85.7 F
San Fernando
Friday, Mar 29, 2024

Spyware: Things May Be Lurking Inside Your Computer

Guest Column By Mike Newman Over the past couple of years, a new threat has emerged over the Internet called spyware, a term used synonymously with a larger category of harmful applications called malware (meaning “bad software”) Unlike viruses, they don’t often spread themselves automatically, but instead are installed on your computer like any other program, often without your knowledge or consent, and serve their creators with a variety of purposes. There are four main categories of malware applications: “Advertising Spyware, or Adware”: One of the most common forms of malware, these applications are designed to barrage you with advertisements in pop-up windows. Very few legitimate websites use pop-up windows in their advertising, so if you notice a lot of extra windows appearing as you click from one website to the next, you’ve probably been infected with Advertising Spyware. “Backdoor Santas”: Freeware and shareware applications that offer to serve a useful purpose, such as Gator, but are also collecting your personal information and transmitting it for commercial purposes. “Homepage Hijackers”: Once installed, these programs change the homepage of your browser to wherever they want you to go. Even if you change your homepage back, you’ll soon find that it has been reset again (once you close and reopen your browser or restart your PC). Likewise, if the website that you’re looking for cannot be found, they can redirect you to their own website instead of the default “page not found” error message. “Foistware”: These are programs, sometimes completely benign, that become installed without your knowledge as free “add-ons” bundled into other programs. For example, AOL instant messenger is automatically installed by Netscape Navigator. MSN Messenger is installed automatically when Internet Explorer is upgraded. Why does spyware exist? Generally speaking, it’s to make money. Unlike viruses, which are usually written by young mischievous programmers looking for a way to cause widespread vandalism and mayhem, spyware applications have a substantial bottom-line potential. The information that is collected is valuable: e-mail lists, purchasing habits, even passwords. The advertisements that pop up are sold by the millions. Websites get huge new volumes of visitors because people who may never visit them on their own are forcibly redirected to them. The malware industry keeps growing, and so far, legislators have little to stop its spread. Protect yourself Spyware has become so prevalent that the number of Internet-connected computers that are completely clean is rapidly becoming a minority. Even so, there are a few simple rules that you can follow to greatly reduce the amount of spyware that becomes installed on your computer: 1. Watch where you click. Particularly be careful of popup windows. When one appears, don’t click anywhere inside the window. Only click the close “X” button in the upper-right hand corner of the window. Beware of pop-ups that spoof actual Windows alerts. For example, you may see a windows that has “Microsoft Windows Alert” in the title, and says “Would you like to check for viruses” with a YES or NO button to choose from. This could be a disguised spyware screen asking to initiate an installation. In some cases, choosing either YES or NO would still begin the infection process. Normal alerts don’t have the close “X” button in the upper-right hand corner of its window, so if you have that option, take it that window is almost definitely spyware. 2. Watch what you install. There are thousands of free utilities and applications, called freeware, and some that have an expiration date or limited functionality, called shareware. Following the age-old wives-tale that there’s no such thing as a free lunch, most freeware and shareware applications these days are bundled with some sort of malware. The free, cute little smileys that you can add to your emails are probably tracking all of the e-mails that you send and the programmers are selling the lists to spammers. Also, check the installation options on software. Very often, an installer will let you perform a “typical” installation or a “custom” installation. Choose “custom” and review all of the programs that are to be loaded. If there is something on your list that is remotely questionable, choose not to install it. 3. Disinfect yourself. New products are coming onto the market to help combat spyware. Like anti-virus systems, they rely upon a database of known malware applications, which requires frequent updating to check for the newest spyware applications that are discovered every day. Symantec Antivirus 9.0 includes some spyware detection and removal tools, along with its state-of-the-art anti-virus scanner. Adaware is another anti-spyware tool, and is probably the most comprehensive of available products. As spyware continues to infect computers across the Internet, better tools will become available to centrally manage the elimination across an entire network, and automatically check for the installation of spyware in real time, and catch it before it becomes installed on your computer. Mike Newman is Business Development Manager of Northridge-based Cal Net Technology Group

Featured Articles

Related Articles