They mean?
Spywares are typical malwares meant for secretly collecting information about users whose computers they are installed on. Means without your knowledge someone’s monitoring your activities. Sounds serious? Yes!
Most spywares are installed on the users’ computers without their knowledge through piggybacking on desirable software or from the background as in case of Trojan Horses. They are not infectious and this differentiates them from viruses and worms, etc.,. Since Trojan Horses are actively identified by good anti-virus programs like AVG, Avast, McAfee, etc., they are blocked from installing on PCs which have updated anti-virus solutions installed.
Sources include
Most spywares come bundled with those harmless software which users want to install and use. Generally, the installed software will do no harm but that installer undesirably installs the spyware program(s). We give you an example. Sometimes you install some software and after installing, you are prompted to proceed with other downloads. In the installation dialog of some reputed software, you can check or uncheck additional installations. Advanced users normally reject additional unwanted installations. In many cases, visiting specific sites may start unwanted download and install in the background itself. Users may also get lured by online ads and click on them only to be led to download and install. Sometimes, users get frustrated by warning about their PC and are directed to download for solving those issues which are actually misrepresentative and false.
Some effects and behaviors
Spywares may do bad to the end-users’ system or just be a vehicle for ecommerce. Traditionally, spywares referred to software like Keyloggers which were used by users to monitor usage of the system by other users. But with ever evolving technology and techniques, the definition has grabbed eyeballs and one of the most important issues the Internet industry faces today.
Spywares can perform many things in infected computers. We are mentioning just some of them.
- They can change your browser settings to edit homepage, add toolbars, or redirect traffic.
- Many of them are responsible for displaying advertisements. They can monitor your Web usage and set cookies to display you relevant advertisements the next time you visit a specific web site.
- They may display advertisement pop-ups following specific user instructions or periodically.
- When bundled with backdoors, they can send many of your information, might include personal details as well, to the person who has created it for misuse or illicit distribution against personal gains.
- Spyware may affect the computers too. They may interrupt network traffic, affect disk usage or run unwanted CPU threads, and even create Operating System problems.
- Some spyware are so created to bypass detection and may ultimately lead to format and reinstallation of software.
Examples
You may not know the names of all of the spyware that could possibly be in your computer. So here is a list of some of the names of spyware programs that you can look out for. The first spyware program is called Cool Web Search; this program takes advantage of Internet Explorer weakness. The Internet Optimizer is another one, this is also known as DyFuCa and this program redirects the Internet Explorer error pages to advertising. 180 Solutions which is now called Zango; this spyware transmits detailed information to advertisers about the web sites which the users have visited.
The Huntbar or aka Wintool aka Adware. Websearch, this is a small group of spyware programs that are passed out by TrafficSyndicate. These types of programs attach it self to Internet Explorer’s tool bars. The last example of spyware is called Movieland; there has been several hundred complaints to the United Stares Federal Trade Commission. The FTC has filed a suit against Movieland and is awaiting the trial.
How to save your system?
Prevention is better than cure. But as spyware remain hidden from users, their cure or repair exists in almost all cases. Yet, prevention is possible.
- Do not get lured by online ads. Do not click on what you do not require.
- Write perfect URLs. e.g. If it’s gmali.com in place of gmail.com!
- Download from trusted websites which scan the hosted files for infections and manipulations like CNET or Brothersoft etc.,.
- While installing any software, go through all steps carefully and reject all the additional unwanted installations/ downloads.
- Use updated anti-spyware solutions. All the reputed anti-virus programs have their own anti-spyware component installed, depends on its availability in the version you are using. Check out for fake ones, they account for 14% of all malware.