Spyware Spam Phishing Your Computer could be watching your every move Spyware – What is it?
Your Computer could be watching your every move
Also called adware, any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes
Modifies your PC’s settings and performs undesirable tasks without your knowledge or permission!!!!!!!
Takes you to Websites that you don’t want to go to!
Dials a service, most likely porn sites, and bills you!
Internet Downloads that are activated from programs you run - they can take control over your PC!
Spyware runs in the background behind the scenes, where you can not see it!
Gator Bonzai Buddy
CoolWeb Toolbar N-Case
My Search Toolbar Jupiter
N-Case Double Click
Comet Cursor Hotbar
40 Million people have Spyware on their PC’s
45 % of files downloaded through Kazaa contain malicious code
There are more than 25,000 spyware progams and more growing exponentially
The number of malicious code attacks used to steal sensitive information rose 50% in 2004
E-Wallet – Software
Date Time Precision Manager
Sometimes all you do is visit a site and and spyware downloads to your PC automatically.
50% of all Free Software is bundled with spyware. “Data Mining“ companies pay a lot of $$ to the smaller developers to include spyware with their products . This offer is very enticing for small companies, it helps them survive.
Some people believe that Spyware has advantages, like delivering “wanted“ advertisements to you while you are surfing the net sort of like TV. Data analysis of Spyware data (your personal information) is now a big thriving enterprise. Examples are your Value Cards from Ukrops!
Gator has 300 clients as of 2003, including four of the top six automotive companies and businesses that sell everything from mortgages to diapers. It sends an average of 100 ads per week per person to more than 15 million people!
Have you ever noticed how some people have things attached to the bottom of their E-mails? One of these products is called Hotbar – it can be very damaging and people are enticed by the cute little smiley faces they can get for free!
They install software on your PC and collect your information and then they e-mail it back to other companies.
Most EULAs or End User License Agreements would take you the rest of this evening to read! This is where they ask for permission to install their spyware, steal your personal information and change settings in your PC and by checking “OK” - you have given them permission to change your PC and its settings.
The terms of service contract states: “Brilliant might tap the unused computing power and storage space of your Computer”
Some Spyware can actually can turn your company into a node or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!
Will keep track of all your keystrokes and can record credit card information, passwords, addresses, etc.
Fortunately there is software out there that can aid you in :
1. Removing existing Spyware
2. Keep Spyware from Infecting your PC in the first place
Be Cautious about what Sites you Visit
Search the Site before you Surf there
If you suspect spyware is downloading – unhook your Internet Connection
Always Turn off your PC at night
Be Careful of hitting the Red X!
Spam – Unsolicited email that you did not sign up for or want to receive. Technically it does not include Email that you have “opted-in” for even if by accident .
Hackers who make $
Students are paid $ to operate Spam servers.
Jobless people trying to make $ sending bulk emails
- 5000 out of every million people respond to Spam
- They only need one out of 10,000 to break even
- 200 million messages can be delivered by one Spammer per day
- 100 million addresses can cost less than $100.00
Use common sense to detect the veracity behind an email message
If an email seems suspicious it probably is – check out Http:.//hoaxbusters.ciac.org
Never forward a chain letter of any type
Never click on a Image or URL on a Spam Email they use Embedded Images and can watch you do it
Never Reply to a Request to be removed from an Email List – this only verifies the Email address. There are some exceptions.
Phishing attacks use 'spoofed' e-mails and fraudulent websites and are designed to fool recipients into divulging personal data such as credit card numbers, account usernames and passwords, social security numbers, etc.
“Phishing" spam messages use legitimate 'From:' email addresses, logos, and links to reputable businesses such as AOL, PayPal, Best Buy, EarthLink and eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information to the scam artists. If you click on a link in an e-mail message from a company be aware that many scam artists are making forgeries of company's sites that look like the real thing. Beware the entire Email is one big link to steal information from you!
If you have provided your personal information in response to a phishing email, you should assume that you will become a victim of identity theft.
If you provided your bank account or credit card number, you should cancel that account and open a new one immediately
Door to Door
NEVER respond to an Email asking for Personal Information
Always Check a Site first to see if it is Secure
Retype a Websites address in, never click on the link of an address as it can be forged
Keep your PC secure with Anti-Spam and Anti-Virus Software
Check your Bank accounts regularly
Always take your time when responding to an email - Be extra cautious about all emails that want you to reply to them in some way!