Download Spyware: Who is Spying

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Spyware wikipedia , lookup

Transcript
Spyware is one type of malicious software (malware) that collects information from a computing system without
your consent. Spyware can capture keystrokes, screenshots, authentication credentials, personal email addresses, internet usage habits, and other personal information. Often, the data is delivered
to online attackers who sell it to others
or use it themselves to execute financial
crimes, identity theft, or use it for marketing or spam. Spyware tracks online
activity looking for web sites visited,
financial data or identity data such as
credit card numbers entered into fields,
browsing and online purchasing habits,
and authentication credentials. When
keywords of interest like names of
banks, online payment systems or pornographic web sites are observed, the
spyware starts its data collection process.
Spyware:
Who is Spying
Provided by:
Warren County
Information Technology Department
301 N Buxton St
Indianola, IA 50125
Phone: 515-961-1166
www.co.warren.ia.us
Who Is Spying?
How Spyware Operates
Safe Practices
The people who use spyware include
•
online attackers
•
marketing organizations
•
organized crime
•
trusted insiders
• Government sponsored espionage
• Corporate sponsored espionage
Email Addresses
Email addresses can be used from an infected
computer and marketed for use in spam mailing lists.
•
•
•
The Keys You Press
Key logging is one of the first spyware techniques used. Both hardware and software
key loggers exist. Software key loggers capture keyboard events and record the keystroke data before it is sent to the intended
application for processing. Many keyloggers
target Instant Messaging clients, email applications, and web browsers but might ignore
other applications that don’t provide the kind
of data the attacker is targeting for harvest.
•
Network Traffic
Network traffic is another valuable source of
data. Some data commonly extracted include
user names, passwords, email messages, and
web content.
•
Online Attackers
Online attackers primary interest in spyware is using it to steal personal information for financial crimes such as illicit trafficking in stolen credit card and
credit card information.
Marketing Organizations
Marketing organizations are interested
in personal information such as email
addresses, online shopping and browsing habits that can be used to execute
marketing campaigns like spam, spim
(unsolicited messages received via instant messaging systems), browser
popups, home page hijacking (changing
the default web address for a user’s
browser), and more.
Spying by a Trusted Insider
A trusted insider might be an employee
who uses spyware to collect business
information which can be sold or used
to gain access to more valuable information at some later time.
Frequently, attackers and their malware impersonate associates of the target user to coax
them into installing the malicious code. A
common example of this is when malware
infects a system and then automatically
emails itself to everyone in the infected persons’ address book. When such an email is
received, the recipient is more likely to open
the contents because the sender may be a
familiar, trusted source.
•
•
•
•
•
Assign a complex password to your computer.
Pause before you open attachments/links.
Press ALT-F4 to close a popup or click on the
“X”. Clicking on “No” or “Cancel” sometimes
installs spyware.
Beware of visiting untrusted web pages.
Download from reputable sites.
Install software to detect spyware/adware and
set it for regular, automatic updates.
Share files only with people you trust.
Pay attention when installing applications, you
may actually be agreeing to the install of spyware/adware that are not desired.
Do not install free utilities on your computer.
They can come with adware/spyware and bring
your computer to a grinding halt.
Keep your operating system and software current with updates and patches.
If you are running Windows XP, install Service
Pack 2.
Symptoms of a Compromised Computer
•
•
•
•
•
•
•
Slow or non-responsive?
Running programs that you weren't expecting?
Showing signs of high level of activity to the
hard drive that is not the result of anything
you initiated?
Running out of disk space unexpectedly?
Unable to run a program because you don’t
have enough memory?
Program constantly crashing?
Rejecting a valid and correctly entered password?