Spyware is one of the fastest-growing internet threats.
According to the National Cyber Security Alliance, spyware infects
more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls
and anti-virus software without the user’s knowledge. Once embedded in a computer, it can wreak havoc on the
system’s performance while gathering your personal information.
Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.
Origin of Spyware
Typically, spyware originates in three ways. The first and
most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a
freeware or shareware program without the user’s knowledge. The
user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data
for the spyware author’s personal use or to sell to a third-party. Beware of many P2P file-sharing programs.
They are notorious for downloads that possess spyware programs.
The user of a downloadable program should pay extra attention
to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program
will be installed along with the requested program. Unfortunately, we do not always take the time to read the
fine print. Some agreements may provide special “opt-out” boxes that the user can click to stop the spyware from
being included in the download. Be sure to review the document before signing off on the
download.
Another way that spyware can access your computer is by
tricking you into manipulating the security features designed to prevent any unwanted installations. The
Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why
the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a
pop-up modelled after a standard Windows dialog box, may appear on your screen. The message may ask you if you
would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button
you push, a download containing the spyware program will commence. The Edge browser, the successor of Internet
Explorer, is now making this spyware pathway a little more difficult.
Finally, some spyware applications infect a system by
attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a
spyware author, the page contains code designed to attack the browser, and force the installation of the spyware
program.
Annoying deeds by Spyware
Spyware programs can accomplish a multitude of malicious
tasks. Some of their deeds are simply annoying for the user; others
can become downright aggressive in nature.
Spyware can:
1.
Monitor your keystrokes for reporting
purposes.
2.
Scan files located on your hard drive.
3.
Snoop through applications on our
desktop.
4.
Install other spyware programs into your
computer.
5.
Read your cookies.
6.
Steal credit card numbers, passwords, and other
personal information.
7.
Change the default settings on your home page web
browser.
8.
Mutate into a second generation of spyware
thus making it more difficult to eradicate.
9.
Cause your computer to run
slower.
10. Deliver
annoying pop up advertisements.
11. Add advertising
links to web pages for which the author does not get paid. Instead,
payment is directed to the spyware programmer that changed the original affiliate’s settings.
12. Provide the
user with no uninstall option and places itself in unexpected or hidden places within your computer making it
difficult to remove.
Spyware Prevention
There are a couple things you can do to prevent spyware from
infecting your computer system. First, invest in a reliable commercial anti-spyware program. There are several
currently on the market including standalone software packages. Other options provide the anti-spyware software
as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and
McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any
found spyware software. As with most programs, update your anti-virus software frequently.
And, when all else fails?
Finally, if your computer has been infected with a large
number of spyware programs, the only solution you may have is backing up your data, and performing a complete
reinstall of the operating system.
|