Spyware: Protecting Yourself from the Cyber Peeping

Total Page:16

File Type:pdf, Size:1020Kb

Spyware: Protecting Yourself from the Cyber Peeping by Jen Sharp JenSharp.com Spyware: protecting yourself from the Cyber Peeping Tom n April 2005, a company called Direct Revenue released a spyware program called Aurora that sent so many pop up ads that it paralyzed thousands of Icomputers. 43% of Internet users have been hit with spyware. A typical unprotected PC will come under attack within 20 minutes of being connected to the internet. What is spyware? Spyware is software acquired from the internet installed onto computers without the user’s full knowledge or permission. Usually this software is also unwanted. Some spyware can be annoying but harmless, such as adware, which displays ads based on the user’s browsing habits. In theory, disclaimer to either enter an area What’s the solution? adware is about old fashioned or download free software, you advertising: free It’s not enough to have an anti- inadvertently agree to spyware software in virus program to make up the gap downloads. Online gaming sites exchange for where your operating system fails. displaying ads. However, in Malware is a form of spyware that is not as innocuous. reality, adware has become more This type demonstrates illegal, viral, fraudulent, or about deceptive practices that malicious behavior. alienate consumers. and adult areas are particularly Malware is a In May, a huge security flaw was subject to spyware. Jen Sharp form of spyware discovered in Symantec’s Anti- JenSharp.com that is not as Attacking software can execute Virus Suite, the leading anti- innocuous. This type demonstrates code without the user clicking or computer virus software. It was illegal, viral, fraudulent, or opening anything. Some of the addressed immediately, but this malicious behavior. most recent malware is nearly event signifies how spyware and impossible to remove. Spyware malware is an ever-evolving What’s the danger? exploits faults in operating problem. Spyware comes to your systems that inadvertently allow It’s also not enough to have a computer in the form of free control to a program instead of the built-in firewall in your machine software, free music downloads, user. Microsoft’s Windows OS are or broadband routers. Non- and from file sharing networks. particularly vulnerable, although software firewalls can be turned Although rare, it can also come in their upcoming version called off, configured incorrectly, and are an e-mail attachment. Often, when Vista is addressing this huge also not the most current you are presented with a policy or security issue. information fighting the newest 16 THE KANSAS LIFELINE November 2006 ways spyware circumvents /security/spyware/software/msft/a security. Five Evaluation Criteria nalysis.mspx Disconnecting from the FromFive Evaluation CriteriaMicrosoft’s researchers use the internet when not using it coupled http://www.microsoft.com/athome with an anti-spyware program From: targeted specifically for http://www.microsoft.com/athome/security/spyware/software/msft/analysis.mspx eliminating spyware is the best solution. Free software is Microsoft’s researchers use the following categories to determine whether to add a program to the definition library for detection, available online that is sufficient what classification type, risk level and recommendation to give it. for protection, so there is no excuse! These companies would • Deceptive behaviors. Runs processes or programs on the love to sell you an upgraded user’s computer without notifying the user and getting the product, but their basic free user’s consent. Prevents users from controlling the actions versions are excellent. Here are taken by the program while it runs on the computer. Prevents three suggestions for both free and users from uninstalling or removing the program. subscription based software: • Privacy. Collects, uses, or communicates the user’s personal • ZoneAlarm by Zone Labs information and behaviors (such as Web browsing habits) www.zonelabs.com (free without explicit consent. version and trials for other versions) • Security. Attempts to circumvent or disable the security • AVG Free Edition by Grisoft features on the user’s computer, or otherwise compromises the www.grisoft.com (free computer’s security. software with no subscription • Performance. Undermines performance, reliability, and quality fees, free updates) of the user’s computing experience with slow computer speed, • Norton’s Internet Security reduced productivity, or corruption of the operating system. by Symantec www.symantec.com (yearly • Industry and consumer opinion. Considers the input from subscription with updates) software industry and individual users as a key factor to help identify new behaviors and programs that might present risks to the user’s computing experience. The Pew Internet and American Life Project Study July 2005, from random telephone- based interviews with 2,001 adult Americans; sampling error +/- 2% • 43% of internet users have been affected adversely by spyware, adware or both • 91% have made some sort of behavioral change • 48% stopped visiting specific sites they fear harboring spyware • 25% stopped using file-sharing software • 18% switched from Microsoft’s Internet Explorer to Mozilla Firefox • 81% have been more cautious about e-mail attachments • 20% of cases where fixes were attempted on an infected machine, the problem could NOT be fixed November 2006 THE KANSAS LIFELINE 17.
