16
Spyware, Hoax emails, & Hackers

Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Embed Size (px)

Citation preview

Page 1: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Spyware, Hoax emails, & Hackers

Page 2: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

A number of companies have added forms of spyware into their products. These programs are not considered malware in the sense that they do harm to your computer, but are still spyware as they watch and observe for advertising purposes. This behind the scenes communication uses bandwidth, slows processes, and can become a nuisance when mulitple products run at the same time.

Page 3: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

It may be debatable if 'legitimate' uses of adware is malware since the user often has no knowledge of these programs have been installed on their computer and is generally unaware that these programs are spying on their privacy and using the resources of the host computer without permission.

Page 4: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Aureate / Radiate (The granddaddy of spyware)

"By using this software, you agree that you understand that this software will connect to the Internet UBIQUITOUSLY to download advertisements and/or to provide software updates.“

It was installed in over 30 million computers and spread over 500 ”advertising supported“ programsToday it is “Shipped” via Go!Zilla

Page 5: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Anti-Spyware software is available to monitor, stop, and remove spyware from computers. Some popular options are:

Spy Sweeper Ad-Aware Windows Defender Spyware Eliminator SpyBot

NOTE: Spy Deleter – Installs spyware

Page 6: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

When it comes to Hoax emails, don’t victimize yourself. Learn where to find legitimate information on hoaxes, myths etc. DO NOT forward warnings if you haven’t personally checked them out!

http://vil.mcafee.com/hoax.asphttp://vil.mcafee.com/hoax.asphttp://stc-annex.com/Res/virushoax.htm

Page 7: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Some guidelines about virus hoax emails:

If you receive a virus alert message, don't believe it.

There are warnings usually in ALL CAPS.

Look for multiple exclamation marks! ! !!!!!!!!! ! ! !!!!

“You will be safe only if you immediately delete”…. is almost universal in these email scams.

Page 8: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

It quotes an authoritative source like the FCC. (the FCC has never sent out an email alert.)

“This is the worst ever”,”most destructive”, ”Stealthiest”, “most polymorphic”……….

(it says) forward this mail to anyone you care about. (if you care about them, you won’t) This is a hoax’s replication engine….. YOU….This is what gives the fake virus the pesky lifelike ability to multiply. This is also a dead giveaway that it really is a hoax!

Page 9: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

A hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.

http://en.wikipedia.org/wiki/Hacker_(computer_security)

Page 10: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

As many as 33% of hackers are internal to the site hacked. Quiet often, they may be disgruntled employees.

Those external to the company comprise two groups in the hacker community:

Benevolent Hackers: Tend to use their talents to increase the level of expertise and awareness ofInformation Security “Look….I got in. You better fix this loophole!”

Page 11: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Malicious Hackers – Their main purpose is to disrupt, steal, or damage data information. 96% of external hackers are males between 16 and 24.

Page 12: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Motives for Malware

Extortion: “Give me money or I’ll take down your computer network.”

Theft: “What a nice list of credit card numbers; I’mgoing shopping!”

Page 13: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Motives for Malware

Commerce: “Hmm, that address book is full of valid email addresses, let’s sell them some V1agr@!”

Terrorism: “The godless west will weep tears of anguish when we shut down their imperialist internet!”

Mischief: “I’m the #1 H@KR D00D!”

Page 14: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

What Can Malware Hope to Achieve?

Financial Gain $$$Access to computer resourcesCPU, memory, storage, network connectivity

Access to dataFinancial information (e.g. credit card numbers)Personal information (e.g. address books)

Access to other computersConfusion, damage, destruction

Page 15: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

How can you fight back against Malware?

Run a secure operating system like UNIX or Macintosh OS.

Use security features to reduce and monitor viruses, spyware, and other malicious code.

Buy or install free virus protection software. (update and scan regularly)

Avoid programs from unknown sources (like the Internet).

Page 16: Spyware, Hoax emails, & Hackers. A number of companies have added forms of spyware into their products. These programs are not considered malware in the

Stick with commercial software purchased on CDs.

Some known malware may have clean-up utilities available from software vendors like Microsoft or an Anti-virus company like Symantec.

Backups are your best recovery should malware destroy your data. Ensure you use a backup copy from before the infection date.