SlideShare uma empresa Scribd logo
1 de 21
PEEYUSH     SHARMA
  3rd NOVEMBER,2011
   Spyware programs have a tendency to hide as
    cookie or temporary internet files

   Broad Definition
     -Software that is installed on my PC without
    my full understanding and permission
   Narrow Definition
      -Software that specifically tracks my personal
    information without my full understanding
    and permission
SPYWARE         ENTRY
   Advertising companies uses
    spyware to “mine data” to
    further help them advertise
    better.
   Uses your Internet
    connection and reports
    statistical data about you and
    your surfing habits a 3rd
    party
   Violating your privacy.
   And is a completely LEGAL
    program!
   Spyware              Virus
   Program                File
   Commercial             Academic
   Revenue                Fame
   Dynamic but
                           Replication
    stationary
                           Destructive
   Consume Resources
   Sometimes Wanted       Never Desired VS
   1 in 5 got attacked electronically
     -Down from 35% in 2005
   Virus and Worm infection most common attack
   More public sector attack reports than private sector
   Of those reporting trojan/rootkitattack 60% were
    public sector and 40% were private sector
   61%of all PCs scanned had Spyware (down from 80%
    in 2004 study)
   96%of PC users are aware of Spyware
   The average PC has 93 Spyware componentson it.
   54%of infected users were unaware of the Spyware
    found on their machines (down from 89% in 2004
    study)
   95%of infected users did not give permission for the
    software identified to be installed on their machines
   20%of calls to Dell’s helpdesk are Spyware related
    (source: Dell)
   Microsoft estimates that 50%of all PC crashes are a
    result of Spyware (Source:InformationWeek April 26,
    2004)
   Adware is created by real businesses
      -They have business plans, sophisticated
    development groups, and venture capital
      -They generate revenue
   Spyware is created by real businesses (and
    sometimes.. organized crime)
    -They have business plans, and sophisticated
    development groups
     -They generate revenue
   Competition! They all want your desktop.
    Personal Identifiable Information collection
     -Identity theft = revenue
    Personal Information collection
     -Surfing habits = revenue
    Click-through revenue
    Software Sales revenue
    SPAM propagation
    -Sales Revenue

    The bottom line is the bottom line $$$.
   Adware
   BHO
   Keylogger
   Hijacker
    -Browser
    -Homepage
    -Errors
    -Typo-Squatting
   Rogue Anti-Spyware
   Dialer
   Tracking Cookie
   Ransomware
   Social Engineering
     -Free giveaways of bundled apps
     -Deceptive installations
   Drive-by-Download
     -WMF exploit
     -CreateTextRangeexploit
     -Hostile ActiveX or Javascript
   Trojan Install
   Search Engine Results/ Sponsored Ads
   Continuous popups
   Persistent change in your homepage.
   Slower computer processing, takes the computer
    longer to process or startup.
   Internet browser does
    not start up.
   Parts of your computer
    you cannot access
    without freezing.
   Major core data is lost
    or changed.
   Polymorphism
   No-uninstall
   Active Defense with Reinstallation
   Rootkit
   Brand Obscurity
   Security Product Disabling
   Cool WebSearch
   Spy Sherriff via WMF Exploit
   Create TextRange Exploit Code
   Crypt. Aand Ransom.A
   Social Engineering
   TypoSquatting
   Preventing spyware from getting onto
    your computer is your first step!
      Do not download unnecessary software from the
       internet, especially free ones because they most likely have
       spyware inside them.
         If a download screen appears, asking you to confirm your
          download, click no if you not trying to install anything.
         Avoid clicking advertised popups especially ones that
          mention “free” stuff if possible.
   Technical Recommendations
       Some adware/spyware files like to hide in the temporary internet folders.
       Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary Internet
        Files Settings, Check Never under “Check for Newer Version of Stored Pages”.
       Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet Options, Delete
        Cookies and Delete Temporary Files.
       Remember though, adware and spyware can be tricky, no matter how cautious
        you are, there are bound to be adware or spyware programs that install into your
        computer.
         Always constantly scan your computer for adware and spyware and keep your
          Adware/Spyware killer programs fully updated at all times.
   Recommended Spyware/ Adware Killers without any restraints
       The “Tri-Killer” combination:
         Ad-aware 6.0 Professional Edition: Primary scanner
         Spy-sweeper paid version: Primary scanner and use their immune guards.
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
   Recommended Spyware/ Adware Killers with a price restraints
         Ad-aware 6.0 Free Edition: Primary Scanner
         Spy-Sweeper paid version: Primary Scanner
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
   Recommended Spyware/ Adware Killers with a time restraints
    (not recommended)
         Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
         Spybot Free Edition:
         Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
           restraints, turn on the scanners, leave them running and go do something.
How spyware hides and tracks users without consent
How spyware hides and tracks users without consent

