Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and literally "spies" on your activities.
The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.
Three primary types of spyware exist to complicate your online life, including:
1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.
"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different ways.
First, it rides along with software you download from the 'Net and install on your system.
Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.
Third, hackers find an open port on your computer and use the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.
You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.
I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.
~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.
(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com
About the Author:
Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> Turn Words Into Traffic
You'd better learn news from media, not from emails, security... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
There are ways to insure security though. You can get... Read More
Whether we like it or not, we are all living... Read More
Let us take the example of scrambling an egg. First,... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
So called phishers try to catch the information about the... Read More
P C. owners are constantly at risk from attacks by... Read More
Threats we ordinary Web users face online leave us no... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Before you enter your name, address or any other data... Read More
If you use the internet, you have probably been infected... Read More
There is nothing more important that password security in world... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
During the release of a new software product specialized to... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Someone recently told me, "You would have to be a... Read More
The Threat10 years ago you could probably have run no... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Every now and then you can read about a new... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Today the internet is a mine field of malicious code... Read More
Security leaks can be a big problem for any site... Read More
I am the victim of an internet scam. It is... Read More
The most frustrating part of having Spyware on your computer... Read More
So called phishers try to catch the information about the... Read More
Fishing on the Internet has come a long way. However,... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Since its birth, the Internet has grown and expanded to... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
You may not realize it, but as you are surfing... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
As more people are logging onto the Internet everyday, Network... Read More
Identity theft is one of the most common criminal acts... Read More
In today's times spyware is a very serious issue and... Read More
If you know what is the 'Fishing' then it's very... Read More
Computer security for most can be described in 2 words,... Read More
Have been an Internet user for more than 9 years,... Read More
Ok, you've got a computer, and you get online. You... Read More
Microsoft routinely releases new security updates, many of which are... Read More
First of all we need to get some terms stated.... Read More
My first experience with a spyware BHO based infection was... Read More
At this point, if you've got the whole "turning the... Read More
First off I should explain what phishing is. Phishing is... Read More
Well, if that would have been said to me by... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Have you ever bought a product or service from the... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
There are several basic concepts to keep in mind when... Read More
These six ways to prevent identity theft offer you valuable... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
There is nothing more important that password security in world... Read More
When the Internet first came about, it was realized it... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Internet Security |