SlideShare uma empresa Scribd logo
1 de 24
Mangesh A.
Wadibhasme
 What is Spyware?
 Spyware is a type of malware that's hard to detect.
 It collects information about your surfing habits,
browsing history, or personal information (such as
credit card numbers), and often uses the internet to
pass this information along to third parties without
you knowing.
 Key loggers are a type of spyware that
monitors your key strokes.
spyware is mostly used for the purposes of tracking and storing internet
users' movements on the web and serving up pop-up ads to internet users.
1.System monitors
2.Trojans 3.Adware
4.Tracking
Cookies
 Spyware is mostly classified into 4 types:-
 The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's
business model.
 Spyware at first denoted software meant for espionage purposes.
 However, in early 2000 the founder of zone labs, gregor freund, used the term in a
press release for the zone alarm personal firewall.
 Use of exploits in JavaScript, internet explorer and windows to install.
 History and development of spyware.
 Unwanted behavior and degradation of system performance.
 Unwanted CPU activity, disk usage, and network traffic.
 Stability issues:-
 Application's freezing.
 Failure to boot.
 System-wide crashes.
 Difficulty connecting to the internet.
 Disable software firewalls and anti-virus software.
 Effect and Behavior.
 Installed when you open an email attachment.
 Spyware installs itself
 Install by using deceptive tactics
 Common tactics are using a Trojan horse.
 USB Keylogger.
 browser forces the download and installation of spyware.
 Routes of Infection.
• Installing anti-spyware programs.
• Network firewalls and web proxies to block access to web sites known to install
spyware
• Individual users can also install firewalls.
• Install a large hosts file.
• It Install shareware programs offered for download.
• Downloading programs only from reputable sources can provide some
protection from this source of attack
 Security Practices.
 Anti-Spyware Program.
 Products dedicated to remove or
block spyware.
 Programs such as pc tool’s spyware
doctor, lava soft's ad-aware se and
patrick kolla's spybot - search &
destroy.
Antivirus 2009
Antivirus Gold
Contravirus
Macsweeper
Pest Trap
Psguard
Spy Wiper
Spydawn
Spylocked
Spysheriff
Spyshredder
Spyware Quake
Spywarestrike
Ultimatecleaner
Winantivirus Pro 2006
Windows Police Pro
Winfixer
Worldantispy
 Some known offenders
include:
 Rouge Anti - Spyware Program.
 popups prompting them to install them to protect their computer, this software is
called rogue software.
 do not install any freeware claiming to be anti-spyware unless it is verified to be
legitimate.
 Fake antivirus products constitute 15 percent of all malware.
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 A group of programs.
 Takes advantage of internet explorer
vulnerabilities.
 The package directs traffic to advertisements
on web sites including coolwebsearch.Com. It
displays pop-up ads.
 Rewrites search engine results, and alters the
infected computer's hosts file to direct DNS
lookups to these sites.
1). CoolWebSearch
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Sometimes called finspy.
 High-end surveillance suite sold to law
enforcement and intelligence agencies.
2).
FinFishe
r
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Wintools or adware.Websearch,
 Installed by an active-x drive-by download
at affiliate web sites.
 These programs add toolbars to ie.
 Track aggregate browsing behavior.
3). Huntbar
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Transmits detailed information to
advertisers about the web sites which
users visit.
 It opens pop-up ads that cover over
the web sites of competing companies
4). Zango
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Downloads itself to a computer via an
active-x code and reports information
back to control server.
 Some information can be the search-
history, the websites visited, and even
keystrokes.
5). Zango
Trojan
 Examples!!!!
 "Stealware" and affiliate fraud.
 Affiliate Fraud is a violation of the terms of services.
 Terminated from affiliate networks including linkshare and
sharesale.
 Mobile devices can also be vulnerable to chargeware.
 Applications.
 Identity theft and fraud
 Coolwebsearch.Com spyware had used it to transmit “chat
session user names, passwords", bank information, etc.
 The Federal Trade Commission estimates that 27.3 million
Americans have been victims of identity theft
 That financial losses from identity theft totaled nearly $48 billion
for businesses and financial institutions and at least $5 billion in
out-of-pocket expenses for individuals.
 Applications.
 Digital rights management
 It can be removed with the removewga tool.
 Some copy-protection technologies have borrowed from spyware
 While the main purpose of this deliberately uninstallable
application is to ensure the copy of windows on the machine was
lawfully purchased and installed.
 Applications.
 Personal relationships
 Used to monitor electronic activities of partners relationships.
 Loverspy, was specifically marketed for this purpose
 Depending on local laws regarding communal/marital property
 Observing a partner's online activity without their consent may be illegal
 Applications.
 Browser cookies
 Business purposes
 Anti-spyware programs often report web advertiser’s HTTP Cookies.
 The small text files that track browsing activity, as spyware
 Applications.
 Criminal law
 US FTC actions
 Netherlands OPTA
 Civil law
 Libel suits by spyware developers
 Webcam Gate
 Legal Issues.
Spyware presentation by mangesh wadibhasme

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Malicious
MaliciousMalicious
Malicious
 
Malware
MalwareMalware
Malware
 
What is malware
What is malwareWhat is malware
What is malware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
spyware
spywarespyware
spyware
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
Malware
MalwareMalware
Malware
 
Adware
AdwareAdware
Adware
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Destaque

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiInsideView
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Mikko Hypponen
 
Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Gianni Amato
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threatINSIGHT FORENSIC
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)INSIGHT FORENSIC
 

Destaque (20)

Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Rain technology
Rain technologyRain technology
Rain technology
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
SPYWARE
SPYWARESPYWARE
SPYWARE
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Distribution Training
Distribution TrainingDistribution Training
Distribution Training
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
 
Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 

Semelhante a Spyware presentation by mangesh wadibhasme

Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work GuideEduardo Chavarro
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 

Semelhante a Spyware presentation by mangesh wadibhasme (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 

Último

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Último (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Spyware presentation by mangesh wadibhasme

  • 2.  What is Spyware?  Spyware is a type of malware that's hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing.  Key loggers are a type of spyware that monitors your key strokes.
  • 3. spyware is mostly used for the purposes of tracking and storing internet users' movements on the web and serving up pop-up ads to internet users. 1.System monitors 2.Trojans 3.Adware 4.Tracking Cookies  Spyware is mostly classified into 4 types:-
  • 4.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  History and development of spyware.
  • 5.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application's freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Effect and Behavior.
  • 6.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Routes of Infection.
  • 7. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Security Practices.
  • 8.  Anti-Spyware Program.  Products dedicated to remove or block spyware.  Programs such as pc tool’s spyware doctor, lava soft's ad-aware se and patrick kolla's spybot - search & destroy.
  • 9. Antivirus 2009 Antivirus Gold Contravirus Macsweeper Pest Trap Psguard Spy Wiper Spydawn Spylocked Spysheriff Spyshredder Spyware Quake Spywarestrike Ultimatecleaner Winantivirus Pro 2006 Windows Police Pro Winfixer Worldantispy  Some known offenders include:  Rouge Anti - Spyware Program.  popups prompting them to install them to protect their computer, this software is called rogue software.  do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate.  Fake antivirus products constitute 15 percent of all malware.
  • 10.
  • 11. These common spyware programs illustrate the diversity of behaviors found in these attacks  A group of programs.  Takes advantage of internet explorer vulnerabilities.  The package directs traffic to advertisements on web sites including coolwebsearch.Com. It displays pop-up ads.  Rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites. 1). CoolWebSearch  Examples!!!!
  • 12. These common spyware programs illustrate the diversity of behaviors found in these attacks  Sometimes called finspy.  High-end surveillance suite sold to law enforcement and intelligence agencies. 2). FinFishe r  Examples!!!!
  • 13. These common spyware programs illustrate the diversity of behaviors found in these attacks  Wintools or adware.Websearch,  Installed by an active-x drive-by download at affiliate web sites.  These programs add toolbars to ie.  Track aggregate browsing behavior. 3). Huntbar  Examples!!!!
  • 14. These common spyware programs illustrate the diversity of behaviors found in these attacks  Transmits detailed information to advertisers about the web sites which users visit.  It opens pop-up ads that cover over the web sites of competing companies 4). Zango  Examples!!!!
  • 15. These common spyware programs illustrate the diversity of behaviors found in these attacks  Downloads itself to a computer via an active-x code and reports information back to control server.  Some information can be the search- history, the websites visited, and even keystrokes. 5). Zango Trojan  Examples!!!!
  • 16.
  • 17.  "Stealware" and affiliate fraud.  Affiliate Fraud is a violation of the terms of services.  Terminated from affiliate networks including linkshare and sharesale.  Mobile devices can also be vulnerable to chargeware.  Applications.
  • 18.  Identity theft and fraud  Coolwebsearch.Com spyware had used it to transmit “chat session user names, passwords", bank information, etc.  The Federal Trade Commission estimates that 27.3 million Americans have been victims of identity theft  That financial losses from identity theft totaled nearly $48 billion for businesses and financial institutions and at least $5 billion in out-of-pocket expenses for individuals.  Applications.
  • 19.  Digital rights management  It can be removed with the removewga tool.  Some copy-protection technologies have borrowed from spyware  While the main purpose of this deliberately uninstallable application is to ensure the copy of windows on the machine was lawfully purchased and installed.  Applications.
  • 20.  Personal relationships  Used to monitor electronic activities of partners relationships.  Loverspy, was specifically marketed for this purpose  Depending on local laws regarding communal/marital property  Observing a partner's online activity without their consent may be illegal  Applications.
  • 21.  Browser cookies  Business purposes  Anti-spyware programs often report web advertiser’s HTTP Cookies.  The small text files that track browsing activity, as spyware  Applications.
  • 22.
  • 23.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate  Legal Issues.