Recommended publications
  • Operating Systems and Virtualisation Security Knowledge Area (Draft for Comment)
    OPERATING SYSTEMS AND VIRTUALISATION SECURITY KNOWLEDGE AREA (DRAFT FOR COMMENT) AUTHOR: Herbert Bos – Vrije Universiteit Amsterdam EDITOR: Andrew Martin – Oxford University REVIEWERS: Chris Dalton – Hewlett Packard David Lie – University of Toronto Gernot Heiser – University of New South Wales Mathias Payer – École Polytechnique Fédérale de Lausanne © Crown Copyright, The National Cyber Security Centre 2019. Following wide community consultation with both academia and industry, 19 Knowledge Areas (KAs) have been identified to form the scope of the CyBOK (see diagram below). The Scope document provides an overview of these top-level KAs and the sub-topics that should be covered under each and can be found on the project website: https://www.cybok.org/. We are seeking comments within the scope of the individual KA; readers should note that important related subjects such as risk or human factors have their own knowledge areas. It should be noted that a fully-collated CyBOK document which includes issue 1.0 of all 19 Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas. Operating Systems and Virtualisation Security Herbert Bos Vrije Universiteit Amsterdam April 2019 INTRODUCTION In this knowledge area, we introduce the principles, primitives and practices for ensuring security at the operating system and hypervisor levels. We shall see that the challenges related to operating system security have evolved over the past few decades, even if the principles have stayed mostly the same. For instance, when few people had their own computers and most computing was done on multiuser (often mainframe-based) computer systems with limited connectivity, security was mostly focused on isolating users or classes of users from each other1.
    [Show full text]
  • Malware Information
    Malware Information Source: www.onguardonline.gov Malware Quick Facts Malware, short for "malicious software," includes viruses and spyware to steal personal information, send spam, and commit fraud. Criminals create appealing websites, desirable downloads, and compelling stories to lure you to links that will download malware – especially on computers that don't use adequate security software. But you can minimize the havoc that malware can wreak and reclaim your computer and electronic information. If you suspect malware is on your computer: • Stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. • Confirm that your security software is active and current. At a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. • Once your security software is up-to-date, run it to scan your computer for viruses and spyware, deleting anything the program identifies as a problem. • If you suspect your computer is still infected, you may want to run a second anti-virus or anti-spyware program – or call in professional help. • Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. Malware is short for "malicious software;" it includes viruses – programs that copy themselves without your permission – and spyware, programs installed without your consent to monitor or control your computer activity. Criminals are hard at work thinking up creative ways to get malware on your computer. They create appealing web sites, desirable downloads, and compelling stories to lure you to links that will download malware, especially on computers that don't use adequate security software.
