many of you as instant messaging software is becoming very popular. Infection usually happens when sharing files with people so be careful who you share files with. Networks: All computers on a network are at risk of infection if one of those computers has spyware on it.. For that reason all network computers must be protected by Antivirus software and a firewall. Wed., May 25, 2011 6 Nora Abuzokkar, Software Development / Network Engineering Specialist
Browser add-ons : These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they'll do but also include elements of spyware as part of the deal. At present, most spyware targets only the Windows operating system. Some of the more notorious spyware threats includeTrymedia, PersonalAntiMalware, Gator, advanced defender, JustProtectPC, Hotbar and New.Net.Domain.Plugin. Wed., May 25, 2011 7 Nora Abuzokkar, Software Development / Network Engineering Specialist
Some signs of spyware infection are:- Your computer slows to a crawl due to several spyware programs using up your memory resources. - Advertisements pop up even when you are offline.- You click on a link to go to one site, but your browser gets hijacked and you end up at another site.- Your computer is dialing up numbers on its own that show up on your phone bill.- When you enter a search item, a new and unexpected site handles the   search.- Your bookmarks change on their own.- You click your Home button but it takes you to a new site, and when you switch the setting back, the new site appears again anyway.- You get pop-up ads that address you by name even when you have not visited site at which you have registered. Wed., May 25, 2011 8 Nora Abuzokkar, Software Development / Network Engineering Specialist
How to prevent infection? Use Anti-Spyware Software: The most effective way to protect your computer is with good quality anti-spyware from a reputable company.  It is not recommend to use free antivirus software, these tend not be very effective and can be spyware in disguise. Which ever one you use just make sure that you keep it regularly updated and remember to renew your yearly subscription. Remember, out of date anti-spyware software is completely useless. Wed., May 25, 2011 9 Nora Abuzokkar, Software Development / Network Engineering Specialist
Use a firewall: Windows XP and Vista both have a firewall built in and you should have them switched on. Most internet securities applications will have an excellent firewall feature so use this in favor of windows firewall.Update windows regularly: Update regularly using Windows update facility to ensure you have all the latest critical security updates. Security holes in Windows are often found and Microsoft will have patches for these available..Curing your infected computer: With any good anti-spyware program, removing spyware is a simple task. If you set them up to do so they will remove it automatically and then inform you once the offender has been dealt with. Wed., May 25, 2011 10 Nora Abuzokkar, Software Development / Network Engineering Specialist
A final word of advice:You will be at a much higher risk of infection if you visit illegal or immoral websites as these sites tend to be set up and frequented by people who have no scruples and will think nothing of infecting your computer along with many others. Sites such as Peer to Peer file sharing websites that provide free music and movie downloads, porn sites that offer picture and movie downloads, file sharing sites and websites offering "amazing free downloads" of top brand software that you should be paying for. Free tool bars for your browser are also a popular way of spreading spyware, if in doubt only install tool bars from reputable companies Wed., May 25, 2011 11 Nora Abuzokkar, Software Development / Network Engineering Specialist

Más contenido relacionado

La actualidad más candente

Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
guest7b2ba1
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 

La actualidad más candente (20)

Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Remove Coup alert
 Remove Coup alert Remove Coup alert
Remove Coup alert
 
What is malware
What is malwareWhat is malware
What is malware
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Ppt123
Ppt123Ppt123
Ppt123
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
 
Spyware
SpywareSpyware
Spyware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
spyware
spyware spyware
spyware
 

Destacado

Spywares Trabalho Final
Spywares Trabalho FinalSpywares Trabalho Final
Spywares Trabalho Final
Sara.cm
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 

Destacado (6)

Practice to portfolio
Practice to portfolioPractice to portfolio
Practice to portfolio
 
spyware
spywarespyware
spyware
 
Spywares Trabalho Final
Spywares Trabalho FinalSpywares Trabalho Final
Spywares Trabalho Final
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 

Similar a Spyware

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Similar a Spyware (20)

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer Based Crime
Computer Based CrimeComputer Based Crime
Computer Based Crime
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 

