How to Protect Against Ransomware Attacks 24 May, 2017

Total Page:16

File Type:pdf, Size:1020Kb

How to Protect Against Ransomware Attacks 24 May, 2017 HOW TO PROTECT AGAINST RANSOMWARE ATTACKS 24 MAY, 2017 Visit us at www.ehr20.com [email protected] 866-276 8309 © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Disclaimer This session has been provided for educational and informational purposes only and is not intended and should not be construed to constitute legal advice. Please consult your attorneys in connection with any fact-specific situation under federal law and the applicable state or local laws that may impose additional obligations on you and your company. © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Who we are … EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education(Training, Webinar & E-Learning) Consulting Services Toolkit(Tools, Best Practices & Checklist) © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. About Craig Petronella • Top cybersecurity expert and IT authority in Raleigh, NC. • Author of multiple books, including How HIPAA Can Crush Your Medical Practice and Peace of Mind Computer Support. • 30+ years advising clients & protecting computer information. • Makes sure your business network works when you need it the most, and is a celebrity in his field and hometown. • Frequently quoted on ABC, CBS, NBC, News14, PRNews Wire, and Newsobserver.com for his expertise in protecting local businesses and medical practice owners from hackers halfway around the world in places such as Ukraine, Russia, and China. • Petronella Technology Group, Inc. is the creator of the only unique and proprietary, multi-layered security that guarantees 100% safety from zero-hour hackers. 100% hacker-proof security or we pay you $1,000. Guaranteed. WannaCry Update Consequences • Worldwide Cyberattack (300k+ orgs.) • Majority impact is on windows platform (Obsolete versions) • Ransom as bitcoin wallets ($90k collected) • Restoring from backup copies is the quickest workaround • Install software updates ASAP What is Cybersecurity? Like all things digital, both sides of C yber security is critical in today’s cybersecurity are in a constant state of economy. As the Digital Age consumes innovation. A constant struggle. The bad most of today’s transactions, more data guys want in, and we want them out. becomes vulnerable. Cybersecurity involves both physical And while protection is most commonly protection as well as digital. One can just as viewed as keeping private data secure, easily hack into a network as they can walk cybersecurity also ensures that networks and the data they contain are fully out the front door with a hard drive if there are operational and available. inadequate protections in place. The end game for cybersecurity is to protect your data over the course of a transaction and while stored. Why Should I Care About Cybersecurity? Consequences As part of the SMB community, you face other consequences in failing to protect personal information and your computer They include: • Loss of access to the computing network • Loss of confidentiality, integrity, and/or availability of information, research and/or personal electronic data • Lawsuits, loss of public trust and/or business opportunities, prosecution, internal disciplinary action, or termination of employment Cyber-Safety Threats Threats malware virus spyware Let’s discuss common cyber threats and problems they cause. ransomware hackers identity thieves The Digital War has Begun The global battle to steal your secrets is turning hackers into arms dealers July, 2014 Did You Know Your Smartphone Stores Every Keystroke You’ve Ever Typed? There's an application that can record every Hackers are Targeting: keystroke you've ever typed on your smartphone, even an iPhone. It's not a sinister Trojan, or an • Banking Industry – Large Dollar Transactions evil keylogger. It's simply the database that the phone draws on to supply AutoComplete results. • Retailers – Large Quantities of Credit Cards You can't dig in and see the keystrokes yourself, but external software (malicious apps) can read • Corporations – Intellectual Property back that database and thus read out every text or email you've sent and, more important, every • Consumers – Identity Theft password you've typed. • Government – Secrets & Espionage • HealthCare – Personal Health Information • Entertainment Industry – Cyber Revenge Rubenking, Neil J. "RSA: Your SmartPhone Stores Every Keystroke You Ever Typed" securitywatch.pcmag.com. February 26, 2013, http://securitywatch.pcmag.com/security- software/308519-rsa-your-smartphone-stores-every-keystroke-you-ever-typed Recent Notable Breaches The Target Breach The forensics report revealed that Target was breached because a hacker sent an infected email to Targets third-party HVAC vendor. The infected email contained a keylogger which stole the vendor’s login credentials. JP Morgan Chase Breach: People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer FBI probes hacking incident at system. People with knowledge of the probe said it appeared between two and five U.S. financial J.P. Morgan; attack