|
 |
 |
ALL
YOU NEED TO KNOW ABOUT TRYING TO BE |
|
|
BACK |
|
|
|
|
|
|
|
|
|
|
Safely download software to cover your online security...
AntiSpyware
Pop-up Blocker
AntiVirus
Firewall
Unsure about downloads? |
|
SPYWARE
On this page...
|
Programs that are placed on computer systems with
or without the user's knowledge are collectively known as Spyware.
All of them have a task to perform and typically you will be pestered by advertisements
for products (Adware), usually from the seedier side of life, or your
browser's 'Home Page' will unexpectedly change (Browser Hijacking).
They start to become really naughty when they
collect your personal information and covertly send the data
to interested parties and this type of software is collectively referred to as
Malware (malicious software).
Not all Spyware is Malware. Some Spyware is downloaded
with the user's consent. For example, a user could sign up for
a free music service by agreeing to receive targeted adverts that are determined
by tracking their online activities. Some users would find that an attractive
deal so not all Spyware can be classed as bad. It's
when all this is done without your knowledge it becomes bad,
and when the parties interested in your personal information are criminals, it
can become expensive.
|
|
|
|
|
Programs that are
installed on your computer with or without
your knowledge, intending to deliver
adverts to your desktop. See this page
for more info. |
|
|
|
Malware that covertly
installs itself onto your system and
changes your web browser settings.
You aquire a new StartPage or HomePage
that seems impossible to get rid of. More» |
|
|
|
Cookies are small
text files that some web sites place
in your computer to remind your browser
of specific information. For example,
they might store your preferences for
content so pages can be personalised
for you. Have you ever gone back to an
online store and found a couple of items
that you chose, still at the check out,
well that's achieved by a cookie. The
vast amount of cookies are designed to
enhance your visit to a site. Some sites
use session cookies that are
deleted when you exit your browser, while
others place persistent cookies,
which stay on your hard drive for long
periods. All good sites outline their
policy on cookies, usually within their
privacy statement. |
|
|
|
Malware that covertly
installs itself onto your system and
changes your internet dial-up settings
to a Premium Rate number. You may not
discover the breach until you query your
excessive phone bill. Dialers are NOT
a problem if you have a broadband connection. |
|
|
|
Designed to prevent
unauthorised access to or from a computer
or a network. Usually software based
but can be hardware based within a network
router or a Broadband modem. More» |
|
|
|
Users that spend
time attempting to breach online security
systems. Some do it just for the devilment
whilst others have pure criminal intent.
A Firewall helps to stop Hackers entering
your system when you are online. |
|
|
|
Malware
that captures all keystrokes made by
you and monitors for your bank and card
details. It usually has the
ability to transmit the captured information
to interested parties either via a network
connection or email. Your
personal data is then used in fraudulent
activity. See this page for more info.. |
|
|
|
A generic term
becoming popular to describe any form
of malicious software. Sometimes referred
to as rogue programs, they're the bad
side of Spyware. See this page for more
info. |
|
|
|
A term that covers
all the issues on this list. Whether
it's the theft of your personal details,
virus riddled emails or invading your
privacy. |
|
|
|
Pronounced 'fishing'.
Not Spyware or a Virus but a type of
scam. It's when fraudsters attempt to
obtain your personal information, usually
your bank details by duping you into
entering your details into either a dummy
web site, replying to a false email or
even by a phone call to your home. The
sites and emails are very convincing
and appear genuine, even to the trained
eye but give themselves away by the very
nature of what they are requesting you
to do. More» |
|
|
|
A new browser window
that appears on top of your current window,
smaller than normal and containing either
information or an advert.
You really need to take the time to know
how useful and how dangerous they can
be. More» |
|
|
|
Remote Access Trojans.
