1 / 16

Spyware, Hoax emails, & Hackers

Spyware, Hoax emails, & Hackers.

alia
Download Presentation

Spyware, Hoax emails, & Hackers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spyware, Hoax emails, & Hackers

  2. A number of companies have added forms of spyware into their products. These programs are not considered malware in the sense that they do harm to your computer, but are still spyware as they watch and observe for advertising purposes. This behind the scenes communication uses bandwidth, slows processes, and can become a nuisance when mulitple products run at the same time.

  3. It may be debatable if 'legitimate' uses of adware is malware since the user often has no knowledge of these programs have been installed on their computer and is generally unaware that these programs are spying on their privacy and using the resources of the host computer without permission.

  4. Aureate / Radiate (The granddaddy of spyware) "By using this software, you agree that you understand that this software will connect to the Internet UBIQUITOUSLY to download advertisements and/or to provide software updates.“ It was installed in over 30 million computers and spread over 500 ”advertising supported“ programs Today it is “Shipped” via Go!Zilla

  5. Anti-Spyware software is available to monitor, stop, and remove spyware from computers. Some popular options are: Spy Sweeper Ad-Aware Windows Defender Spyware Eliminator SpyBot NOTE: Spy Deleter – Installs spyware

  6. When it comes to Hoax emails, don’t victimize yourself. Learn where to find legitimate information on hoaxes, myths etc. DO NOT forward warnings if you haven’t personally checked them out! http://vil.mcafee.com/hoax.asp http://vil.mcafee.com/hoax.asp http://stc-annex.com/Res/virushoax.htm

  7. Some guidelines about virus hoax emails: • If you receive a virus alert message, don't believe it. • There are warnings usually in ALL CAPS. • Look for multiple exclamation marks! ! !!!!!!!!! ! ! !!!! • “You will be safe only if you immediately delete”…. is almost universal in these email scams.

  8. It quotes an authoritative source like the FCC. (the FCC has never sent out an email alert.) • “This is the worst ever”,”most destructive”, ”Stealthiest”, “most polymorphic”………. • (it says) forward this mail to anyone you care about. (if you care about them, you won’t) This is a hoax’s replication engine….. YOU….This is what gives the fake virus the pesky lifelike ability to multiply. This is also a dead giveaway that it really is a hoax!

  9. A hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them. http://en.wikipedia.org/wiki/Hacker_(computer_security)

  10. As many as 33% of hackers are internal to the site hacked. Quiet often, they may be disgruntled employees. Those external to the company comprise two groups in the hacker community: Benevolent Hackers: Tend to use their talents to increase the level of expertise and awareness of Information Security “Look….I got in. You better fix this loophole!”

  11. Malicious Hackers – Their main purpose is to disrupt, steal, or damage data information. 96% of external hackers are males between 16 and 24.

  12. Motives for Malware Extortion: “Give me money or I’ll take down your computer network.” Theft: “What a nice list of credit card numbers; I’m going shopping!”

  13. Motives for Malware Commerce: “Hmm, that address book is full of valid email addresses, let’s sell them some V1agr@!” Terrorism: “The godless west will weep tears of anguish when we shut down their imperialist internet!” Mischief: “I’m the #1 H@KR D00D!”

  14. What Can Malware Hope to Achieve? Financial Gain $$$ Access to computer resources CPU, memory, storage, network connectivity Access to data Financial information (e.g. credit card numbers) Personal information (e.g. address books) Access to other computers Confusion, damage, destruction

  15. How can you fight back against Malware? Run a secure operating system like UNIX or Macintosh OS. Use security features to reduce and monitor viruses, spyware, and other malicious code. Buy or install free virus protection software. (update and scan regularly) Avoid programs from unknown sources (like the Internet).

  16. Stick with commercial software purchased on CDs. Some known malware may have clean-up utilities available from software vendors like Microsoft or an Anti-virus company like Symantec. Backups are your best recovery should malware destroy your data. Ensure you use a backup copy from before the infection date.

More Related