appears to institutions may have been affected. The names of all have been caused by targeted banks couldn't be immediately determined. Malicious computer code. J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause. "Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels." Home Depot Breach: Forensics revealed that keylogging malware was found on employee computer systems. Community Health Systems The APT Group used highly sophisticated malware to attack the company’s computer systems. Breach Commonalities Malware (keyloggers) were used to steal credentials and remotely login or exfiltrate data. Regulator Fines are Increasing: HHS deals out largest-ever $4.8M HIPAA violation settlement. Parkview Health, OCR agree to $800K data breach settlement. HHS fines Skagit, Washington $215K in first county HIPAA settlement. Highly Motivated Hackers Credit cards go for $.50 cents - $1.00 PHI records go for $20.00 to $1500.00 DHS Warning At the time of discovery and analysis, the malware variant “Backoff” had low to zero percent anti-virus detection rates, which means that fully updated anti-virus engines on fully patched computers could not identify the malware as malicious. July 31, 2014 Our Computers are Under Attack In the last 12 months, over 600 million viruses were introduced on the Internet. The best anti-virus software has about 20 million known virus definitions built into its database. 1.1 million viruses are added per day. It takes an anti-virus company an average of 28-30 days before they can address a known virus it finds. Explosive Admission! On May 7th, 2014, Symantec's senior vice president for information security, Brian Dye, told the Wall Street Journal that “anti-virus is dead". He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal. 30,000 Web Sites Hacked A Day. How Do You Host Yours? The majority of these 30,000 sites are legitimate small businesses that are unwittingly distributing malicious code for the cyber criminals. YOU might be one of them. The hosting provider you choose is much like the neighborhood you choose to live in. A bad neighborhood breeds criminal activity. The homes that don’t have a security system, or just have stickers to deter criminals are at risk of being a Mark. The idea is the have as much security layers in place as possible, so cyber criminals move on to an easier target. Use as many security layers as possible. We utilize over 100 layers of security, where most of our competition use only a handful. Think of layers as a gated community, armed guards with machine guns, vicious guard dogs, several snipers on the roof, a SWAT team guarding your property with Rambo as your general. Lyne, James. "30,000 Web Sites Hacked A Day. How Do You Host Yours?" forbes.com. September 6, 2013, http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web-sites-hacked- a-day-how-do-you-host-yours/#6bb6893b3a8c More than 70% of WordPress installations are vulnerable to hacker attacks 70% of Wordpress installations are vulnerable to hacker attacks. That’s just the vanilla installations! Every plugin & theme that’s installed is also a potential opportunity for a security breach. YOUR website might be one of them. Abela, Robert. "Statistics Show Why WordPress is a Popular Hacker Target" wpwhitesecurity.com. December 6, 2014, https://www.wpwhitesecurity.com/wordpress-security- news-updates/statistics-70-percent-wordpress-installations-vulnerable/ You NEED Secure Website Hosting & Backup Minimum Requirements: • 57 Layers of Security Protection with weekly scans. • Block IP addresses of repeated failed login attempts. • Block certain countries you don’t do business with. • Automatic website backups stored for at least 3 weeks. • One-click restore capabilities • Website monitoring with heartbeat check at least every 15 mins. • Auto notification via text and/or email for website status. • SSL certificate If you have an e-commerce website or want to increase conversions and security, consider adding a trust seal to your website. Daily, weekly or quarterly vulnerability scan options are available and ensure PCI compliance. More info on secure website hosting can be found at http://petronellahosting.com/ You NEED Backup and Disaster Recovery • You need a backup system that can capture everything—systems, applications, configuration settings, services, data—so you don’t risk losing irreplaceable data, custom applications, or your operating system.
Recommended publications
  • Automatic Classifying of Mac OS X Samples
    Automatic Classifying of Mac OS X Samples Spencer Hsieh, Pin Wu and Haoping Liu Trend Micro Inc., Taiwan TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing Introduction herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy 6 is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Mac OS X Samples Dataset the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 10 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Classification of Mach-O Files to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. 11 Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, Malware Families indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content 15 thereof.
