spyware.pptx
Document Details
Uploaded by LivelyJasper852
Tags
Full Transcript
SPYWA RE GROUP 4 UTLINE REPORT ON SPYWARE Spyware Definition Brief History of Spyware How do I get spyware? What Does...
SPYWA RE GROUP 4 UTLINE REPORT ON SPYWARE Spyware Definition Brief History of Spyware How do I get spyware? What Does Spyware Types of Do? spyware Common problems that spyware can result Spyware Protection Conclusion What is Spyware? Spyware is malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user’s consent. What is Spyware? Spyware collects personal and sensitive information that it sends to advertisers, data collection firms, or malicious actors for a profit. Brief History of Spyware MARS NEPTUNE SATURN The first use of the term “spyware” appeared was on October 1995 in a Usenet article that targeted Microsoft's business model. In early 2000, it reappeared in a press release for a personal firewall product. This marked the beginning and acceptance of the “spyware” term. WhatAll Does Spyware Do? types of spyware sit on a user’s device and spy on their activity, the sites they visit, and the data they amass or share. They do this with the objective of monitoring user activity, tracking login and password details, and detecting sensitive data. Step 1. Infiltrate Step 2. Monitor and capture Step 3. Send or sell Spyware can increasingly affect any device, from computers and laptops to mobile phones and tablets. Some of the most prominent causes of spyware infiltrating a device or system include: Misleadin Security g vulnerabilities marketing HOW DO I Softwar GET e bundles SPYWARE? Phishing / spoofing Trojans TYPES OF SPYWARE 01 05 Adware Red Shell 02 System 06 Infostealer monitors 03 Keyloggers Tracking 07 cookies 04 Rootkits Trojan Horse 08 Virus Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 1. Adware - This sits on a device and monitors users’ activity then sells their data to advertisers and malicious actors or serves up malicious ads. 2. Infostealer - This is a type of spyware that collects information from devices. It scans them for specific data and instant messaging conversations. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 3. Keyloggers - Also known as keystroke loggers, keyloggers are a type of infostealer spyware. They record the keystrokes that a user makes on their infected device, then save the data into an encrypted log file. 4. Rootkits - These enable attackers to deeply infiltrate devices by exploiting security vulnerabilities or logging into machines as an administrator. Rootkits are often difficult and even impossible to detect. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 5. Red Shell - This spyware installs itself onto a device while a user is installing specific PC games, then tracks their online activity. It is generally used by developers to enhance their games and improve their marketing campaigns. 6. System monitors - These also track user activity on their computer, capturing information like emails sent, social media and other sites visited, and keystrokes. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 7. Tracking cookies: Tracking cookies are dropped onto a device by a website and then used to follow the user’s online activity. 8. Trojan Horse Virus: This brand of spyware enters a device through Trojan malware, which is responsible for delivering the spyware program. Some specific MOBILE SPYWARE variants are: PhoneSpy: installed in Android apps to steal login credentials, messages, location, and images Pegasus: used to target activists, journalists, politicians, and executives A device can also become infected with spyware as a result of a user’s actions, such Accepting cookie as: consent requests Opening malicious from insecure attachments websites Accepting pop-ups Downloading games, from untrusted movies, or music from sites pirated or spoofed websites Clicking on Downloading malicious links malicious mobile apps Common problems that spyware can result in include 1. Data theft 2. Identity fraud 3. Device damage 4. Browsing MERCURY disruption SpywareSpyware Protection and other malicious attack methods are a constant threat to any device connected to the internet. Therefore, the first line of defense against spyware is to deploy an internet security solution that includes proactive anti-malware and antivirus detection. Spyware Protection There are several steps that can be taken to protect devices and systems: Cookie consent Browser extensions Security updates Avoid free software Use secure networks Best practice and behavior CONCLUSI ON Thank you for listening! All cited in https://www.fortinet.com/resources/cyberglossary/spyware#:~:text=Spyware%20is %20malicious%20software%20that,device%20without%20the%20user's%20consent. Members Fronda, Kanakan, Ludas, Shane Sudays Sheira Mones, Ondoy, Dave Cristian