0% found this document useful (0 votes)
24 views14 pages

Spyware

Uploaded by

nehashukla210618
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views14 pages

Spyware

Uploaded by

nehashukla210618
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Acropolis Institute of Technology and Research, Indore

Acropolis Institute of Technology and Research, Indore

Spyware
CS504-(A): Cyber Security
Spyware
● Spyware is unwanted software that infiltrates your computing device,
stealing your internet usage data and sensitive information.
● Spyware is classified as a type of malware — malicious software
designed to gain access to or damage your computer, often without
your knowledge. Spyware gathers your personal information and relays
it to advertisers, data firms, or external users.
● Spyware is used for many purposes. Usually it aims to track and sell
your internet usage data, capture your credit card or bank account
information, or steal your personal identity for Identity Theft.
● How? Spyware monitors your internet activity, tracking your login and
password information, and spying on your sensitive information.
● Some types of spyware can install additional software and change the
settings on your device, so it’s important to use secure passwords and
keep your devices updated.
Spyware Types
● Adware: This type of spyware tracks your browser history and downloads, with
the intent of predicting what products or services you’re interested in. The
adware will display advertisements for the same or related products or services
to entice you to click or make a purchase. Adware is used for marketing
purposes and can slow down your computer.
● Trojan: This kind of malicious software disguises itself as legitimate software.
For example, Trojans may appear to be a Java or Flash Player update upon
download. Trojan malware is controlled by third parties. It can be used to
access sensitive information such as Social Security numbers and credit card
information.
● Tracking Cookies: These track the user’s web activities, such as searches,
history, and downloads, for marketing purposes.
● System Monitors: This type of spyware can capture just about everything you
do on your computer. System monitors can record all keystrokes, emails,
chat-room dialogs, websites visited, and programs run. System monitors are
often disguised as freeware.
How do I get spyware?
● Spyware can affect PCs, Macs, and iOS or Android devices.
● Although Windows OS is more susceptible to attacks, attackers are becoming
better at infiltrating Apple’s OS as well. Some of the most common ways your
computer can become infected with spyware include these:
Accepting a prompt or pop-up without reading it first
Downloading software from an unreliable source
Opening email attachments from unknown senders
Pirating media such as movies, music, or games
Symptoms of Spyware Presence?
● You may have a spyware issue if your computer shows these
symptoms.
Your device is slow or crashes unexpectedly.
Your device is running out of hard drive space.
You get pop-ups when you are online or offline.
Examples of Spyware
The best-known examples of spyware are the following:
● Zlob -- or Zlob Trojan -- downloads itself onto a computer and records
keystrokes, as well as search and browsing history.
● Gator -- commonly found in file sharing software -- monitors victims'
web surfing habits in order to present them with better targeted ads.
● TIBS Dialer disconnects the user's computer from a local phone line
and instead connects it to a toll number that is designed for accessing
pornographic websites.
● CoolWebSearch takes advantage of security vulnerabilities found in
the Internet Explorer web browser in order to take control, change
settings and send browsing information to its authors.
● Internet Optimizer -- more popular in the days of dial-up connections --
initially promises to increase internet speeds but instead replaces all
error and login pages with ads.
How to remove spyware?
● Run a scan with your current security software to make sure it has
cleaned up everything it can. Next, download and run a virus
removal tool.
● There are also other reputable anti-spyware removal tools. Some
of them work only when you manually start the scan. Others
continuously monitor your computer to make sure spyware can’t
modify or monitor your information.
How to help prevent spyware?
● Here are four main steps to help prevent spyware.

● Don’t open emails from unknown senders.


● Don’t download files from untrustworthy sources.
● Don’t click on pop-up advertisements.
● Use reputable antivirus software.
Cookie
● Web Browsers and Servers use HTTP protocol to communicate and
HTTP is a stateless protocol. But for a commercial website, it is
required to maintain session information among different pages. For
example, one user registration ends after completing many pages.
But how to maintain users' session information across all the web
pages.
● In many situations, using cookies is the most efficient method of
remembering and tracking preferences, purchases, commissions,
and other information required for better visitor experience or site
statistics.
● Cookies can be useful; for example, they instantly log you into your
favourite websites and serve you advertisements for goods and
services that are relevant to your interests. But tracking cookies can
be considered spyware as they follow you online as you browse,
compile your browsing history, and record login attempts.
Test Your Understanding
1. Recently Google play store removed some Apps due to which spyware:
A. I Love You
B. WannaCry
C. Joker
D. AppHack
Spyware
Sources:
● Cyber Law Simplified – Vivek Sood, McGraw Hill Education Pvt. Ltd.

● https://www.cryptool.org
● https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
● http://www.freewebmasterhelp.com/tutorials/cookies

Disclaimer- Parts of the content of this course is based on the materials available from the Web sites and books listed above. The
materials that can be accessed from linked sites are not maintained by Acropolis Institute of Technology and we are not responsible
for the contents thereof. All trademarks, service marks, and trade names in this course are the marks of the respective owner(s).
Any Doubts/Questions
Acropolis Institute of Technology and Research, Indore

Thank You

14

You might also like