Professional Documents
Culture Documents
LIVING-IN-THE-IT-ERA-REPORTING
LIVING-IN-THE-IT-ERA-REPORTING
Spyware is malicious software that enters a user’s computer, gathers data from the device
and user, and sends it to third parties without their consent. A commonly accepted spyware
definition is a strand of malware designed to access and damage a device without the user’s
consent.
1. Step 1—Infiltrate your device: Spyware is installed onto a device through the use of an
application installation package, a malicious website, or as a file attachment.
2. Step 2—Monitor and captures your data: Once installed, the spyware gets to work following
the user around the internet, capturing the data they use, and stealing their credentials, login
information, and passwords. It does this through screen captures, keystroke technology, and
tracking codes.
3. Step 3—Send or sell your personal data: With data and information captured, the attacker
will either use the data amassed or sell it to a third party. If they use the data, they could take
the user credentials to spoof their identity or use them as part of a larger cyberattack on a
business. If they sell, they could use the data for a profit with data organizations, other
hackers, or put it on the dark web.
TYPES OF SPYWARE:
ADWARE
TROJANS
INTERNET TRACKING
SYSTEM MONITORS
When installing any software on your computer, make sure you carefully read all disclosures,
including the license agreement and privacy statement. Sometimes unwanted software in a given
software installation may be actually documented, might appear at the end of a license agreement
or privacy statement.
Do’s and Don’ts of Minimising Spyware
Do use reputable antivirus software with spyware Don't open suspicious-looking emails from
protection. unknown senders.
Do use a pop-up blocker or avoid clicking pop-up Don't open unsolicited or suspicious email
ads. attachments.
Do keep your computer or mobile operating Don't click links in text messages from unknown
systems updated. senders.
WHAT IS ADWARE?
Adware is software that displays unwanted (and
sometimes irritating) pop-up adverts which can
appear on your computer or mobile device.
Some forms of adware are highly
manipulative and create an open door for
malicio us programs.
Adware works by installing itself quietly onto your devices, hoping you’ll – accidentally or otherwise
– click on an advert that it displays to you. Adware creators and distributing vendors make money
from third parties via either:
1. Pay-per-click (PPC) — they get paid each time you open an ad.
2. Pay-per-view (PPV) — they get paid each time an ad is shown to you.
3. Pay-per-install (PPI) — they get paid each time bundled software is installed on a device.
TYPES OF ADWARE
Legitimate adware
Legitimate adware, often labeled as “ad-supported software,” serves ads as you browse
the web or engage with specific apps.
Potentially Unwanted Applications legal or illegal adware that can deliver or even malware.
This type of PUA is not illegal, but it does make it difficult to opt-out or remove downloaded
applications.
Profits from malicious third parties who want to distribute malicious software like spyware, viruses, or
other malware onto devices.
Browser Hijacking change your browser settings without your knowledge or consent, typically affecting
both homepage and default search settings.
WHAT IS TROJAN
HORSE?
A Trojan Horse Virus is a type of
malware that downloads onto a
computer disguised as a legitimate
program. The delivery method typically
sees an attacker use social engineering
to hide malicious code within legitimate
software to try and gain users' system
access with their software.
Zeus or Zbot: Zeus is a toolkit that targets financial services and enables hackers to build
their own Trojan malware. The source code uses techniques like form grabbing and
keystroke logging to steal user credentials and financial details.
Note only: Zeus was first spotted in 2007, but its origin is unclear. Some sources say that it may have been
created by a group of hackers in Eastern Europe, and that the mastermind behind it is Evgeniy Bogachev,
also known as Slavic. (Russian)
The malware has two main goals: to steal banking information and restrict communication between
other computers to the botnet. Zeus embeds into the computer system so that it can continually steal data,
communicate with the command-and-control server, and inject itself into banking account web pages.
Practicing good cyber hygiene is always the best first line of defense against Trojan viruses and
other threats. Keep your operating systems updated and patched, run anti-virus software and
allow it to scan your devices regularly, and avoid phishing attacks by carefully inspecting inbound
emails.
While browsing the web, pay attention to the URLs displayed in your browser address bar. Also,
inspect links before you click on them. And install a privacy or security extension from your
browser vendor's extensions store.