Spyware
Spyware
Spyware
CS504-(A): Cyber Security
Spyware
● Spyware is unwanted software that infiltrates your computing device,
stealing your internet usage data and sensitive information.
● Spyware is classified as a type of malware — malicious software
designed to gain access to or damage your computer, often without
your knowledge. Spyware gathers your personal information and relays
it to advertisers, data firms, or external users.
● Spyware is used for many purposes. Usually it aims to track and sell
your internet usage data, capture your credit card or bank account
information, or steal your personal identity for Identity Theft.
● How? Spyware monitors your internet activity, tracking your login and
password information, and spying on your sensitive information.
● Some types of spyware can install additional software and change the
settings on your device, so it’s important to use secure passwords and
keep your devices updated.
Spyware Types
● Adware: This type of spyware tracks your browser history and downloads, with
the intent of predicting what products or services you’re interested in. The
adware will display advertisements for the same or related products or services
to entice you to click or make a purchase. Adware is used for marketing
purposes and can slow down your computer.
● Trojan: This kind of malicious software disguises itself as legitimate software.
For example, Trojans may appear to be a Java or Flash Player update upon
download. Trojan malware is controlled by third parties. It can be used to
access sensitive information such as Social Security numbers and credit card
information.
● Tracking Cookies: These track the user’s web activities, such as searches,
history, and downloads, for marketing purposes.
● System Monitors: This type of spyware can capture just about everything you
do on your computer. System monitors can record all keystrokes, emails,
chat-room dialogs, websites visited, and programs run. System monitors are
often disguised as freeware.
How do I get spyware?
● Spyware can affect PCs, Macs, and iOS or Android devices.
● Although Windows OS is more susceptible to attacks, attackers are becoming
better at infiltrating Apple’s OS as well. Some of the most common ways your
computer can become infected with spyware include these:
Accepting a prompt or pop-up without reading it first
Downloading software from an unreliable source
Opening email attachments from unknown senders
Pirating media such as movies, music, or games
Symptoms of Spyware Presence?
● You may have a spyware issue if your computer shows these
symptoms.
Your device is slow or crashes unexpectedly.
Your device is running out of hard drive space.
You get pop-ups when you are online or offline.
Examples of Spyware
The best-known examples of spyware are the following:
● Zlob -- or Zlob Trojan -- downloads itself onto a computer and records
keystrokes, as well as search and browsing history.
● Gator -- commonly found in file sharing software -- monitors victims'
web surfing habits in order to present them with better targeted ads.
● TIBS Dialer disconnects the user's computer from a local phone line
and instead connects it to a toll number that is designed for accessing
pornographic websites.
● CoolWebSearch takes advantage of security vulnerabilities found in
the Internet Explorer web browser in order to take control, change
settings and send browsing information to its authors.
● Internet Optimizer -- more popular in the days of dial-up connections --
initially promises to increase internet speeds but instead replaces all
error and login pages with ads.
How to remove spyware?
● Run a scan with your current security software to make sure it has
cleaned up everything it can. Next, download and run a virus
removal tool.
● There are also other reputable anti-spyware removal tools. Some
of them work only when you manually start the scan. Others
continuously monitor your computer to make sure spyware can’t
modify or monitor your information.
How to help prevent spyware?
● Here are four main steps to help prevent spyware.
● https://www.cryptool.org
● https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
● http://www.freewebmasterhelp.com/tutorials/cookies
Disclaimer- Parts of the content of this course is based on the materials available from the Web sites and books listed above. The
materials that can be accessed from linked sites are not maintained by Acropolis Institute of Technology and we are not responsible
for the contents thereof. All trademarks, service marks, and trade names in this course are the marks of the respective owner(s).
Any Doubts/Questions
Acropolis Institute of Technology and Research, Indore
Thank You
14