    [Show full text]
  • Analyzing Android Adware
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2018 Analyzing Android Adware Supraja Suresh San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Suresh, Supraja, "Analyzing Android Adware" (2018). Master's Projects. 621. DOI: https://doi.org/10.31979/etd.7xqe-kdft https://scholarworks.sjsu.edu/etd_projects/621 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Analyzing Android Adware A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Supraja Suresh May 2018 ○c 2018 Supraja Suresh ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Analyzing Android Adware by Supraja Suresh APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY May 2018 Dr. Mark Stamp Department of Computer Science Dr. Katerina Potika Department of Computer Science Fabio Di Troia Department of Mathematics ABSTRACT Analyzing Android Adware by Supraja Suresh Most Android smartphone apps are free; in order to generate revenue, the app developers embed ad libraries so that advertisements are displayed when the app is being used. Billions of dollars are lost annually due to ad fraud. In this research, we propose a machine learning based scheme to detect Android adware based on static and dynamic features.
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • Common Threats to Cyber Security Part 1 of 2
    Common Threats to Cyber Security Part 1 of 2 Table of Contents Malware .......................................................................................................................................... 2 Viruses ............................................................................................................................................. 3 Worms ............................................................................................................................................. 4 Downloaders ................................................................................................................................... 6 Attack Scripts .................................................................................................................................. 8 Botnet ........................................................................................................................................... 10 IRCBotnet Example ....................................................................................................................... 12 Trojans (Backdoor) ........................................................................................................................ 14 Denial of Service ........................................................................................................................... 18 Rootkits ......................................................................................................................................... 20 Notices .........................................................................................................................................
    [Show full text]
  • English Arabic Technical Computing Dictionary
    English Arabic Technical Computing Dictionary Arabeyes Arabisation Team http://wiki.arabeyes.org/Technical Dictionary Versin: 0.1.29-04-2007 April 29, 2007 This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate and standardise technical terms that are used in software. It is an effort to unify the terms used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License, the text of which is available at the back of this document. Contributors are welcome, please consult the URL above or contact [email protected]. Q Ì ÉJ ªË@ éÒ¢@ Ñ«YË QK AK.Q« ¨ðQåÓ .« èQK ñ¢ ÕæK ø YË@ úæ®JË@ úGñAm '@ ñÓA®ÊË éj èYë . l×. @QK. éÔg. QK ú¯ éÊÒªJÖÏ@ éJ J®JË@ HAjÊ¢Ö Ï@ YJ kñKð éÔg. QK úÍ@ ñÓA®Ë@ ¬YîE .ºKñJ ËAK. éîD J.Ë@ ÐYjJÒÊË éÒj. Óð éÓñê®Ó H. ñAg éêk. @ð Õç'Y®JË ð á ÔgQÖÏ@ á K. H. PAJË@ øXA®JË ,H. ñAmÌ'@ . ¾JÖ Ï .ñÓA®Ë@ éK AîE ú ¯ èQ¯ñJÖÏ@ ð ZAKñÊË ø X @ ú G. ø Q¯ ékP ù ë ñÓA®Ë@ ékP . éJ K.QªËAK. ÕÎ @ [email protected] . úΫ ÈAB@ ð@ èC«@ à@ñJªË@ úÍ@ H. AëYË@ ZAg. QË@ ,á ÒëAÖÏ@ ɾK. I. kQK A Abortive release êm .× (ú¾J.) ¨A¢®K@ Abort Aêk . @ Abscissa ú æJ Absolute address Ê¢Ó à@ñ J« Absolute pathname Ê¢Ó PAÓ Õæ @ Absolute path Ê¢Ó PAÓ Absolute Ê¢Ó Abstract class XQm.× ­J Abstract data type XQm.× HA KAJ K.
