SlideShare uma empresa Scribd logo
1 de 21
PEEYUSH     SHARMA
  3rd NOVEMBER,2011
   Spyware programs have a tendency to hide as
    cookie or temporary internet files

   Broad Definition
     -Software that is installed on my PC without
    my full understanding and permission
   Narrow Definition
      -Software that specifically tracks my personal
    information without my full understanding
    and permission
SPYWARE         ENTRY
   Advertising companies uses
    spyware to “mine data” to
    further help them advertise
    better.
   Uses your Internet
    connection and reports
    statistical data about you and
    your surfing habits a 3rd
    party
   Violating your privacy.
   And is a completely LEGAL
    program!
   Spyware              Virus
   Program                File
   Commercial             Academic
   Revenue                Fame
   Dynamic but
                           Replication
    stationary
                           Destructive
   Consume Resources
   Sometimes Wanted       Never Desired VS
   1 in 5 got attacked electronically
     -Down from 35% in 2005
   Virus and Worm infection most common attack
   More public sector attack reports than private sector
   Of those reporting trojan/rootkitattack 60% were
    public sector and 40% were private sector
   61%of all PCs scanned had Spyware (down from 80%
    in 2004 study)
   96%of PC users are aware of Spyware
   The average PC has 93 Spyware componentson it.
   54%of infected users were unaware of the Spyware
    found on their machines (down from 89% in 2004
    study)
   95%of infected users did not give permission for the
    software identified to be installed on their machines
   20%of calls to Dell’s helpdesk are Spyware related
    (source: Dell)
   Microsoft estimates that 50%of all PC crashes are a
    result of Spyware (Source:InformationWeek April 26,
    2004)
   Adware is created by real businesses
      -They have business plans, sophisticated
    development groups, and venture capital
      -They generate revenue
   Spyware is created by real businesses (and
    sometimes.. organized crime)
    -They have business plans, and sophisticated
    development groups
     -They generate revenue
   Competition! They all want your desktop.
    Personal Identifiable Information collection
     -Identity theft = revenue
    Personal Information collection
     -Surfing habits = revenue
    Click-through revenue
    Software Sales revenue
    SPAM propagation
    -Sales Revenue

    The bottom line is the bottom line $$$.
   Adware
   BHO
   Keylogger
   Hijacker
    -Browser
    -Homepage
    -Errors
    -Typo-Squatting
   Rogue Anti-Spyware
   Dialer
   Tracking Cookie
   Ransomware
   Social Engineering
     -Free giveaways of bundled apps
     -Deceptive installations
   Drive-by-Download
     -WMF exploit
     -CreateTextRangeexploit
     -Hostile ActiveX or Javascript
   Trojan Install
   Search Engine Results/ Sponsored Ads
   Continuous popups
   Persistent change in your homepage.
   Slower computer processing, takes the computer
    longer to process or startup.
   Internet browser does
    not start up.
   Parts of your computer
    you cannot access
    without freezing.
   Major core data is lost
    or changed.
   Polymorphism
   No-uninstall
   Active Defense with Reinstallation
   Rootkit
   Brand Obscurity
   Security Product Disabling
   Cool WebSearch
   Spy Sherriff via WMF Exploit
   Create TextRange Exploit Code
   Crypt. Aand Ransom.A
   Social Engineering
   TypoSquatting
   Preventing spyware from getting onto
    your computer is your first step!
      Do not download unnecessary software from the
       internet, especially free ones because they most likely have
       spyware inside them.
         If a download screen appears, asking you to confirm your
          download, click no if you not trying to install anything.
         Avoid clicking advertised popups especially ones that
          mention “free” stuff if possible.
   Technical Recommendations
       Some adware/spyware files like to hide in the temporary internet folders.
       Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary Internet
        Files Settings, Check Never under “Check for Newer Version of Stored Pages”.
       Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet Options, Delete
        Cookies and Delete Temporary Files.
       Remember though, adware and spyware can be tricky, no matter how cautious
        you are, there are bound to be adware or spyware programs that install into your
        computer.
         Always constantly scan your computer for adware and spyware and keep your
          Adware/Spyware killer programs fully updated at all times.
   Recommended Spyware/ Adware Killers without any restraints
       The “Tri-Killer” combination:
         Ad-aware 6.0 Professional Edition: Primary scanner
         Spy-sweeper paid version: Primary scanner and use their immune guards.
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
   Recommended Spyware/ Adware Killers with a price restraints
         Ad-aware 6.0 Free Edition: Primary Scanner
         Spy-Sweeper paid version: Primary Scanner
         Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
   Recommended Spyware/ Adware Killers with a time restraints
    (not recommended)
         Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
         Spybot Free Edition:
         Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
           restraints, turn on the scanners, leave them running and go do something.
How spyware hides and tracks users without consent
How spyware hides and tracks users without consent

