What is Spyware? Where did it come from?.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.
Presented by Jamie Leben IT-Works Computer Services
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
For Removal Info: visit
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Chapter 8 Damage Control How to remove viruses and spyware infections.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Configuring the MagicInfo Pro Display
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
How to Avoid Spyware By Hottman Computers & Consulting Co
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Speeding Up Your PC Roger Libman. Typical Repair Orders.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Unit 4 IT Security.
Configuring Windows 10 for Your Studio
Malware aka- malicious software By: Ken Fogel
Technical Guidelines to Turn off Norton 360 Auto Update.
Support For Webroot Antivirus:
Call AVG Antivirus Support | Fix Your PC
Information Security Session October 24, 2005
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Chapter 9: Configuring Internet Explorer
Presentation transcript:

What is Spyware? Where did it come from?

Adware Originated from software called shareware Shareware did not work well, so as the internet became popular, it evolved into adware Adware was shareware that supported itself by displaying advertisements Gator Kazaa

Adware Advertisers wanted to better target ads to people using these programs, so they began to “collect” usage information The term for this became “spyware” Advertisers began devising more and more intrusive ways to display advertisements Adware switched from programs supported by advertisements to advertisements supported by programs

Spyware Instead of coming with a program that serves a useful purpose, most spyware now seeks to merely get on your computer for the sole purpose of displaying advertisments This includes displaying pop-ups when you shouldn’t get them, your web browser being “hijacked”, and many other things that shouldn’t happen.

Spyware The official definition of spyware is: Software that transmits information back to a third party without notifying the user. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Note: Some privacy advocates also call legitimate access control, filtering, Internet monitoring, password recovery, security or surveillance software "Spyware" because it could be used without notifying the users.

Spyware It is believed that currently 9 out of 10 PCs that are connected to the internet are now infected by spyware An unpatched PC connected to the internet can be infected in as little as 4 minutes So how can someone protect themselves from spyware?

Updates, Virus Scanners, and Firewalls Basic Measure Updates, Virus Scanners, and Firewalls

Anti-Virus Everyone should have anti-virus software on their computer! Run at least once per week, along with other measures to keep your computer safe and working correctly Anti-Spyware tools (covered later) Hiram College provides anti-virus software for you E-Trust software http://home.hiram.edu/eTrust/download.html

Windows Updates What it does: Updates software on your computer to plug up security holes in Windows products Select it from the start menu Automatic updating Should be run as often as anti-virus software is used Service Pack 2

What you need to know about Service Pack 2 Windows Security Center, which includes: Quick-and-easy automatic updates options Pop-up blocker Monitoring of anti-virus protection Software firewall

Firewalls Keeps unauthorized users from entering your system Hardware and Software based firewalls

More on Firewalls No need to worry if you’re on the Hiram network Should be used otherwise – easy to use and you can work around them if you need to

AdAware, Spybot, and MS AntiSpyware Anti-Spyware Tools AdAware, Spybot, and MS AntiSpyware

Anti-Spyware Tools AdAware, Spybot, and MS AntiSpyware are all free tools that scan for and remove spyware These three are also the most powerful We will show you how to use these tools in this section

AdAware http://www.lavasoftusa.com/ Free version available (AdAware SE Personal) Professional version also available

Spybot http://www.spybot.info/ Completely Free of Charge

Microsoft AntiSpyware http://www.microsoft.com/athome/security/spyware/software/default.mspx Formerly Giant AntiSpyware Free of charge

Other tools Noteworthy commercial products: AdAware SE Professional Webroot SpySweeper Trusted sources of information (and updated software): http://www.download.com/ http://www.spychecker.com/

Safe Mode, Regedit, and Bazooka Advanced Removal Safe Mode, Regedit, and Bazooka

Advanced Spyware Removal Windows Safe Mode The Windows Registry Manual Spyware Removal (with Bazooka)

Windows Safe Mode Safe Mode – what is it? Only loads minimal Windows functions for Windows to run. User must manually start any programs they wish to use. Allows anti-spyware scanners to remove spyware more effectively. Our instructions are for Windows XP

How to Access Windows Safe Mode Update all anti-spyware scanners with current definitions. Turn off System Restore. (Instructions coming next!) Reboot the computer. Tap the F8 key about twice per second as the computer reboots.

Accessing Windows Safe Mode continued Select the first option, Safe Mode, and press enter. When Windows starts, run anti-spyware scanners.

Turning off System Restore

**A word of caution when using the registry!** The Windows Registry Windows Registry – what is it? A database of configuration files needed to run Windows and programs Some spyware must manually be removed from the registry Use Google to search for instructions on how to remove the spyware **A word of caution when using the registry!**

How to Access the Windows Registry Click on ‘Start’, and then click on ‘Run’. Type ‘regedit’ and click ‘Ok’. Follow the instructions for removing the spyware by expanding the hierarchical folders in the left column.

Bazooka Removal Tool Free software http://www.kephyr.com/ Advanced removal tool (often requires using regedit)

Sample of Bazooka Instructions

Other things to keep you safe Additional Measures Other things to keep you safe

1: Use a pop-up blocker Pop-up blockers stop pop-up ads from being displayed on your screen. Windows XP Service Pack 2 adds a pop-up blocker to Internet Explorer. If you are not using Windows XP, Google makes a pop-up blocker too. You can download it at http://www.google.com/downloads/

2: Turn off dangerous features Internet Explorer allows the use of Active X for displaying certain content Unfortunately Active X can be very dangerous if used for malicious purposes You can disable Active X in the security settings of Internet Explorer You may wish to disable other features as well There is a better option than crippling your features

3: Use a different Web Browser Internet Explorer is currently the most commonly used web browser That means it is the ideal target for spyware manufacturers If they can find an exploit in it, they can target the most number of people

3: Use a different Web Browser By using a different web browser you avoid most of these mainstream exploits Firefox is an example of a browser alternative that an individual can use It is free from http://www.mozilla.org Another free browser is Opera (http://www.opera.com)

3: Use a different Web Browser Alternate browsers also include other features you may find useful Most web browser alternatives include pop-up blockers Some even have features for removing advertisements all together

4. Be Alert Many virus writers use simple tricks like misdirection http://cs.hiram.edu/ Double check your sources and make sure that the link is going where you think it is

Questions? See this information (and more) at http://cs.hiram.edu/ Feel Free to contact us at HCACM@hiram.edu