    [Show full text]
  • Rethinking Security
    RETHINKING SECURITY Fighting Known, Unknown and Advanced Threats kaspersky.com/business “Merchants, he said, are either not running REAL DANGERS antivirus on the servers managing point- of-sale devices or they’re not being updated AND THE REPORTED regularly. The end result in Home Depot’s DEMISE OF ANTIVIRUS case could be the largest retail data breach in U.S. history, dwarfing even Target.” 1 Regardless of its size or industry, your business is in real danger of becoming a victim of ~ Pat Belcher of Invincea cybercrime. This fact is indisputable. Open a newspaper, log onto the Internet, watch TV news or listen to President Obama’s recent State of the Union address and you’ll hear about another widespread breach. You are not paranoid when you think that your financial data, corporate intelligence and reputation are at risk. They are and it’s getting worse. Somewhat more controversial, though, are opinions about the best methods to defend against these perils. The same news sources that deliver frightening stories about costly data breaches question whether or not anti-malware or antivirus (AV) is dead, as reported in these articles from PC World, The Wall Street Journal and Fortune magazine. Reports about the death by irrelevancy of anti-malware technology miss the point. Smart cybersecurity today must include advanced anti-malware at its core. It takes multiple layers of cutting edge technology to form the most effective line of cyberdefense. This eBook explores the features that make AV a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
    [Show full text]
  • A Poisoned Apple: the Analysis of Macos Malware Shlayer By: Minh D
    A Poisoned Apple: The Analysis of macOS Malware Shlayer by: Minh D. Nguyen Abstract Historically, the Microsoft Windows operating system family, which currently runs on more than 70 percent of computers in the world,7 has been the main target for malware. However, with the growing popularity of Apple’s MacBook products, the macOS operating system has become a new platform for attackers to target the general computer users. According to the 2016/2017 Security Report of AV-TEST, the number of malware samples for macOS detected in 2016 has increased by an astonishing 370 percent compared to the same figure in 2015.3 In order to address the rising interest of attackers in the macOS operating system, this project provides an analysis of a newly discovered malware for macOS, Shlayer, to reveal a well- known tactic that attackers can utilize to infect machines running on any operating system, and discusses possible countermeasures for this strategy. I. Introduction macOS is often hailed as a more secure operating system compared to its counterpart Microsoft Windows.2 However, in reality, many attacking techniques targeting Windows machines can also be applied to macOS machines. The analysis of the new Shlayer malware, discovered by researchers of Intego in February 2018,1 will reveal a familiar strategy that attackers often utilize to target victim machines without regards of the operating system. With the worldwide growth of macOS usage, it is important to recognize this attacking method and understand that in many cases, the success of an attack does not depend on the security of the operating system but on the awareness of the user.
    [Show full text]
  • Cyren's 2016 Cyberthreat Report
    2016 CYBERTHREAT Report AUTOMATED THREAT INTELLIGENCE: The Key to Preventing, Mitigating, and Identifying Cyber Breaches Introduction .................................................................................................4 The Cloud Sandbox Array: A New Tool Against Cybercrime .....................6 The Benefits of Big Data .......................................................................... 12 2016 Predictions....................................................................................... 14 Malware Newsmakers of 2015 ................................................................ 16 The Criminal Power of the Unknown ...................................................... 22 2015 Statistics: Android, Phishing, Malware, Spam ............................... 26 Table of Contents Table CYREN 2016 CYBERTHREAT REPORT 3 INTRODUCTION Lior Kohavi Chief Technical Officer, CYREN, Inc. There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It's no secret that cybercriminals are willing to spend a lot of time and money to obtain the information they desire. And, the risk that these criminals will be caught and convicted is relatively low. Despite well-publicized botnet takedowns, like that of Darknode this past July, researchers estimate that less than 1% of cybercrimes receive a corresponding conviction.
