Steer Clear of Spyware

 

Steer Clear of Spyware

Spyware/Adware They are watching you.Spyware programs track and monitor Internet browser usage, secretly collecting your information to use for commercial purposes. If there is spyware on your computer, what you are doing and where you are going on the Internet is being transmitted to remote servers of third parties so they can display targeted advertisements to you–a lot of targeted advertisements, in case you haven’t noticed. Spyware and adware are often thought of as the same thing, and this is a common misconception. Adware is less invasive, and much less intelligent than spyware. Adware takes the form of random pop-up ads. For example, let’s say you’re on a recipe Web site, and all of a sudden a pop-up advertisement of an Internet casino appears. That’s adware. Spyware goes a step further because it collects information about your Internet habits and uses that to tailor unsolicited pop-up advertising to your interests.

 

 

Chances are you or someone you know has run into a problem with spyware. If the computer suddenly becomes unresponsive, or is barraged with an onslaught of pop-up windows that make it nearly impossible to do anything, these are signs of a spyware infection. Spyware slows down your computer because the software is always running in the background, using your computer’s processing power and Internet connection to send the data that’s been collected about you to a third party. In addition to the annoying pop-ups and computer slowdowns, you can see evidence of a spyware problem if other abnormal things happen, such as: strange toolbars appearing, icons for software you didn’t install showing up on your desktop, new bookmarks in your favorites list that you didn’t add, or a site you don’t intend to visit keeps appearing as your homepage.

How spyware gets on your machine:  The creators of spyware are tricky. They have to be–because they know that no one would consciously agree to let it into their computer. So they turn to a variety of methods to get you to allow them access to your PC. Here are some of the most common methods:

Piggyback onto other downloads by becoming part of the end-user agreement for another software program. If you agree without reading the details, you may be consenting to spyware being put on your machine. This is common practice in almost all free file-sharing services that are available for download. It is wise to do a “custom” rather than “default” install so you can see firsthand what is being installed on to your computer and make sure no unnecessary software makes it onto your PC.

Pop-up messages:  No matter how “official,” important, or helpful they look, think twice before clicking on any pop-up message. Spyware creators will use pop-ups that prey on human emotions–telling you that your computer is infected, or you have a virus. They also will send you pop-ups that are similar in nature to the Web site you are visiting. These are all direct routes for spyware to get into your computer.

Internet sites that attempt to install plug-ins or extra features. Sometimes there are legitimate reasons to install such things–but for the most part, if a Web site that is not well known or is not sponsored by a company you have heard of and can trust, is asking you to install add-ons, be careful! Watch what you click and don’t install plug-ins unless you are positive they are coming from a legitimate source.

Government is stepping in: Spyware is big business–and its creators are just getting more tricky and underhanded with their methods, and this will continue as long as they can get away with it. However, in recent months lawmakers have begun to get serious about reining in spyware activities. Just months after finalizing the CAN-SPAM act, legislators are now dealing with spyware, which many consider to be more potentially damaging than Spam if not stopped.

H.R. 2929, the “Securely Protect Yourself Against Cyber Trespass Act” (SPY-ACT) is currently working its way through Congress, and contains measures to make it illegal to install software on somebody else’s computer without notice and consent. It also requires spyware programs to be easily identifiable and removable. Hefty fines up to $3 million are proposed. The recently revised version of SPY-ACT also includes provisions that prohibit unfair or deceptive behavior in the form of keystroke logging, computer high-jacking, and the display of advertisements like pop-ups that cannot be closed.

The same day the SPY-ACT was passed in the House, a newer and some say more comprehensive bill, the Internet Spyware Prevention Act (I-SPY) of 2004 was introduced. Unlike the SPY-ACT, I-SPY doesn’t focus on define what the computer software should or shouldn’t do. It focuses more on the punishing the criminal behavior involved, and the privacy and security risk that spyware introduces. I-SPY also has more teeth–it includes criminal penalties of up to five years in prison.

States are slowly getting into the act too. Utah was the first state to pass an anti-spyware law, but it has yet to be implemented, thanks to an injunction by two spyware operators. Meanwhile, the state of California is currently considering two anti-spyware bills.

Conclusion: While we are still waiting for laws to curb spyware, it is up to computer users to be more vigilant about turning away spyware that comes knocking at their door whenever they’re online. Chances are there is some kind of spyware currently running on your computer even though you may have not noticed it. Meanwhile that spyware has been busy getting to know your Internet browsing habits. In general, you should be very wary of what you download and install onto your computer. Read all agreement terms before accepting anything, and if you get the sense you might be getting into more than what you want, cancel out of it. No download is worth losing your privacy over!

–reprinted from Symantec

 

Carl Mazzanti is Co-Founder and President of eMazzanti Technologies, Microsoft’s four time Partner of the Year and one of the premier IT consulting services for businesses throughout the New York metropolitan area and internationally. Carl and his company manage over 400 active accounts ranging from professional services firms to high-end global retailers.

eMazzanti is all about delivering powerful, efficient outsourced IT services, such as computer network management and troubleshooting, managed print, PCI DSS compliance, green computing, mobile workforce technology, information security, cloud computing, and business continuity and disaster recovery.  

Carl Mazzanti is also a frequent business conference speaker and technology talk show guest and contributor at Microsoft-focused events, including frequent prominent roles at the Microsoft Inspire (Worldwide Partner Conference / WPC).

Carl, a serial Entrepreneur, gives back to the community through Entrepreneur teaching engagements at Georgetown University, the company’s ocean wildlife conservation effort, the Blue Project, and Tree Mazzanti.

SHARE:

Facebook
Twitter
LinkedIn

Video Resources

Are You It Resources Effective In The New Normal

VIDEO/WEBINAR

Are Your IT Resources Effective in the New Normal?

Align2020 A Virtual Conference

VIDEO/VIRTUAL CONFERENCE

Align 2020
Cyber Security, Compliance & Collaboration

Best Practices For Working In A Modern, Mobile, And Secure Environment

VIDEO/WEBINAR

Best Practices for Working in a Modern, Mobile, and Secure Environment

NEWSLETTER