Spyware 2004 - PowerPoint PPT Presentation

1 / 39
About This Presentation
Title:

Spyware 2004

Description:

... more than 420,000 PCs by EarthLink and Webroot showed nearly one-third infected ... Trojan Horses appear to be software programs a user has requested but actually ... – PowerPoint PPT presentation

Number of Views:53
Avg rating:3.0/5.0
Slides: 40
Provided by: michaelr162
Category:

less

Transcript and Presenter's Notes

Title: Spyware 2004


1
Spyware 2004
  • New concerns in the second year of the Spyware era

2
Spyware Is Everywhere
  • A survey of more than 420,000 PCs by EarthLink
    and Webroot showed nearly one-third infected with
    Trojans or system monitors.
  • -Information Week 6/17/04

3
What can Spyware do?
  • Monitor your surfing activity
  • (Key Logging)
  • Collect data about you to direct ads to your
    computer
  • Hijack your browser or Google
  • Cause your PC to make very expensive phone calls

4
Trojan Horse Spyware
  • Trojan Horses appear to be software programs a
    user has requested but actually aid hackers in
    stealing computer data.

5
Viruses versus Spyware
  • Viruses are a form of vandalism
  • Spyware is primarily motivated by financial gain

6
How to get Spyware
  • Download cute little programs like Weather Bug,
    NetSonic and Gators eWallet (Users Agree to the
    EULA that allows the Spyware without reading it
    first)
  • Sometimes just clicking on an ad or a Web page
    will cause a Spyware download without offering a
    EULA

7
Eliminating Spyware
  • Prevention First Be careful what you download
    and read those EULAs
  • Download and use three free Anti-Spyware programs

8
Why use three?
  • There is no one program that detects and removes
    all classes of Spyware

9
A Power Users Quick Launch Tray
10
Spybot-Search Destroy 1.3
  • Beware of imitations that are spyware
  • This is probably the premier anti-Spyware
    software, but cant be relied on alone

11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
(No Transcript)
18
(No Transcript)
19
(No Transcript)
20
(No Transcript)
21
SpywareBlaster 3.1
  • A passive shield that does that best job at
    preventing Browser Hijacking

22
(No Transcript)
23
(No Transcript)
24
(No Transcript)
25
(No Transcript)
26
AdAware 6.0
  • Its greatest strength is finding and removing
    AdBots

27
(No Transcript)
28
(No Transcript)
29
(No Transcript)
30
(No Transcript)
31
(No Transcript)
32
(No Transcript)
33
(No Transcript)
34
(No Transcript)
35
The Most Common Hijacker is CoolWebSearch
  • It can be removed by a separate program
    CWShredder 1.59

36
(No Transcript)
37
How do you get these wonderful programs?
  • Google

38
Can Spyware be legislated away?
39
SPY ACT
  • The Securely Protect Yourself Against Cyber
    Trespass Act (SPY ACT) bill approved by the House
    Subcommittee on Commerce, Trade, and Consumer
    Protection, would levy fines as large as 3
    million on lawbreakers who illegally collect
    personal information, deliver pop-up ads that
    can't be closed, change the browser's default
    home page, log keystrokes, and steal identities.
  • -InternetWeek 6/18/04
Write a Comment
User Comments (0)
About PowerShow.com