Spyware: Protecting Yourself from the Cyber Peeping
Total Page:16
File Type:pdf, Size:1020Kb
by Jen Sharp JenSharp.com Spyware: protecting yourself from the Cyber Peeping Tom n April 2005, a company called Direct Revenue released a spyware program called Aurora that sent so many pop up ads that it paralyzed thousands of Icomputers. 43% of Internet users have been hit with spyware. A typical unprotected PC will come under attack within 20 minutes of being connected to the internet. What is spyware? Spyware is software acquired from the internet installed onto computers without the user’s full knowledge or permission. Usually this software is also unwanted. Some spyware can be annoying but harmless, such as adware, which displays ads based on the user’s browsing habits. In theory, disclaimer to either enter an area What’s the solution? adware is about old fashioned or download free software, you advertising: free It’s not enough to have an anti- inadvertently agree to spyware software in virus program to make up the gap downloads. Online gaming sites exchange for where your operating system fails. displaying ads. However, in Malware is a form of spyware that is not as innocuous. reality, adware has become more This type demonstrates illegal, viral, fraudulent, or about deceptive practices that malicious behavior. alienate consumers. and adult areas are particularly Malware is a In May, a huge security flaw was subject to spyware. Jen Sharp form of spyware discovered in Symantec’s Anti- JenSharp.com that is not as Attacking software can execute Virus Suite, the leading anti- innocuous. This type demonstrates code without the user clicking or computer virus software. It was illegal, viral, fraudulent, or opening anything. Some of the addressed immediately, but this malicious behavior. most recent malware is nearly event signifies how spyware and impossible to remove. Spyware malware is an ever-evolving What’s the danger? exploits faults in operating problem. Spyware comes to your systems that inadvertently allow It’s also not enough to have a computer in the form of free control to a program instead of the built-in firewall in your machine software, free music downloads, user. Microsoft’s Windows OS are or broadband routers. Non- and from file sharing networks. particularly vulnerable, although software firewalls can be turned Although rare, it can also come in their upcoming version called off, configured incorrectly, and are an e-mail attachment. Often, when Vista is addressing this huge also not the most current you are presented with a policy or security issue. information fighting the newest 16 THE KANSAS LIFELINE November 2006 ways spyware circumvents /security/spyware/software/msft/a security. Five Evaluation Criteria nalysis.mspx Disconnecting from the FromFive Evaluation CriteriaMicrosoft’s researchers use the internet when not using it coupled http://www.microsoft.com/athome with an anti-spyware program From: targeted specifically for http://www.microsoft.com/athome/security/spyware/software/msft/analysis.mspx eliminating spyware is the best solution. Free software is Microsoft’s researchers use the following categories to determine whether to add a program to the definition library for detection, available online that is sufficient what classification type, risk level and recommendation to give it. for protection, so there is no excuse! These companies would • Deceptive behaviors. Runs processes or programs on the love to sell you an upgraded user’s computer without notifying the user and getting the product, but their basic free user’s consent. Prevents users from controlling the actions versions are excellent. Here are taken by the program while it runs on the computer. Prevents three suggestions for both free and users from uninstalling or removing the program. subscription based software: • Privacy. Collects, uses, or communicates the user’s personal • ZoneAlarm by Zone Labs information and behaviors (such as Web browsing habits) www.zonelabs.com (free without explicit consent. version and trials for other versions) • Security. Attempts to circumvent or disable the security • AVG Free Edition by Grisoft features on the user’s computer, or otherwise compromises the www.grisoft.com (free computer’s security. software with no subscription • Performance. Undermines performance, reliability, and quality fees, free updates) of the user’s computing experience with slow computer speed, • Norton’s Internet Security reduced productivity, or corruption of the operating system. by Symantec www.symantec.com (yearly • Industry and consumer opinion. Considers the input from subscription with updates) software industry and individual users as a key factor to help identify new behaviors and programs that might present risks to the user’s computing experience. The Pew Internet and American Life Project Study July 2005, from random telephone- based interviews with 2,001 adult Americans; sampling error +/- 2% • 43% of internet users have been affected adversely by spyware, adware or both • 91% have made some sort of behavioral change • 48% stopped visiting specific sites they fear harboring spyware • 25% stopped using file-sharing software • 18% switched from Microsoft’s Internet Explorer to Mozilla Firefox • 81% have been more cautious about e-mail attachments • 20% of cases where fixes were attempted on an infected machine, the problem could NOT be fixed November 2006 THE KANSAS LIFELINE 17.