Presentation on theme: "Breakfast Bytes: Scrambled Eggs Spyware, Pop-ups, and other Annoyances."— Presentation transcript:
Breakfast Bytes: Scrambled Eggs Spyware, Pop-ups, and other Annoyances
DoIT Breakfast Bytes – Creighton University Jane’s Diary - Monday I just got my new PC. It’s lightening fast. The first thing I did was get a “cool” screen saver. I surfed the net and found some really awesome screen savers for FREE! I pressed OK to this End User License agreement (EULA) and it installed so easily. What really happened? The screen saver software really installed adware. This will create pop-ups trying to sell her or promote new sites.
DoIT Breakfast Bytes – Creighton University Jane’s Diary - Tuesday I surfed the net. I had a few pop-ups. One of them offered these really great emoticons and cool smileys for email. Once again it was easy. I was presented with a lengthy EULA – to long to read so I just clicked OK. I am so excited to send emails to my friends with these smileys. What really happened? That long EULA mentioned that by installing the smiley’s she was also installing some software that would continue to pop-up ads and track her spending.
DoIT Breakfast Bytes – Creighton University Jane’s Diary - Wednesday I was checking out my favorite sites and an ad popped up about an important security upgrade. I thought, I better do that. You can’t be safe enough these days. What really happened? Jane just installed a keylogger. Keylogger spyware can capture user names, passwords, and PIN information from her machine or online forms, and then use this information later online. Security checks and updates should come only from Creighton tools or safe and trusted sites.
DoIT Breakfast Bytes – Creighton University Jane’s Diary – Thursday I found an on-line service that will “kick-back” some of the money I spend to my favorite charity. This really helps to raise funds and it is so easy. It seems that my machine is running slower, but that’s ok. I’m raising money for charity. What really happened? Jane’s PC is now tracking her activity and spending habits. The behavior driven software re-directs her to sites that are similar to her past actions. Data is also sold to other marketers.
DoIT Breakfast Bytes – Creighton University Jane’s Diary - Friday A friend told me how I can get all the music I want for free through a P2P (Peer to Peer) application. I seem to get pop-ups more frequently and the computer seems slower but maybe this new software doesn’t work as fast as others. What really happened? Jane just downloaded a nasty Trojan horse through this music file share. She completes her academic research project which the hacker grabs and posts on a website, along with Jane’s credit card numbers which will be brokered.
DoIT Breakfast Bytes – Creighton University Jane’s Diary – Monday My PC is so slow! I’ve only had it for one week. Pop-ups plague my internet research. I tried to use Google to see if I could resolve my PC problems. My PC kept redirecting me some-where else. I can’t get anything done. I am so frustrated. I called the Service Desk and they are sending someone.
DoIT Breakfast Bytes – Creighton University Service Visit The Service Technician inspects the situation and shares the news: Your computer is infested with Adware and Spyware While working on the problems Dick explains the situation to Jane.
DoIT Breakfast Bytes – Creighton University Dick’s Advice - Adware More and more users are being lured in with free offers. Nothing is truly free and these lures come with hidden costs. The user subsidizes the cost by receiving pop-up advertisements while they surf. This doesn't make it "spyware" as some might label it, but it is annoying adware.
DoIT Breakfast Bytes – Creighton University Dick’s Advice - EULA Most of these companies state their practices in their EULA, but most user's don't take the time to read. When you don’t read the EULA, you may be agreeing to really NASTY terms. Ultimately users must decide if a free service, software or offer is worth being bombarded with pop-up ads every time they surf the Internet or having their name sold to other marketing firms.
DoIT Breakfast Bytes – Creighton University Dick’s Advice - Spyware Spyware is any program designed to collect information about you and your web practices. Many people are unaware that their computers are infected with Spyware agents. Spyware changes your machine settings and files and does not care. Malware is like spyware but it has malicious intent.
DoIT Breakfast Bytes – Creighton University Spyware Added Via Other Programs Take a look at Kazaa’s Web Site Kazaa’ Review Grokster’s Download Check out the EULA for AST/CPR AST/CPR
DoIT Breakfast Bytes – Creighton University Watch What You Click Clicking on pop-ups is an open invitation. You have not won anything, no matter how much it flashes. Also avoid punching the monkey, taking quizzes in pop-ups and any banner that doesn't tell you who posted it.
DoIT Breakfast Bytes – Creighton University Spyware Installation Methods Opening spam email (even by viewing it!). Visiting a website. Clicking a pop-up window. Download "free" utilities, games, toolbars, media players, etc. Using a file-sharing service (e.g., Kazaa, BearShare, Grokster).
DoIT Breakfast Bytes – Creighton University Dick’s Advice - Symptoms of Spyware Home and search page eviction. Snail syndrome (slowdown). Fishy or excessive pop-ups. E-mail errata. New—and unexpected—favorites. Stroke-by-stroke surveillance (behavior tracking).
DoIT Breakfast Bytes – Creighton University Growing Problem Lack of regulation. More-complex Internet security issues. Lack of user awareness. Greatest threat to personal identity and University productivity. Yet, it is easily preventable.
DoIT Breakfast Bytes – Creighton University Dick’s Advice – Prevention Tips Pop Up and Banner Ad Blockers only mask symptoms. Additional warning -- these can cause trouble with some web-based applications (Banner). Always run antivirus software. Watch out for cookies. Do not open spam email. Do not run as an Administrator.
DoIT Breakfast Bytes – Creighton University Dick’s Advice – Prevention Tips Read the end-user license agreement (EULA) carefully. Avoid peer-to-peer file sharing services. Firewalls help prevent hackers and other intruders. Protect yourself against drive-by downloads with strong Browser settings.
DoIT Breakfast Bytes – Creighton University Technical Solutions At Home Ad-Aware SE Personal Spybot Search & Destroy At Creighton Call the DoIT Service Desk x1111 or your own IT personnel
Questions ? For questions after this session, contact our Service Desk at 280-1111.
Your consent to our cookies if you continue to use this website.