Spyware
Download
1 / 48

- PowerPoint PPT Presentation


  • 419 Views
  • Updated On :

Spyware Spam Phishing Your Computer could be watching your every move Spyware – What is it?

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '' - libitha


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg



Slide3 l.jpg

Spyware your every move – What is it?

Also called adware, any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes


Slide4 l.jpg

Many flavors of Spyware your every move !

Malware

Hijacker

Dialer

Trojan Horse


Slide5 l.jpg

Malware your every move

Modifies your PC’s settings and performs undesirable tasks without your knowledge or permission!!!!!!!


Slide6 l.jpg

Hijacker your every move

Takes you to Websites that you don’t want to go to!


Slide7 l.jpg

Dialer your every move

Dials a service, most likely porn sites, and bills you!


Slide8 l.jpg

Trojan Horse your every move

Internet Downloads that are activated from programs you run - they can take control over your PC!



Slide10 l.jpg

Spyware Symptoms can not see it!

  • Delivers Pop-Up Adds to your PC on a regular basis

  • Sends you customized spam to your e-mail address

  • Slows down your Computer sometimes to a crawl

  • Crashes your Computer and/or causes major damage

  • Changes the Home page of your Internet Browser


Slide11 l.jpg

Today’s Top Spyware can not see it!

Gator Bonzai Buddy

CoolWeb Toolbar N-Case

My Search Toolbar Jupiter

N-Case Double Click

E-Zula Alexa

Comet Cursor Hotbar


Slide12 l.jpg

Statistics can not see it!

 40 Million people have Spyware on their PC’s

 45 % of files downloaded through Kazaa contain malicious code

 There are more than 25,000 spyware progams and more growing exponentially

 The number of malicious code attacks used to steal sensitive information rose 50% in 2004


Slide13 l.jpg

Free Software can not see it!

Hidden Costs

Productivity

Technician Fees

Identity Theft


Slide14 l.jpg

How do you get Gator? can not see it!

E-Wallet – Software

Date Time Precision Manager

Weatherbug


Slide15 l.jpg

Driveby Spyware? can not see it!

Sometimes all you do is visit a site and and spyware downloads to your PC automatically.


Slide16 l.jpg

50% of all Free Software is bundled with spyware. “Data Mining“ companies pay a lot of $$ to the smaller developers to include spyware with their products . This offer is very enticing for small companies, it helps them survive.


Slide17 l.jpg

Some people believe that Spyware has advantages, like delivering “wanted“ advertisements to you while you are surfing the net sort of like TV. Data analysis of Spyware data (your personal information) is now a big thriving enterprise. Examples are your Value Cards from Ukrops!


Slide18 l.jpg

Gator has 300 clients as of 2003, including four of the top six automotive companies and businesses that sell everything from mortgages to diapers. It sends an average of 100 ads per week per person to more than 15 million people!


Slide19 l.jpg

Have you ever noticed how some people have things attached to the bottom of their E-mails? One of these products is called Hotbar – it can be very damaging and people are enticed by the cute little smiley faces they can get for free!


Slide20 l.jpg

Coolsavings and Free Coupon Offers Online to the bottom of their E-mails? One of these products is called Hotbar – it can be very damaging and people are enticed by the cute little smiley faces they can get for free!

They install software on your PC and collect your information and then they e-mail it back to other companies.


Slide21 l.jpg

Do you read a lot? to the bottom of their E-mails? One of these products is called Hotbar – it can be very damaging and people are enticed by the cute little smiley faces they can get for free!

Most EULAs or End User License Agreements would take you the rest of this evening to read! This is where they ask for permission to install their spyware, steal your personal information and change settings in your PC and by checking “OK” - you have given them permission to change your PC and its settings.


Slide22 l.jpg

Kazaa Popular File Swapping Program to the bottom of their E-mails? One of these products is called Hotbar – it can be very damaging and people are enticed by the cute little smiley faces they can get for free!

The terms of service contract states: “Brilliant might tap the unused computing power and storage space of your Computer”


Slide23 l.jpg

Some Spyware can actually can turn your company into a node or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!


Keyloggers l.jpg
Keyloggers or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Will keep track of all your keystrokes and can record credit card information, passwords, addresses, etc.


Slide25 l.jpg

Summary of Effects or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • Collection of Data from your PC without your consent

  • Execution of Malicious code without your knowledge

  • Collects data pertaining to your habitual use and sells it to marketing companies

  • Makes it impossible to remove their software by standard methods and sometimes not at all

  • Performs other undesirable tasks on your PC such as using your PC as a go between between other PC’s and their servers


Slide26 l.jpg

Damage your PC – How? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • Control Panel will not open up or take 5-10 minutes to open

  • Internet Explorer can stop working or not access particular websites. Some even keep you from accessing Microsoft.com

  • You change your Home Page and when you reboot it has changed back to an Adult Links Pornographic Site

  • Why? Badly written programs often corrupt windows system files.

  • Your computer will have too many processes running on it to be operational. In this case it is often necessary to wipe it clean and start new. This can range between $100 - $250 depending on where you take your PC to be fixed. Many simply buy a new PC thinking there PC is not working.


Slide27 l.jpg

What can I do ? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Fortunately there is software out there that can aid you in :

1. Removing existing Spyware

2. Keep Spyware from Infecting your PC in the first place


Slide28 l.jpg

What can I do ? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Be Cautious about what Sites you Visit

Search the Site before you Surf there

If you suspect spyware is downloading – unhook your Internet Connection

Always Turn off your PC at night

Be Careful of hitting the Red X!