    [Show full text]
  • Adobe Acrobat Pro Reset Document Password
    Adobe Acrobat Pro Reset Document Password Rutilated Hyman sometimes donned any uprises justled illatively. Mike springed his jillets frustrating third-class Ossieor tyrannically temp, but after Aziz Bogdan baldly overstaffsentitles and her denned cabernet. weakly, bracteal and anthroposophical. Quotidian and creepiest Learn safe to do when you grit your password. Need your PDFs on loan go? You reserved your sidewalk to the Adobe PDF format and Adobe Acrobat, the de facto standard for creating and managing PDF files. You did receive help directly from her article author. Discuss: How they disable Protected View in Microsoft Word associate in to comment. It often indicates a user profile. If error had bought PDF Expert before the app moved to a subscription model, you will be able provide access this feature great free. Open the Comments modal. Edit: is now have our desktop application too. Security concerns often arise beneath the conflict between security and functionality. To guard your minds in peace and gotten help you tactfully dodge any priest of your future purchase wheat have created this web blog. How those Change PDF Permissions. Most of us in our lifetime did change across password protected PDF at school once. The best for the layout similar issue and create the adobe acrobat pro reset document password from pdfs no contractual obligations are as. Moreover, erasing passwords from one file at a time unless both tiresome and troublesome. Open fire original PDF file. Lets users insert, delete, and rotate pages, and create bookmarks and thumbnails. Also removes printing restrictions from files. Adobe Acrobat Reader routinely receives a dozen to more security patches every month.
    [Show full text]
  • Ransomware and Cyber Risk Management
    Ransomware and Cyber Risk Management By Randy Werner Ransomware and cyber extortion represent one of the more malicious types of hacker attacks making the rounds today. It sneaks into computer systems, encrypts files, and demands a ransom before decrypting the files. A major problem is that ransomware does not always decrypt files even after the ransom is paid. Being prepared and taking precautions against cyber risk exposures such as ransomware is therefore essential. Otherwise, if not prepared, you are at the mercy of criminals who prey on unprepared and unsuspecting businesses and individuals. Ransom demands range from a few hundred dollars to several thousand, depending on the size of the victim. Not all ransomware attacks are reported to authorities, so estimates of the total amount paid over the past few years vary widely, ranging up to $300 million. The more notorious names among ransomware are CryptoLocker, CryptoWall, TorrentLocker and Locky, among others. Some attacks rely on software that now has known fixes, so a solution might be found online. However, other ransomware is technically advanced and has no known fix, except for the victim to rely on current backup files. The primary defense is to institute frequent backups of the files you do not want to lose. Some ransomware even seeks out backup copies of files, so best practices include creating multiple backups in different locations. Cloud services, or remote backup services, and external or USB hard drives are options to consider for multiple backups. Even with backup files in place, a firm may still spend many hours gathering, re-entering and reconstructing data.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Spyware/Adware the Quest for Consumer Desktops & How It Went Wrong
    Spyware/Adware The Quest for Consumer Desktops & How it Went Wrong Saumil Shah Dave Cole Agenda • The Adware & Spyware Business • Disputes, Lawyers & Legislation • The Technology • Looking Ahead How’d we get in this mess? 11stst freewarefreeware AntiSpywareAntiSpyware programsprograms 11stst industryindustry workingworking groupgroup (COAST)(COAST) Adware fromappearappear Direct (( OptOut,Revenue,OptOut, Spybot,Spybot, MediaAggressive MetrixAd-Aware)Ad-Aware) Installs AffiliateAffiliate marketingmarketing iscollapsesiscollapses born,born, courtesycourtesy amidstamidstAdwareAdwareAdware controversy,controversy, from companiescompanies Direct newnew Revenue, 180180 SolutionsSolutions Media &&Aggressive Metrix Installs found in BitTorrent streams • “Persistent” re-try ofof thethe adultadult entertainmententertainmentgroupgroup formedformed industry.industry.found Direct Directasas AntiSpywareAntiSpyware in RevenueRevenue BitTorrent (using(using streams manymany names)names)• “Persistent” re-try KazaaKazaa gainsgains inin popularity,popularity,• ActiveX bundlingbundling “Drive-by” LaterLater abandonedabandoned duedueCoalitionCoalition toto widespreadwidespreadjoinjoin thethe fray.fray. • ActiveX “Drive-by” FirstFirst adwareadwaremanymany adware adwareprogramsprograms programsprograms appearappear foronforon thefundingthefunding scene,scene, fraudfraud andand abuse.abuse. CometComet SystemsSystems embroiledembroiled inin classclass actionaction lawsuit,lawsuit, Aureate/Radiate & Conducent TimeSink. Aureate/Radiatespywarespyware & debatesdebates
    [Show full text]