Is Spyware Watching You?

Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.

I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).

At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.

"Spyware" is software that gets onto your computer and literally "spies" on your activities.

The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.

Three primary types of spyware exist to complicate your online life, including:

1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"

Cookies represent mostly a danger of lost privacy.

In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.

"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.

"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.

Spyware gets on your computer in one of several different ways.

First, it rides along with software you download from the 'Net and install on your system.

Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.

Third, hackers find an open port on your computer and use the "back door" to install basically anything they want.

And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.

Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?

In a word: NO!

I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.

You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.

Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.

One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.

I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):

1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org

The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html

The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.

~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.

(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com

About the Author:

Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> Turn Words Into Traffic

In The News:


pen paper and inkwell


cat break through


Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Top 10 tips for Safe Internet Shopping

Over �5 billion pounds was spent on online shopping in... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More