Spyware & Internet Security

Slides:



Advertisements
Similar presentations
What is Spyware? Where did it come from?.
Advertisements

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
What is it and how to make your computer go fast again.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Spyware & Internet Security
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
What is Malware? Definition: Definition: A generic term used to describe any form of malicious software; e.g., Virus, Trojan horse, Spyware, Adware, Malicious.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Adware and Spyware By Mr. Arbogast.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
Return to the PC Security web page Lesson 5: Dealing with Malware.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Windows Tutorial 5 Protecting Your Computer
How to Avoid Spyware, Popups and other Annoyances
Hacking Computer crime and cyber security.
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Spyware: Stealthy and Deadly
What is a Firewall Anyway?
Protect Your Computer Against Harmful Attacks!
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Spyware. By: Katheryn L. Gaston.
Spyware: Technical Overview
Presentation transcript:

Spyware & Internet Security

Different Types of Spyware Adware Embedded Programs Trojan Horse Browser Hijackers Dialers Malware

Why do people make Spyware? Profit A challenge Malice Boredom Business

How do I know if I’ve got Spyware? Computer is running slower than normal Popups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

What does Spyware look like?

How do I get rid of Spyware? Use a legitimate spyware removal program We suggest Spybot Search and Destroy in combination with Microsoft Antispyware (now called Defender) Ad-aware is a good program and is free for home use but is no longer free for educational use.

Steps in Spyware Removal Add and Remove Programs Menu Reboot Run a Spybot Scan Run a Microsoft Antispyware Scan If still having problems manually remove registry and startup entries (Do NOT do this yourself)

How do I prevent Spyware? Be conscious of what you are clicking on/downloading Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X. Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.

The Least Wanted List Weatherbug (GAIN or Claria) Hotbar 180 Search Assistant MyWebSearch Popular Screensavers Comet Cursors A Better Internet (Aurora) Kazaa / Morpheus GameSpy Arcade WhenUSave New.Net Starware Toolbar MySearch Begin2Search 180Solutions Zango CoolWebSearch DyFuCA BonzaiBuddy BargainBuddy Dashbar Gator WeatherScope Best Offers Network Precision Time FunWeb

Phishing Most commonly an Email stating your account Information needs updating Watch for URL’s that are numeric or different from the link you clicked on Best thing to do is to type in the URL and check your account directly without following any links in the Email Many legitimate emails no longer contain a link (Paypal)

Phishing Examples

Phishing Examples

Phishing Examples

Phishing Examples

Phishing Examples

Phishing Examples

How secure do you need to be? Be Prudent not Paranoid Did you initiate the action? Why is this free? Is the source trustworthy? When in doubt Google it

Safer Alternatives Download.com – All programs are adware/spyware free Freesaver.com – Screensavers from this site are safe DO NOT click on ads KFOR or News9 Cleansoftware.org

The Bottom Line It is safe to install these programs: Microsoft AntiSpyware (Defender) Spybot Search & Destroy SpywareBlaster SpywareGuard If you are running a different Spyware program contact your Technology Specialist to make sure it is not a rogue