Steer Clear of Spyware

SHARE

 

Steer Clear of Spyware

Spyware/Adware They are watching you.Spyware programs track and monitor Internet browser usage, secretly collecting your information to use for commercial purposes. If there is spyware on your computer, what you are doing and where you are going on the Internet is being transmitted to remote servers of third parties so they can display targeted advertisements to you–a lot of targeted advertisements, in case you haven’t noticed. Spyware and adware are often thought of as the same thing, and this is a common misconception. Adware is less invasive, and much less intelligent than spyware. Adware takes the form of random pop-up ads. For example, let’s say you’re on a recipe Web site, and all of a sudden a pop-up advertisement of an Internet casino appears. That’s adware. Spyware goes a step further because it collects information about your Internet habits and uses that to tailor unsolicited pop-up advertising to your interests.

 

 

Chances are you or someone you know has run into a problem with spyware. If the computer suddenly becomes unresponsive, or is barraged with an onslaught of pop-up windows that make it nearly impossible to do anything, these are signs of a spyware infection. Spyware slows down your computer because the software is always running in the background, using your computer’s processing power and Internet connection to send the data that’s been collected about you to a third party. In addition to the annoying pop-ups and computer slowdowns, you can see evidence of a spyware problem if other abnormal things happen, such as: strange toolbars appearing, icons for software you didn’t install showing up on your desktop, new bookmarks in your favorites list that you didn’t add, or a site you don’t intend to visit keeps appearing as your homepage.

How spyware gets on your machine:  The creators of spyware are tricky. They have to be–because they know that no one would consciously agree to let it into their computer. So they turn to a variety of methods to get you to allow them access to your PC. Here are some of the most common methods:

Piggyback onto other downloads by becoming part of the end-user agreement for another software program. If you agree without reading the details, you may be consenting to spyware being put on your machine. This is common practice in almost all free file-sharing services that are available for download. It is wise to do a “custom” rather than “default” install so you can see firsthand what is being installed on to your computer and make sure no unnecessary software makes it onto your PC.

Pop-up messages:  No matter how “official,” important, or helpful they look, think twice before clicking on any pop-up message. Spyware creators will use pop-ups that prey on human emotions–telling you that your computer is infected, or you have a virus. They also will send you pop-ups that are similar in nature to the Web site you are visiting. These are all direct routes for spyware to get into your computer.

Internet sites that attempt to install plug-ins or extra features. Sometimes there are legitimate reasons to install such things–but for the most part, if a Web site that is not well known or is not sponsored by a company you have heard of and can trust, is asking you to install add-ons, be careful! Watch what you click and don’t install plug-ins unless you are positive they are coming from a legitimate source.

Government is stepping in: Spyware is big business–and its creators are just getting more tricky and underhanded with their methods, and this will continue as long as they can get away with it. However, in recent months lawmakers have begun to get serious about reining in spyware activities. Just months after finalizing the CAN-SPAM act, legislators are now dealing with spyware, which many consider to be more potentially damaging than Spam if not stopped.

H.R. 2929, the “Securely Protect Yourself Against Cyber Trespass Act” (SPY-ACT) is currently working its way through Congress, and contains measures to make it illegal to install software on somebody else’s computer without notice and consent. It also requires spyware programs to be easily identifiable and removable. Hefty fines up to $3 million are proposed. The recently revised version of SPY-ACT also includes provisions that prohibit unfair or deceptive behavior in the form of keystroke logging, computer high-jacking, and the display of advertisements like pop-ups that cannot be closed.

The same day the SPY-ACT was passed in the House, a newer and some say more comprehensive bill, the Internet Spyware Prevention Act (I-SPY) of 2004 was introduced. Unlike the SPY-ACT, I-SPY doesn’t focus on define what the computer software should or shouldn’t do. It focuses more on the punishing the criminal behavior involved, and the privacy and security risk that spyware introduces. I-SPY also has more teeth–it includes criminal penalties of up to five years in prison.

States are slowly getting into the act too. Utah was the first state to pass an anti-spyware law, but it has yet to be implemented, thanks to an injunction by two spyware operators. Meanwhile, the state of California is currently considering two anti-spyware bills.

Conclusion: While we are still waiting for laws to curb spyware, it is up to computer users to be more vigilant about turning away spyware that comes knocking at their door whenever they’re online. Chances are there is some kind of spyware currently running on your computer even though you may have not noticed it. Meanwhile that spyware has been busy getting to know your Internet browsing habits. In general, you should be very wary of what you download and install onto your computer. Read all agreement terms before accepting anything, and if you get the sense you might be getting into more than what you want, cancel out of it. No download is worth losing your privacy over!

–reprinted from Symantec

 

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | JAN. 15

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories