SlideShare une entreprise Scribd logo
1  sur  24
Mangesh A.
Wadibhasme
 What is Spyware?
 Spyware is a type of malware that's hard to detect.
 It collects information about your surfing habits,
browsing history, or personal information (such as
credit card numbers), and often uses the internet to
pass this information along to third parties without
you knowing.
 Key loggers are a type of spyware that
monitors your key strokes.
spyware is mostly used for the purposes of tracking and storing internet
users' movements on the web and serving up pop-up ads to internet users.
1.System monitors
2.Trojans 3.Adware
4.Tracking
Cookies
 Spyware is mostly classified into 4 types:-
 The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's
business model.
 Spyware at first denoted software meant for espionage purposes.
 However, in early 2000 the founder of zone labs, gregor freund, used the term in a
press release for the zone alarm personal firewall.
 Use of exploits in JavaScript, internet explorer and windows to install.
 History and development of spyware.
 Unwanted behavior and degradation of system performance.
 Unwanted CPU activity, disk usage, and network traffic.
 Stability issues:-
 Application's freezing.
 Failure to boot.
 System-wide crashes.
 Difficulty connecting to the internet.
 Disable software firewalls and anti-virus software.
 Effect and Behavior.
 Installed when you open an email attachment.
 Spyware installs itself
 Install by using deceptive tactics
 Common tactics are using a Trojan horse.
 USB Keylogger.
 browser forces the download and installation of spyware.
 Routes of Infection.
• Installing anti-spyware programs.
• Network firewalls and web proxies to block access to web sites known to install
spyware
• Individual users can also install firewalls.
• Install a large hosts file.
• It Install shareware programs offered for download.
• Downloading programs only from reputable sources can provide some
protection from this source of attack
 Security Practices.
 Anti-Spyware Program.
 Products dedicated to remove or
block spyware.
 Programs such as pc tool’s spyware
doctor, lava soft's ad-aware se and
patrick kolla's spybot - search &
destroy.
Antivirus 2009
Antivirus Gold
Contravirus
Macsweeper
Pest Trap
Psguard
Spy Wiper
Spydawn
Spylocked
Spysheriff
Spyshredder
Spyware Quake
Spywarestrike
Ultimatecleaner
Winantivirus Pro 2006
Windows Police Pro
Winfixer
Worldantispy
 Some known offenders
include:
 Rouge Anti - Spyware Program.
 popups prompting them to install them to protect their computer, this software is
called rogue software.
 do not install any freeware claiming to be anti-spyware unless it is verified to be
legitimate.
 Fake antivirus products constitute 15 percent of all malware.
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 A group of programs.
 Takes advantage of internet explorer
vulnerabilities.
 The package directs traffic to advertisements
on web sites including coolwebsearch.Com. It
displays pop-up ads.
 Rewrites search engine results, and alters the
infected computer's hosts file to direct DNS
lookups to these sites.
1). CoolWebSearch
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Sometimes called finspy.
 High-end surveillance suite sold to law
enforcement and intelligence agencies.
2).
FinFishe
r
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Wintools or adware.Websearch,
 Installed by an active-x drive-by download
at affiliate web sites.
 These programs add toolbars to ie.
 Track aggregate browsing behavior.
3). Huntbar
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Transmits detailed information to
advertisers about the web sites which
users visit.
 It opens pop-up ads that cover over
the web sites of competing companies
4). Zango
 Examples!!!!
These common spyware programs illustrate the diversity of behaviors found in
these attacks
 Downloads itself to a computer via an
active-x code and reports information
back to control server.
 Some information can be the search-
history, the websites visited, and even
keystrokes.
5). Zango
Trojan
 Examples!!!!
 "Stealware" and affiliate fraud.
 Affiliate Fraud is a violation of the terms of services.
 Terminated from affiliate networks including linkshare and
sharesale.
 Mobile devices can also be vulnerable to chargeware.
 Applications.
 Identity theft and fraud
 Coolwebsearch.Com spyware had used it to transmit “chat
session user names, passwords", bank information, etc.
 The Federal Trade Commission estimates that 27.3 million
Americans have been victims of identity theft
 That financial losses from identity theft totaled nearly $48 billion
for businesses and financial institutions and at least $5 billion in
out-of-pocket expenses for individuals.
 Applications.
 Digital rights management
 It can be removed with the removewga tool.
 Some copy-protection technologies have borrowed from spyware
 While the main purpose of this deliberately uninstallable
application is to ensure the copy of windows on the machine was
lawfully purchased and installed.
 Applications.
 Personal relationships
 Used to monitor electronic activities of partners relationships.
 Loverspy, was specifically marketed for this purpose
 Depending on local laws regarding communal/marital property
 Observing a partner's online activity without their consent may be illegal
 Applications.
 Browser cookies
 Business purposes
 Anti-spyware programs often report web advertiser’s HTTP Cookies.
 The small text files that track browsing activity, as spyware
 Applications.
 Criminal law
 US FTC actions
 Netherlands OPTA
 Civil law
 Libel suits by spyware developers
 Webcam Gate
 Legal Issues.
Spyware presentation by mangesh wadibhasme

Contenu connexe

Tendances (20)

Malware
MalwareMalware
Malware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Spyware
SpywareSpyware
Spyware
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Phishing
PhishingPhishing
Phishing
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Ransomware
RansomwareRansomware
Ransomware
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Ppt123
Ppt123Ppt123
Ppt123
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 

En vedette

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yofovi96
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiInsideView
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Mikko Hypponen
 
Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Gianni Amato
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threatINSIGHT FORENSIC
 

En vedette (20)

spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Rain technology
Rain technologyRain technology
Rain technology
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Exploits 3b yo
Exploits 3b yoExploits 3b yo
Exploits 3b yo
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
SPYWARE
SPYWARESPYWARE
SPYWARE
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Distribution Training
Distribution TrainingDistribution Training
Distribution Training
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
 
Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016Il Ransomware nelle Aziende - Eset Security Days 2016
Il Ransomware nelle Aziende - Eset Security Days 2016
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
 

Similaire à Spyware presentation by mangesh wadibhasme

Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work GuideEduardo Chavarro
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 

Similaire à Spyware presentation by mangesh wadibhasme (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 

Dernier

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Spyware presentation by mangesh wadibhasme

  • 2.  What is Spyware?  Spyware is a type of malware that's hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing.  Key loggers are a type of spyware that monitors your key strokes.
  • 3. spyware is mostly used for the purposes of tracking and storing internet users' movements on the web and serving up pop-up ads to internet users. 1.System monitors 2.Trojans 3.Adware 4.Tracking Cookies  Spyware is mostly classified into 4 types:-
  • 4.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  History and development of spyware.
  • 5.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application's freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Effect and Behavior.
  • 6.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Routes of Infection.
  • 7. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Security Practices.
  • 8.  Anti-Spyware Program.  Products dedicated to remove or block spyware.  Programs such as pc tool’s spyware doctor, lava soft's ad-aware se and patrick kolla's spybot - search & destroy.
  • 9. Antivirus 2009 Antivirus Gold Contravirus Macsweeper Pest Trap Psguard Spy Wiper Spydawn Spylocked Spysheriff Spyshredder Spyware Quake Spywarestrike Ultimatecleaner Winantivirus Pro 2006 Windows Police Pro Winfixer Worldantispy  Some known offenders include:  Rouge Anti - Spyware Program.  popups prompting them to install them to protect their computer, this software is called rogue software.  do not install any freeware claiming to be anti-spyware unless it is verified to be legitimate.  Fake antivirus products constitute 15 percent of all malware.
  • 10.
  • 11. These common spyware programs illustrate the diversity of behaviors found in these attacks  A group of programs.  Takes advantage of internet explorer vulnerabilities.  The package directs traffic to advertisements on web sites including coolwebsearch.Com. It displays pop-up ads.  Rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites. 1). CoolWebSearch  Examples!!!!
  • 12. These common spyware programs illustrate the diversity of behaviors found in these attacks  Sometimes called finspy.  High-end surveillance suite sold to law enforcement and intelligence agencies. 2). FinFishe r  Examples!!!!
  • 13. These common spyware programs illustrate the diversity of behaviors found in these attacks  Wintools or adware.Websearch,  Installed by an active-x drive-by download at affiliate web sites.  These programs add toolbars to ie.  Track aggregate browsing behavior. 3). Huntbar  Examples!!!!
  • 14. These common spyware programs illustrate the diversity of behaviors found in these attacks  Transmits detailed information to advertisers about the web sites which users visit.  It opens pop-up ads that cover over the web sites of competing companies 4). Zango  Examples!!!!
  • 15. These common spyware programs illustrate the diversity of behaviors found in these attacks  Downloads itself to a computer via an active-x code and reports information back to control server.  Some information can be the search- history, the websites visited, and even keystrokes. 5). Zango Trojan  Examples!!!!
  • 16.
  • 17.  "Stealware" and affiliate fraud.  Affiliate Fraud is a violation of the terms of services.  Terminated from affiliate networks including linkshare and sharesale.  Mobile devices can also be vulnerable to chargeware.  Applications.
  • 18.  Identity theft and fraud  Coolwebsearch.Com spyware had used it to transmit “chat session user names, passwords", bank information, etc.  The Federal Trade Commission estimates that 27.3 million Americans have been victims of identity theft  That financial losses from identity theft totaled nearly $48 billion for businesses and financial institutions and at least $5 billion in out-of-pocket expenses for individuals.  Applications.
  • 19.  Digital rights management  It can be removed with the removewga tool.  Some copy-protection technologies have borrowed from spyware  While the main purpose of this deliberately uninstallable application is to ensure the copy of windows on the machine was lawfully purchased and installed.  Applications.
  • 20.  Personal relationships  Used to monitor electronic activities of partners relationships.  Loverspy, was specifically marketed for this purpose  Depending on local laws regarding communal/marital property  Observing a partner's online activity without their consent may be illegal  Applications.
  • 21.  Browser cookies  Business purposes  Anti-spyware programs often report web advertiser’s HTTP Cookies.  The small text files that track browsing activity, as spyware  Applications.
  • 22.
  • 23.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate  Legal Issues.