On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.
It is estimated that 9 out of 10 computers are infected with spyware, also known as, adware, scumware, malware and many others.
Here's the top 10.
? PurtyScan ? popup ads that trick users into installing by claiming to find and delete pornographic images.
? n-CASE - adware program that delivers targeted popup adds. This program is usually bundled with freeware.
? Gator - adware program that displays banner ads based on your Web surfing habits. This program is usually bundled with the Kazaa file-sharing program, as well as other free software programs.
? CoolWebSearch ? hijacks home page, Internet Explorer settings, and Web searches.
? Transponder - monitors sites visited and any data entered into online forms, and then delivers targeted ads.
? ISTbar/AUpdate ? spyware posing as a toolbar. Has been reported to display porn, pop-ups, and to hijack homepage and Internet searches.
? KeenValue ? an adware program that collects personal information and delivers advertisements.
? Internet Optimizer ? hijacks error pages and redirects them to its own site.
? Perfect Keylogger ? records all keystrokes (including personal information, passwords, etc), clicks and web sites visited.
? TIBS Dialer ? hijacks phone modem and redirects to pornography pay by the minute phone sites.
The following precautions are recommended in the fight against spyware: install Microsoft security patches, avoid downloading and using freeware; and disable ActiveX downloads in Internet Explorer. In addition, install at least one anti-spyware program, some experts actually recommend that you have two installed. For starters you can download one of the free spyware removal programs such as Spybot Search & Destroy or Ad-aware. There are also a few good anti-spyware programs on the market that proactively protect your computer (alert you before the spyware is installed). When purchasing an anti-spyware program you need to be sure it is from a reputable company as many of the anti-spyware programs available actually place spyware on your computer. They do this by offering a free scan, which places the spyware on your computer as it is scanning. Then they entice you to purchase the product to remove the spyware.
In conclusion, if you take a few precautions and install anti-spyware software on your system you should be well protected in the fight against spyware.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Lisa Smith is the webmaster of 1stSpywareRemoval.com
offerin
g in depth information on spyware, anti-spyware reviews, news and free spyware scans.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This article may be reproduced as long as the above resource box is included in its entirety.
![]() |
|
![]() |
|
![]() |
|
![]() |
This is the second in a series of articles highlighting... Read More
Every day millions of people go online to find information,... Read More
Phishing is a relatively new form of online fraud that... Read More
When surfing the Internet you probably take your anonymity for... Read More
Ebay is a great site and is used by many... Read More
It's late. You've been scouring the web for that perfect... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
This really chapped my lips...I recently bought a new computer.... Read More
A week or so ago, I received an inquiry from... Read More
I got a virus the other day, Thursday I believe... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Threats we ordinary Web users face online leave us no... Read More
Is your data secure? Think again. Securing data is unlike... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
So called phishers try to catch the information about the... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
There are several basic concepts to keep in mind when... Read More
You've seen it in the news - 40 million credit... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Do you really have to know how feeds work? Not... Read More
Today,on most internet user's computers, we have the ability to... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Paypal is a great site and is used by many... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
We all know that it's dangerous to use the same... Read More
The Internet is a vast International Network of people and... Read More
There is no doubt that "how-to articles" have become a... Read More
Every now and then you can read about a new... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
First the basic definition of Spyware: It is a type... Read More
Viruses are, however, not the only malicious software programs out... Read More
Only the top spyware removers are successful at detecting and... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Identity theft rates one of the fastest growing crimes in... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
There has not been a time in the history of... Read More
Before you enter your name, address or any other data... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
As soon as almost all computer users already got used... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
This is the second in a series of articles highlighting... Read More
There are several basic concepts to keep in mind when... Read More
Spyware is software or hardware installed on a computer without... Read More
If you use emails actively in your communication, you must... Read More
Let us take the example of scrambling an egg. First,... Read More
Someone recently told me, "You would have to be a... Read More
With the Internet entering our lives in such an explosive... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Computer security for most can be described in 2 words,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Spyware and adware are becoming major problems for online surfers... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Internet Security |