Spyware

  • 1. Spyware Spyware is computer software that is installed on a user's computer without the user's express consent with the purpose of collecting information about the user, their computer or browsing habits What Spyware can do to your system? They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. Spyware hide in the background while they make unwanted changes to your user experience. According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware. Wed., May 25, 2011 1 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 2. How spyware gets installed on your computer?Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use tricks to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware. Wed., May 25, 2011 2 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 3. Emails: If you receive any email from unknown or unexpected senders make sure that you scan it before opening it with your antivirus software and if you have any doubts do not open.Suspect Websites: Browsing some websites that are suspect can lead to infection because the spyware can be hidden as code in the web page itself Wed., May 25, 2011 3 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 4. Peer to Peer File Sharing Software: Peer to peer software used to download illegal music, video and software is a common source of infection.A lot of the files available on peer to peer networks (Kazaa) have spyware hidden within them or are not the files you were expecting at all. Wed., May 25, 2011 4 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 5. Popup Messages: Spyware can often infect your computer through popups or IP popups. IP popups are sent direct to your computers IP address and can not be stopped by popup blockers. Popups like this are often disguised as Windows error messages instructing you to 'click here' to rectify the error. When you click the button you are executing malware. Wed., May 25, 2011 5 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 6. Instant Messaging (IM) Software: This may be a surprise to many of you as instant messaging software is becoming very popular. Infection usually happens when sharing files with people so be careful who you share files with. Networks: All computers on a network are at risk of infection if one of those computers has spyware on it.. For that reason all network computers must be protected by Antivirus software and a firewall. Wed., May 25, 2011 6 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 7. Browser add-ons : These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they'll do but also include elements of spyware as part of the deal. At present, most spyware targets only the Windows operating system. Some of the more notorious spyware threats includeTrymedia, PersonalAntiMalware, Gator, advanced defender, JustProtectPC, Hotbar and New.Net.Domain.Plugin. Wed., May 25, 2011 7 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 8. Some signs of spyware infection are:- Your computer slows to a crawl due to several spyware programs using up your memory resources. - Advertisements pop up even when you are offline.- You click on a link to go to one site, but your browser gets hijacked and you end up at another site.- Your computer is dialing up numbers on its own that show up on your phone bill.- When you enter a search item, a new and unexpected site handles the search.- Your bookmarks change on their own.- You click your Home button but it takes you to a new site, and when you switch the setting back, the new site appears again anyway.- You get pop-up ads that address you by name even when you have not visited site at which you have registered. Wed., May 25, 2011 8 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 9. How to prevent infection? Use Anti-Spyware Software: The most effective way to protect your computer is with good quality anti-spyware from a reputable company. It is not recommend to use free antivirus software, these tend not be very effective and can be spyware in disguise. Which ever one you use just make sure that you keep it regularly updated and remember to renew your yearly subscription. Remember, out of date anti-spyware software is completely useless. Wed., May 25, 2011 9 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 10. Use a firewall: Windows XP and Vista both have a firewall built in and you should have them switched on. Most internet securities applications will have an excellent firewall feature so use this in favor of windows firewall.Update windows regularly: Update regularly using Windows update facility to ensure you have all the latest critical security updates. Security holes in Windows are often found and Microsoft will have patches for these available..Curing your infected computer: With any good anti-spyware program, removing spyware is a simple task. If you set them up to do so they will remove it automatically and then inform you once the offender has been dealt with. Wed., May 25, 2011 10 Nora Abuzokkar, Software Development / Network Engineering Specialist
  • 11. A final word of advice:You will be at a much higher risk of infection if you visit illegal or immoral websites as these sites tend to be set up and frequented by people who have no scruples and will think nothing of infecting your computer along with many others. Sites such as Peer to Peer file sharing websites that provide free music and movie downloads, porn sites that offer picture and movie downloads, file sharing sites and websites offering "amazing free downloads" of top brand software that you should be paying for. Free tool bars for your browser are also a popular way of spreading spyware, if in doubt only install tool bars from reputable companies Wed., May 25, 2011 11 Nora Abuzokkar, Software Development / Network Engineering Specialist