    [Show full text]
  • The Spyware Used in Intimate Partner Violence
    The Spyware Used in Intimate Partner Violence Rahul Chatterjee∗, Periwinkle Doerflery, Hadas Orgadz, Sam Havronx, Jackeline Palmer{, Diana Freed∗, Karen Levyx, Nicola Dell∗, Damon McCoyy, Thomas Ristenpart∗ ∗ Cornell Tech y New York University z Technion x Cornell University { Hunter College Abstract—Survivors of intimate partner violence increasingly are decidedly depressing. We therefore also discuss a variety report that abusers install spyware on devices to track their of directions for future work. location, monitor communications, and cause emotional and physical harm. To date there has been only cursory investigation Finding IPS spyware. We hypothesize that most abusers find into the spyware used in such intimate partner surveillance (IPS). spyware by searching the web or application stores (mainly, We provide the first in-depth study of the IPS spyware ecosystem. Google Play Store or Apple’s App Store). We therefore We design, implement, and evaluate a measurement pipeline that combines web and app store crawling with machine learning to started by performing a semi-manual crawl of Google search find and label apps that are potentially dangerous in IPS contexts. results. We searched for a small set of terms (e.g., “track my Ultimately we identify several hundred such IPS-relevant apps. girlfriend’s phone without them knowing”). In addition to the While we find dozens of overt spyware tools, the majority are results, we collected Google’s suggestions for similar searches “dual-use” apps — they have a legitimate purpose (e.g., child to seed further searches. The cumulative results (over 27,000+ safety or anti-theft), but are easily and effectively repurposed returned URLs) reveal a wide variety of resources aimed at for spying on a partner.
    [Show full text]
  • Mcafee Potentially Unwanted Programs (PUP) Policy March, 2018
    POLICY McAfee Potentially Unwanted Programs (PUP) Policy March, 2018 McAfee recognizes that legitimate technologies such as commercial, shareware, freeware, or open source products may provide a value or benefit to a user. However, if these technologies also pose a risk to the user or their system, then users should consent to the behaviors exhibited by the software, understand the risks, and have adequate control over the technology. McAfee refers to technologies with these characteristics as “potentially unwanted program(s),” or “PUP(s).” The McAfee® PUP detection policy is based on the process includes assessing the risks to privacy, security, premise that users should understand what is being performance, and stability associated with the following: installed on their systems and be notified when a ■ Distribution: how users obtain the software including technology poses a risk to their system or privacy. advertisements, interstitials, landing-pages, linking, PUP detection and removal is intended to provide and bundling notification to our users when a software program or technology lacks sufficient notification or control over ■ Installation: whether the user can make an informed the software or fails to adequately gain user consent to decision about the software installation or add- the risks posed by the technology. McAfee Labs is the ons and can adequately back out of any undesired McAfee team responsible for researching and analyzing installations technologies for PUP characteristics. ■ Run-Time Behaviors: the behaviors exhibited by the technology including advertisements, deception, and McAfee Labs evaluates technologies to assess any impacts to privacy and security risks exhibited by the technology against the degree of user notification and control over the technology.
    [Show full text]
  • E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It Is a Process of Presenting and Detecting Unauthorized Use of Your Computer
    36 E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It is a process of presenting and detecting unauthorized use of your computer. Prevention is measures help you stop unauthorized users (hackers) System often they want to gain control of your computer so they can use it to launch attack on other computer systems. Need for computer security Threats & Count measures Introduction to Cryptography Authentication and integrity Key Management Security in Practice – secure email & SMTP User Identification Trusted Computer System CMW SECMAN standards. The Importance of computer security: A computer security its very important, primarily to keep your information protected. Its also important for your computer overall health, helping to prevent various and malware and allowing program to run more smoothly. Computer Security – Why? Information is a strategic resource. A Significant portion of organizational budget is spent on managing information. Have several security related objectives. Threats to information security. The Security addressed here to general areas: Secure file / information transfers, including secure transactions. Security of information’s as stored on Internet – connected hosts. Secure enterprise networks, when used to support web commerce. Protecting Resources: The term computer and network security refers in a board sense to confidence that information and services available on a network cannot be accessed by unauthorized users. Security implies safety, including assurance to data integrity, freedom from unauthorized access, freedom snooping or wiretapping and freedom from distribution of service. Reasons for information security The requirements of information’s security in an organization have undergone two major changes in the last several decades. Types of Risks As the number of peoples utilizing the internet increases, the risks of security violations increases, with it.
    [Show full text]
  • Operating Systems & Virtualisation Security Knowledge Area
    Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels.