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Malware
MalwareMalware
Malware
 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
malware
malware malware
malware
 
Mobile security
Mobile security Mobile security
Mobile security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
spyware
spywarespyware
spyware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Mobile security
Mobile securityMobile security
Mobile security
 
La complessità del malware: analisi strutturale ed ambienti di sviluppo
La complessità del malware: analisi strutturale ed ambienti di sviluppoLa complessità del malware: analisi strutturale ed ambienti di sviluppo
La complessità del malware: analisi strutturale ed ambienti di sviluppo
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
What is malware
What is malwareWhat is malware
What is malware
 

Destaque

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alamsahibe alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)WCN Transmedia Group
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Brent Csutoras
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 

Destaque (20)

Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Freenet
FreenetFreenet
Freenet
 
Smart memories
Smart memoriesSmart memories
Smart memories
 

Semelhante a How spyware hides and tracks users without consent

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 

Semelhante a How spyware hides and tracks users without consent (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 

Último

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 

Último (20)

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 

How spyware hides and tracks users without consent

  • 1. PEEYUSH SHARMA 3rd NOVEMBER,2011
  • 2.
  • 3. Spyware programs have a tendency to hide as cookie or temporary internet files  Broad Definition -Software that is installed on my PC without my full understanding and permission  Narrow Definition -Software that specifically tracks my personal information without my full understanding and permission
  • 4. SPYWARE ENTRY  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party  Violating your privacy.  And is a completely LEGAL program!
  • 5.
  • 6. Spyware  Virus  Program  File  Commercial  Academic  Revenue  Fame  Dynamic but  Replication stationary  Destructive  Consume Resources  Sometimes Wanted  Never Desired VS
  • 7. 1 in 5 got attacked electronically -Down from 35% in 2005  Virus and Worm infection most common attack  More public sector attack reports than private sector  Of those reporting trojan/rootkitattack 60% were public sector and 40% were private sector
  • 8. 61%of all PCs scanned had Spyware (down from 80% in 2004 study)  96%of PC users are aware of Spyware  The average PC has 93 Spyware componentson it.  54%of infected users were unaware of the Spyware found on their machines (down from 89% in 2004 study)  95%of infected users did not give permission for the software identified to be installed on their machines  20%of calls to Dell’s helpdesk are Spyware related (source: Dell)  Microsoft estimates that 50%of all PC crashes are a result of Spyware (Source:InformationWeek April 26, 2004)
  • 9. Adware is created by real businesses -They have business plans, sophisticated development groups, and venture capital -They generate revenue  Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and sophisticated development groups -They generate revenue  Competition! They all want your desktop.
  • 10. Personal Identifiable Information collection -Identity theft = revenue  Personal Information collection -Surfing habits = revenue  Click-through revenue  Software Sales revenue  SPAM propagation -Sales Revenue The bottom line is the bottom line $$$.
  • 11. Adware  BHO  Keylogger  Hijacker -Browser -Homepage -Errors -Typo-Squatting  Rogue Anti-Spyware  Dialer  Tracking Cookie  Ransomware
  • 12. Social Engineering -Free giveaways of bundled apps -Deceptive installations  Drive-by-Download -WMF exploit -CreateTextRangeexploit -Hostile ActiveX or Javascript  Trojan Install  Search Engine Results/ Sponsored Ads
  • 13. Continuous popups  Persistent change in your homepage.  Slower computer processing, takes the computer longer to process or startup.
  • 14. Internet browser does not start up.  Parts of your computer you cannot access without freezing.  Major core data is lost or changed.
  • 15. Polymorphism  No-uninstall  Active Defense with Reinstallation  Rootkit  Brand Obscurity  Security Product Disabling
  • 16. Cool WebSearch  Spy Sherriff via WMF Exploit  Create TextRange Exploit Code  Crypt. Aand Ransom.A  Social Engineering  TypoSquatting
  • 17. Preventing spyware from getting onto your computer is your first step!  Do not download unnecessary software from the internet, especially free ones because they most likely have spyware inside them.  If a download screen appears, asking you to confirm your download, click no if you not trying to install anything.  Avoid clicking advertised popups especially ones that mention “free” stuff if possible.
  • 18. Technical Recommendations  Some adware/spyware files like to hide in the temporary internet folders.  Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”.  Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files.  Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer.  Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times.
  • 19. Recommended Spyware/ Adware Killers without any restraints  The “Tri-Killer” combination:  Ad-aware 6.0 Professional Edition: Primary scanner  Spy-sweeper paid version: Primary scanner and use their immune guards.  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.  Recommended Spyware/ Adware Killers with a price restraints  Ad-aware 6.0 Free Edition: Primary Scanner  Spy-Sweeper paid version: Primary Scanner  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed  Recommended Spyware/ Adware Killers with a time restraints (not recommended)  Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode  Spybot Free Edition:  Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something.