Slide29 l.jpg

Spyware Detection + or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Removal Tools

  • Spybot – Search and Destroy

  • Adaware – Lavasoft

  • Spysweeper and Pest Control


Slide30 l.jpg

Spam - Coming to an Inbox near you ! or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Spam – Unsolicited email that you did not sign up for or want to receive. Technically it does not include Email that you have “opted-in” for even if by accident .


Slide31 l.jpg

Who is sending Spam? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Hackers who make $

Students are paid $ to operate Spam servers.

Jobless people trying to make $ sending bulk emails


Slide32 l.jpg

Why do they Spam? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

- 5000 out of every million people respond to Spam

- They only need one out of 10,000 to break even

- 200 million messages can be delivered by one Spammer per day

- 100 million addresses can cost less than $100.00


Slide33 l.jpg

  • Spam Facts or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • 30 billion $ is spent currently to fight Spam corporate wide

  • 75% of all Email is Spam

  • In one Month at VBMB we received 47,000 Known Spam E-mails

  • 1/3 of all Spam is sent from Home PC’s unwillingly


Slide34 l.jpg

  • How do they get your address? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • Software programs cost less than $50.00 can mine addresses from the Internet

  • Personal Information you gave to an untrusted site

  • You were infected with Spyware at one point

  • You volunteered personal information when someone went Phishing

  • Forwarding a joke containing yours and your friends address


Slide35 l.jpg

  • Brute Force Attack or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • Spammers use automated software that looks for domains through out the internet such as VBMB.org

  • Next they use the software to generate dictionaries of every possible user name

  • That is why you see some spam that doesn’t have your name spelled correctly

  • Some internet worms collect personnel info also

  • If you are lucky your email addy is the only thing the worm took from you.


Slide36 l.jpg

  • How to Protect yourself from Spam or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • For Home – buy a spam filter if your ISP doesn’t provide you with one

  • Watch where you buy things from online – research all companies

  • Don’t post your email address anywhere!

  • When buying things online – use another email account such as a Hotmail account – free from MSN

  • Never reply or buy something from a Spam Email


Slide37 l.jpg

  • Protecting your PC or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • 1000s of PCs have been infected by Viruses and Spyware that turn your PC into a Spam Relay Server!

  • Keep Spyware out by installing Spysweeper which can monitor your PC constantly against threats!

  • Keep your Virus Definitions List up to Date!


Slide38 l.jpg

  • Spam Prevention or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Use common sense to detect the veracity behind an email message

If an email seems suspicious it probably is – check out Http:.//hoaxbusters.ciac.org

Never forward a chain letter of any type

Never click on a Image or URL on a Spam Email they use Embedded Images and can watch you do it

Never Reply to a Request to be removed from an Email List – this only verifies the Email address. There are some exceptions.


Slide39 l.jpg

  • Going Phishing Anyone? or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

Phishing attacks use 'spoofed' e-mails and fraudulent websites and are designed to fool recipients into divulging personal data such as credit card numbers, account usernames and passwords, social security numbers, etc.


Slide40 l.jpg

  • Phishing Report or a “Bot” and run a peer to peer network which is controlled by another company. They can use your PC to help them analyze and store other people’s data! Kazza and AudioGalaxy are just a few that do this!

  • First Phishing attacks started in 2002

  • From Nov 2003 – May 2004 # of attacks rose by 4000%

  • Phishers Catch between 5 and 20% of all Users


Slide41 l.jpg

Phishing Emails pretend to be from a Legitimate Bank, agency or even eBay!

Subject: eBay Account VerificationDate: Fri, 20 Jun 2003 07:38:39 -0700From: "eBay" <[email protected]>Reply-To: [email protected]: Dear eBay member, As part of our continuing commitment to protect your account and to reduce the instance of fraud on our website, we are undertaking a period review of our member accounts. You are requested to visit our site by following the link given below http://arribba.cgi3.ebay.com/aw-cgi/ebayISAPI.dll?UpdateInformationConfirm&bpuser=1Please fill in the required information. This is required for us to continue to offer you a safe and risk free environment to send and receive money online, and maintain the eBay Experience. Thank you Accounts Management As outlined in our User Agreement, eBay will periodically send you information about site changes and enhancements. Visit our Privacy Policy and User Agreement if you have any questions.


Slide42 l.jpg

“Phishing" spam messages use legitimate 'From:' email addresses, logos, and links to reputable businesses such as AOL, PayPal, Best Buy, EarthLink and eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information to the scam artists. If you click on a link in an e-mail message from a company be aware that many scam artists are making forgeries of company's sites that look like the real thing. Beware the entire Email is one big link to steal information from you!


Slide46 l.jpg

What to do if you think you have responded to one by accident

If you have provided your personal information in response to a phishing email, you should assume that you will become a victim of identity theft.

If you provided your bank account or credit card number, you should cancel that account and open a new one immediately


Slide47 l.jpg

Phishing can occur accident

By Phone

Door to Door

Potential Employers


Slide48 l.jpg

Preventing Phishing accident

NEVER respond to an Email asking for Personal Information

Always Check a Site first to see if it is Secure

Retype a Websites address in, never click on the link of an address as it can be forged

Keep your PC secure with Anti-Spam and Anti-Virus Software

Check your Bank accounts regularly

Always take your time when responding to an email - Be extra cautious about all emails that want you to reply to them in some way!


ad