Is Spyware Watching You?

Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.

I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).

At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.

"Spyware" is software that gets onto your computer and literally "spies" on your activities.

The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.

Three primary types of spyware exist to complicate your online life, including:

1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"

Cookies represent mostly a danger of lost privacy.

In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.

"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.

"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.

Spyware gets on your computer in one of several different ways.

First, it rides along with software you download from the 'Net and install on your system.

Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.

Third, hackers find an open port on your computer and use the "back door" to install basically anything they want.

And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.

Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?

In a word: NO!

I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.

You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.

Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.

One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.

I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):

1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org

The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html

The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.

~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.

(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com

About the Author:

Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> Turn Words Into Traffic

In The News:


pen paper and inkwell


cat break through


Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More