Internet Security Information |
|
Is Spyware Watching You?
Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy. I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton). At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer. "Spyware" is software that gets onto your computer and literally "spies" on your activities. The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer. Three primary types of spyware exist to complicate your online life, including: 1. "cookies" Cookies represent mostly a danger of lost privacy. In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable. "Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things. "Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage. Spyware gets on your computer in one of several different ways. First, it rides along with software you download from the 'Net and install on your system. Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message. Third, hackers find an open port on your computer and use the "back door" to install basically anything they want. And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing. Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection? In a word: NO! I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer. You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily. Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer. One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture. I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC): 1. "Ad Aware" from lavasoft.de The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat. ~ Keep your anti-virus program current (c) Jim Edwards - All Rights reserved About the Author: Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs. Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> Turn Words Into Traffic
|
RELATED ARTICLES
Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue. Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. In recent years this has become a major issue. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. These are the infections that slow your computers performance and expose your confidential information to hackers. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions of every kind. Obviously, you're infected! Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar? Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Instant gratification, so coveted by our lifestyles, is something to be very wary of in the realm of online business. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology. As soon as they discover this, they start using computers and the Internet more and more, but at the same time not considering the threats that are coming in from all sides. They should know that if you don't protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind were the viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message onto the user's computer screen. Also the spread rate was slow, because not many people were connected to the Internet. But now the majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast. Identity Theft - Dont Blame The Internet Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must have heard that such a tradegy is called identity theft and millions of people in the USA alone suffer the same every year. Poor consolation for its victims, isn't it? Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks. Viruses and Worms: The Problems and Their Solutions History and Background New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. |
home | site map |
© 2005 |