See Trojans below. |
|
|
|
A generic term
for programs that are installed on your
computer without your knowledge with
the intent of gathering information about
you, whether for commercial or criminal
reasons. See this page for more
info. |
|
|
|
Also known as Trojan
Horses or RATs (Remote Access Trojans)
it's a way of delivering Spyware onto
your system. The malicious code is hidden
within a seemingly harmless program.
Trojans are often used to infect you
with Keyloggers or Dialers. A favourite
with Hackers to allow them to open a
backdoor to your system. More» |
|
|
|
A small program
designed to make copies of itself over
and over again. The effects of a virus
can range from harmless messages to the
destruction of data and can be exucuted
at any given time and date. More» |
|
|
|
Very similar to
viruses in their replication but exploit
a users email system to send themselves
around the world. |
|
|
|
|
|
|
|
|
Should you be worried?
If you enter your debit/credit card details online for any reason...
paying bills, shopping etc, and you don't protect your system from
Spyware, then you should be worried! When your bank account is debited
by £100, £250 or even £500 for a bet you didn't
make with a gambling company based in Gibraltar, your bank could
claim, if you're daft enough to let them,
that it was your lack of security that caused a breach of their wonderful
and secure banking system and you will be expected to stand the loss... Now
you're worried!
Spotting the presence of Spyware
Here are a few tell tale signs to watch out for...
• Pop-up advertisement windows unexpectedly
materialise, even when you're offline!
• Your browser is hijacked!
• Your browser strangely adopts a new toolbar!
• Sudden increase in
computer crashes!
• You discover that one
or more of your 'contacts' has received
an e-mail from you and you did not send it!
Preventing Spyware
The more you use and embrace the internet, the risk of Spyware becomes
greater. However, that shouldn't discourage you from exploiting
the full potential of the Net. By accepting Spyware
as being unavoidable you should develop a better maintenance routine.
Here are a few tips that will reduce that risk, avoiding the obvious
tip of keeping any teenagers away from your computer.
• Set your web browser's security settings
to prevent any pop-ups and scripts until you log a website as being
trusted.
• Trust a site 100% before you download any
files from it.
• Don't surf the Net (away from mainstream
sites) when logged-on your computer as an Administrator, switch to
a Limited User. [?]
User
Accounts X
If you are running the Windows operating system you can set up two types of
user account... Administrator or Limited. It's done via the Control Panel and
if you haven't yet set up any user accounts then you will be logged-on as an
Administrator with full access to all parts of your computer.
If you are online when logged-on as a Limited User then over 90% of any nasty
malware that you could come across, is prevented from covertly accessing your
computer.
• Don't install a peer-to-peer
file-swapping program without thoroughly checking out
the program.
• Never close a pop-up window by
clicking OK, Yes, No etc. Instead, click the red Close button,
top right corner of the window, or press the Alt + F4
keys. More»
• Install an AntiSpyware tool
and update and scan on a weekly basis. Your ISP may
provide or recommend one. Microsoft currently provide,
only to Windows 2000, Windows Server 2003 and Windows
XP users, a free
Spyware scan and Windows
Defender but for how long these will be free is
anyones guess. If their OS had been developed properly
you wouldn't need it. A good tool is Spybot, also recommended
by Microsoft, is published by PepiMK
Software who recommend Download.com to download
your copy.
• Use a Firewall. It will not prevent
Spyware that comes bundled with other programs or from
dodgy web sites, however, there is a small risk from
hackers actually placing Spyware on your computer. Using
a Firewall is a helpful defence against hackers.
Getting rid of Spyware
Spyware is designed to be difficult to get rid of. Uninstalling or
deleting will usually result in its reappearance after you restart
your system.
• Download and install your AntiSpyware
tool!
• Run the tool to scan your computer
for spyware and other unwanted software!
• Review the files discovered by
the tool for spyware and other unwanted software!
• Select suspicious files for removal
by following the tool's instructions!
More information
You'll find more in-depth information about Malware on Wikipedia.
|
|
|
 |
|