The Threat of Spyware

While you’re surfing the Web, tiny computer programs are hard at work behind the scenes–gathering information about what you do, who you are, and who your friends are. These programs compile this and other information, and transmit it to a covert host. On the other end, someone takes that information and uses it for the purpose of sending you spam email or delivering pop-up advertisements, or worse, uses it for the purpose of identity theft.

It’s called spyware, and it’s the greatest threat to ever hit the Internet. In its most seemingly innocuous form, it’s called adware, and is delivered to your computer–usually without your knowledge–as part of some other program or utility. But while suffering through a few ads may seem like a small price to pay for that cool new game you downloaded, think again. The licensing terms of the adware you clicked on very likely allows the adware company to sell information to third parties. It also allows them to insert that piece of software onto your PC, which ultimately eats bandwidth as it constantly transmits information back to the host. Before you know it, you’re killing pop-ups every ten seconds, you are drowning in spam, and your system crashes on a daily basis.

Because spyware is an independent, executable program, it can be designed to do just about anything. Besides tracking your web surfing habits, it can also be programmed to examine your hard drive, copy files and transmit them to a third party, change system and registry settings, or even steal passwords or credit card numbers.

Getting rid of spyware isn’t easy, since it comes into your PC through any one of a variety of techniques. Installing one of the new “anti-spyware” software packages is a start, but these single-point solutions won’t provide you with a comprehensive fix. Here are a few tips on how to keep spyware at bay:

�· Keep your anti-virus software up to date. Many (but not all) spyware programs are classified by anti-virus packages as Trojans, and will be caught by the anti-virus software.
�· Implement a URL filtering solution. Some spyware programs launch automatically when certain web pages are visited. Porn sites are notorious for containing spyware. A good URL filter will prevent users from accessing web sites that are likely to contain spyware.
Ã?· Beware of email attachments. Spammers send out emails with attachments, attempting to trick you into clicking on them–but when you do, you get spyware.
�· If you use a firewall, disallow certain file types that are likely to be spyware, such as .exe or .vbs files, Java, or ActiveX.
Ã?· Don’t use Instant Messaging or Peer-to-Peer (P2P) sharing programs, or if you do, be extremely cautious while doing so–always know ahead of time what you are downloading and who it is from. These types of programs, while convenient, often serve as a conduit for spyware.

It’s not always immediately obvious that you have allowed spyware to be downloaded into your PC or network. Nonetheless, if you have not taken preventative steps in the past, it’s very likely that your system has been infected. Your system may contain spyware if any of the following occurs:

�· Your Web browser opens to a different home page
�· Your system may have extra icons, or your browser may have extra toolbars that you did not install
Ã?· Your web browser’s “Favorites” list contains web pages you did not put there
�· When web browsing you notice an unusual amount of pop-up ads, often unrelated to sites you are viewing
�· Your system takes longer to boot up, or just operates slower than normal

According to IDC 67 percent of all computers have some type of spyware on it. Additionally, Osterman Research shows that 44 percent of home users use email and the Web less today than a year ago, due to the threats of spyware, spam and other related problems. Fortunately, existing security technology, along with adherence to accepted security practices, can keep this threat from damaging your computer, draining your productivity, and possibly even stealing your identity.

Leave a Reply

Your email address will not be published. Required fields are marked *


8 − two =