    [Show full text]
  • (Malicious Software) Installed on Your Computer Without Your Consent to Monitor Or Control Your Computer Use
    Spyware is a type of malware (malicious software) installed on your computer without your consent to monitor or control your computer use. Clues that spyware is on a computer may include a barrage of pop-ups, a browser that takes you to sites you don't want, unexpected toolbars or icons on your computer screen, keys that don't work, random error messages, and sluggish performance when opening programs or saving files. In some cases, there may be no symptoms at all. While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can: Collect information stored on the computer or attached network drives, Collect various types of personal information, such as Internet surfing habits, sites that have been visited Collect user names and passwords stored on your computer as well as those entered from the keyboard. Interfere with user control of the computer Install additional software on the computer Redirect Web browser activity. Change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. The best defense against spyware and other unwanted software is not to download it in the first place. Here are a few helpful tips that can protect you from downloading software you don't want: Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads. Use anti-virus and anti-spyware, as well as a firewall software, and update them all regularly.
    [Show full text]
  • Operating System Security – a Short Note
    Operating System Security – A Short Note 1,2Mr. Kunal Abhishek, 2Dr. E. George Dharma Prakash Raj 1Society for Electronic Transactions and Security (SETS), Chennai 2Bharathidasan University, Trichy [email protected], [email protected] 1. Introduction An Operating System (OS) is viewed as a Reference Monitor (RM) or a Reference Validation Mechanism (RVM) that provides basic level security. In [1], Anderson reported three design requirements for a Reference Monitor or Operating System. He suggested that an OS or RM should be tamper proof that means OS programs are not alterable, OS should always be invoked and OS must be small enough for analysis and testing purposes so that completeness of which can be assured. These OS design requirements became the deriving principle of OS development. A wide range of operating systems follow Anderson’s design principles in modern time. It was also observed in [2] that most of the attacks are imposed either on OS itself or on the programs running on the OS. The attacks on OS can be mitigated through formal verification to a great extent which prove the properties of OS code on various criteria like safeness, reliability, validity and completeness etc. Also, formal verification of OS is an intricate task which is feasible only when RVM or RM is small enough for analysis and testing within a reasonable time frame. Other way of attacking an OS is to attack the programs like device drivers running on top of it and subsequently inject malware through these programs interfacing with the OS. Thus, a malware can be injected in to the sensitive kernel code to make OS malfunction.
    [Show full text]
  • Welcome to the Jungle:1 the State Privacy Implications of Spam, Phishing and Spyware
    February 2005 Welcome to the Jungle:1 The State Privacy Implications of Spam, Phishing and Spyware Section I: An Overview It’s a Jungle Out There: In an environment in which 53% of all reported fraud complaints to the Federal Trade Commission (FTC) in 2004 were Internet-related, the Internet and email threats of spam, phishing and spyware all are real threats with real consequences.2 They are increasingly used by criminals, instead of just novice teenage hackers3 and can be lucrative alone or in furthering a larger criminal enterprise. Armed with these incentives, spammers, phishers and spyware purveyors are motivated and possess the expertise to avoid the attempts of law enforcement, industry and others to bring these threats in hand. Moreover, while banks, financial institutions, ISPs (Internet Service Providers) and even online auction site users have borne the initial brunt of threats like phishing, other sectors are becoming targets as the first wave of targeted sectors puts in place more effective security measures. This could place government and citizen information at risk of unauthorized disclosure and could lead to serious consequences, such as the release of sensitive homeland security and critical infrastructure information or personal information that could result in identity theft. In addition, spam, phishing and spyware infringe upon citizens’ perceived “right to be left alone” while surfing the Internet and using email. The fact that so many individuals’ privacy has been impacted to varying extents by these threats has compounded their significance. For example, a 2004 phishing attack spoofed4 an email from the FDIC (Federal Deposit Insurance Corporation).