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus part2
Virus part2Virus part2
Virus part2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Nessus Basics
Nessus BasicsNessus Basics
Nessus Basics
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating system
 
Android Malware Detection Mechanisms
Android Malware Detection MechanismsAndroid Malware Detection Mechanisms
Android Malware Detection Mechanisms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus y antivirus informaticos
Virus y antivirus informaticosVirus y antivirus informaticos
Virus y antivirus informaticos
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
computer Virus
computer Virus computer Virus
computer Virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Destaque

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alamsahibe alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)WCN Transmedia Group
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Brent Csutoras
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 

Destaque (20)

Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
ANTI-PIRACY DIGITAL MEDIA FORMAT (APDMF)
 
Spyware
SpywareSpyware
Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015Long Term Success with Reddit - Pubcon 2015
Long Term Success with Reddit - Pubcon 2015
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Freenet
FreenetFreenet
Freenet
 

Semelhante a How spyware hides and tracks users without consent

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 

Semelhante a How spyware hides and tracks users without consent (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 

Último

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Último (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

How spyware hides and tracks users without consent

  • 1. PEEYUSH SHARMA 3rd NOVEMBER,2011
  • 2.
  • 3. Spyware programs have a tendency to hide as cookie or temporary internet files  Broad Definition -Software that is installed on my PC without my full understanding and permission  Narrow Definition -Software that specifically tracks my personal information without my full understanding and permission
  • 4. SPYWARE ENTRY  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party  Violating your privacy.  And is a completely LEGAL program!
  • 5.
  • 6. Spyware  Virus  Program  File  Commercial  Academic  Revenue  Fame  Dynamic but  Replication stationary  Destructive  Consume Resources  Sometimes Wanted  Never Desired VS
  • 7. 1 in 5 got attacked electronically -Down from 35% in 2005  Virus and Worm infection most common attack  More public sector attack reports than private sector  Of those reporting trojan/rootkitattack 60% were public sector and 40% were private sector
  • 8. 61%of all PCs scanned had Spyware (down from 80% in 2004 study)  96%of PC users are aware of Spyware  The average PC has 93 Spyware componentson it.  54%of infected users were unaware of the Spyware found on their machines (down from 89% in 2004 study)  95%of infected users did not give permission for the software identified to be installed on their machines  20%of calls to Dell’s helpdesk are Spyware related (source: Dell)  Microsoft estimates that 50%of all PC crashes are a result of Spyware (Source:InformationWeek April 26, 2004)
  • 9. Adware is created by real businesses -They have business plans, sophisticated development groups, and venture capital -They generate revenue  Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and sophisticated development groups -They generate revenue  Competition! They all want your desktop.
  • 10. Personal Identifiable Information collection -Identity theft = revenue  Personal Information collection -Surfing habits = revenue  Click-through revenue  Software Sales revenue  SPAM propagation -Sales Revenue The bottom line is the bottom line $$$.
  • 11. Adware  BHO  Keylogger  Hijacker -Browser -Homepage -Errors -Typo-Squatting  Rogue Anti-Spyware  Dialer  Tracking Cookie  Ransomware
  • 12. Social Engineering -Free giveaways of bundled apps -Deceptive installations  Drive-by-Download -WMF exploit -CreateTextRangeexploit -Hostile ActiveX or Javascript  Trojan Install  Search Engine Results/ Sponsored Ads
  • 13. Continuous popups  Persistent change in your homepage.  Slower computer processing, takes the computer longer to process or startup.
  • 14. Internet browser does not start up.  Parts of your computer you cannot access without freezing.  Major core data is lost or changed.
  • 15. Polymorphism  No-uninstall  Active Defense with Reinstallation  Rootkit  Brand Obscurity  Security Product Disabling
  • 16. Cool WebSearch  Spy Sherriff via WMF Exploit  Create TextRange Exploit Code  Crypt. Aand Ransom.A  Social Engineering  TypoSquatting
  • 17. Preventing spyware from getting onto your computer is your first step!  Do not download unnecessary software from the internet, especially free ones because they most likely have spyware inside them.  If a download screen appears, asking you to confirm your download, click no if you not trying to install anything.  Avoid clicking advertised popups especially ones that mention “free” stuff if possible.
  • 18. Technical Recommendations  Some adware/spyware files like to hide in the temporary internet folders.  Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”.  Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files.  Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer.  Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times.
  • 19. Recommended Spyware/ Adware Killers without any restraints  The “Tri-Killer” combination:  Ad-aware 6.0 Professional Edition: Primary scanner  Spy-sweeper paid version: Primary scanner and use their immune guards.  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.  Recommended Spyware/ Adware Killers with a price restraints  Ad-aware 6.0 Free Edition: Primary Scanner  Spy-Sweeper paid version: Primary Scanner  Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed  Recommended Spyware/ Adware Killers with a time restraints (not recommended)  Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode  Spybot Free Edition:  Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something.