Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and literally "spies" on your activities.
The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.
Three primary types of spyware exist to complicate your online life, including:
1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.
"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different ways.
First, it rides along with software you download from the 'Net and install on your system.
Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.
Third, hackers find an open port on your computer and use the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.
You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.
I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.
~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.
(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com
About the Author:
Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> Turn Words Into Traffic
![]() |
|
![]() |
|
![]() |
|
![]() |
Phishing is a relatively new form of online fraud that... Read More
In recent days, I was one of the unfortunate persons... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
There are several basic concepts to keep in mind when... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Have been an Internet user for more than 9 years,... Read More
Over the past few years as the internet has become... Read More
Computer infections can be broken up into 4 main categories... Read More
The money being spent online is steadily growing. With billions... Read More
In 1997, I decided after 15 years as a practicing... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Spyware is software or hardware installed on a computer without... Read More
Over �5 billion pounds was spent on online shopping in... Read More
Let us take the example of scrambling an egg. First,... Read More
Pharming is one of the latest online scams and rapidly... Read More
There has not been a time in the history of... Read More
During the release of a new software product specialized to... Read More
If you are a parent, you have probably wondered at... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Did you know...? 1 in 5 children who use computer... Read More
You can detect spyware online using free spyware cleaners and... Read More
We all get the odd virus now and then, but... Read More
Identity Theft is one of the most serious problems facing... Read More
Computer security for most can be described in 2 words,... Read More
Watching how the traditional media covers the latest virus or... Read More
The Threat10 years ago you could probably have run no... Read More
Can you protect your computer from all possible viruses and... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
If you are wondering how to fight spyware for safe... Read More
So you want to know who your kids are chatting... Read More
First off I should explain what phishing is. Phishing is... Read More
Every now and then you can read about a new... Read More
This is the second in a series of articles highlighting... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Today the internet is a mine field of malicious code... Read More
You are at your computer, checking out software on EBay.... Read More
First, let's do a little recap'. As I stated in... Read More
Imagine my surprise when I received a phone call from... Read More
During the release of a new software product specialized to... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Before we start, I want to make it clear that... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
This is not some new fangled techno-speak, it is a... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Computer infections can be broken up into 4 main categories... Read More
Spyware is software that runs on a personal computer without... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Phishing is a relatively new form of online fraud that... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Shopping for horse gifts or other gift items on the... Read More
These six ways to prevent identity theft offer you valuable... Read More
Working from home has its advantages, including no commute, a... Read More
Can you protect your computer from all possible viruses and... Read More
The top five online scams on the Internet hit nearly... Read More
Do you sometimes notice your computer running slower. Is your... Read More
The money being spent online is steadily growing. With billions... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
As the number of people using the Internet as an... Read More
Internet Security |