On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.
It is estimated that 9 out of 10 computers are infected with spyware, also known as, adware, scumware, malware and many others.
Here's the top 10.
? PurtyScan ? popup ads that trick users into installing by claiming to find and delete pornographic images.
? n-CASE - adware program that delivers targeted popup adds. This program is usually bundled with freeware.
? Gator - adware program that displays banner ads based on your Web surfing habits. This program is usually bundled with the Kazaa file-sharing program, as well as other free software programs.
? CoolWebSearch ? hijacks home page, Internet Explorer settings, and Web searches.
? Transponder - monitors sites visited and any data entered into online forms, and then delivers targeted ads.
? ISTbar/AUpdate ? spyware posing as a toolbar. Has been reported to display porn, pop-ups, and to hijack homepage and Internet searches.
? KeenValue ? an adware program that collects personal information and delivers advertisements.
? Internet Optimizer ? hijacks error pages and redirects them to its own site.
? Perfect Keylogger ? records all keystrokes (including personal information, passwords, etc), clicks and web sites visited.
? TIBS Dialer ? hijacks phone modem and redirects to pornography pay by the minute phone sites.
The following precautions are recommended in the fight against spyware: install Microsoft security patches, avoid downloading and using freeware; and disable ActiveX downloads in Internet Explorer. In addition, install at least one anti-spyware program, some experts actually recommend that you have two installed. For starters you can download one of the free spyware removal programs such as Spybot Search & Destroy or Ad-aware. There are also a few good anti-spyware programs on the market that proactively protect your computer (alert you before the spyware is installed). When purchasing an anti-spyware program you need to be sure it is from a reputable company as many of the anti-spyware programs available actually place spyware on your computer. They do this by offering a free scan, which places the spyware on your computer as it is scanning. Then they entice you to purchase the product to remove the spyware.
In conclusion, if you take a few precautions and install anti-spyware software on your system you should be well protected in the fight against spyware.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Lisa Smith is the webmaster of 1stSpywareRemoval.com
offerin
g in depth information on spyware, anti-spyware reviews, news and free spyware scans.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This article may be reproduced as long as the above resource box is included in its entirety.
Credit card fraud is a growing problem for online businesses... Read More
It has been said that with the wealth of information,... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
In 1997, I decided after 15 years as a practicing... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Much has been said on the theory of password protection... Read More
The words Corporate Security may conjure up images of a... Read More
When it comes to a secure website and passwords it... Read More
When the Internet first came about, it was realized it... Read More
So called phishers try to catch the information about the... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Paypal is a great site and is used by many... Read More
If you have used a Windows machine for a while,... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Over £5 billion pounds was spent on online shopping in... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
There is nothing more important that password security in world... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
You and I are a lot alike. We are both... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Spyware is software that runs on a personal computer without... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Security leaks can be a big problem for any site... Read More
Many of us have run into an annoying and time-consuming... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Have you ever had to call Symantec or McAfee to... Read More
A little bit of time invested into learning about internet... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
If you are a parent, as am I, I think... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Let us take the example of scrambling an egg. First,... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Despite the current wave of identity theft and corporate security... Read More
Have been an Internet user for more than 9 years,... Read More
You'd better learn news from media, not from emails, security... Read More
As soon as almost all computer users already got used... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Today,on most internet user's computers, we have the ability to... Read More
Can you protect your computer from all possible viruses and... Read More
Microsoft routinely releases new security updates, many of which are... Read More
It has been said that with the wealth of information,... Read More
Identity theft is one of the most common criminal acts... Read More
Did you know...? 1 in 5 children who use computer... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Business on the internet is getting down right shameless. This... Read More
If you are wondering how to fight spyware for safe... Read More
Over the past few years as the internet has become... Read More
There are ways to insure security though. You can get... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
In 1997, I decided after 15 years as a practicing... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Have you ever bought a product or service from the... Read More
The average computer is packed with hidden software that can... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
There are folks out there who use their powers for... Read More
Internet Security |