    [Show full text]
  • Coalition for Academic Scientific Computation C A
    Coalition for Academic Scientific Computation C A S C Advancing High Performance Computation and Communication through Collaboration Coalition for Academic Scientific Computation is a nonprofit organization of supercomputing centers and CASC research universities that offer leading edge hardware, software, and expertise in high performance computing resources and “advanced visualization environments.” Founded in 1989, CASC has grown into a national association representing 35 centers and programs in 22 states. Working individually and together, coalition members complement traditional methods of laboratory and theoretical investigation by using high performance computers to simulate natural phenomena and environmental threats, handle and analyze data and create images – all at performance levels not available from smaller computers. By applying the technology, CASC members help extend the state of the art to achieve the scientific, technical, and information management breakthroughs that will keep the U.S. in the forefront of the 21st century IT revolution. Coalition members are involved in activities that foster major advances for virtually every element of society. The range of these efforts encompasses: ♦ Aiding in Homeland Security ♦ Accessing Information ♦ Improving Health Care ♦ Conducting Research ♦ Combating Cyber-Terrorism ♦ Enhancing Education ♦ Innovating in Design and Construction ♦ Understanding the Environment ♦ Preparing for Bio-Terrorism ♦ Advancing Bioinformatics 1 Coalition for Academic Scientific Computation Aiding in Homeland Security members are involved in a wide CASC range of activities supporting the Federal government in its efforts to develop and improve security measures to combat terrorism. ♦ The National Center for Supercomputing Applications (NCSA) has developed the Multi- Sector Crisis Management Consortium (MSCMC) at the University of Illinois at Urbana-Champaign. The MSCMC uses cutting edge technology to mitigate and respond to crises of national security and national disasters.
    [Show full text]
  • Download PDF Helpful Tips If Your Device Or Online
    Keep Your Business Safe Helpful tips if your device or online accounts are hacked A compromised computer or device could be disastrous for your organization if you aren’t prepared. Here are some helpful tips to keep your business safe. Isolate your device(s) and Backup Your Important Files disconnect them from the internet Copy your photos, documents, media and other To sever the connection the hacker is using to personal files to a DVD, CD or other storage device. access your computer and/or devices, you may need Even if you think everything is clean, always scan your to disconnect from the internet. Unplug the data files prior to reintroducing them back into your network cable from your PC and turn off the Wi-Fi system. connection. If you still have doubts, contact your anti-virus Many laptops have a switch to turn the Wi-Fi off. software provider or a computer specialist Don't rely on doing this through software, as the Be cautious when calling telephone numbers for hacker's malware may tell you something is turned technical support specialists that you find online. off when it’s actually still connected. If you’re using a Scam artists sometimes set up authentic-looking smart phone or tablet, turn on airplane mode. Make websites that may appear to be affiliated with your sure your network and devices are secure and avoid computer’s manufacturer. When consumers call these using public computers or Wi-Fi hotspots. Isolating entities, they are often told they must pay hundreds of infected devices will prevent them from being used dollars for their computer to be fixed.
    [Show full text]
  • Protect Your Computer from Viruses, Hackers, & Spies
    Protect Your Computer from Viruses, Hackers, & Spies Tips for Consumers Consumer Information Sheet 12 • January 2015 Today we use our computers to do so many things. We go online to search for information, shop, bank, do homework, play games, and stay in touch with family and friends. As a result, our com- puters contain a wealth of personal information about us. This may include banking and other financial records, and medical information – information that we want to protect. If your computer is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information. Spammers could use your computer as a “zombie drone” to send spam that looks like it came from you. Malicious viruses or spyware could be deposited on your computer, slowing it down or destroying files. By using safety measures and good practices to protect your home computer, you can protect your privacy and your family. The following tips are offered to help you lower your risk while you’re online. 3 Install a Firewall 3 Use Anti-virus Software A firewall is a software program or piece of Anti-virus software protects your computer hardware that blocks hackers from entering from viruses that can destroy your data, slow and using your computer. Hackers search the down or crash your computer, or allow spammers Internet the way some telemarketers automati- to send email through your account. Anti-virus cally dial random phone numbers. They send protection scans your computer and your out pings (calls) to thousands of computers incoming email for viruses, and then deletes and wait for responses.
    [Show full text]