SlideShare a Scribd company logo
1 of 29
PRESENT BY :
Ankit Mistry (130280105026)
KEY LOGGERSKEY LOGGERS
&&
SPYWARESSPYWARES
WHAT IS KEY LOGGER????
 A key logger is a program that runs in the
background or hardware, recording all the keystrokes.
Once keystrokes are logged, they are hidden in the
machine for later retrieval, or shipped raw to the
attacker
 Attacker checks files carefully in the hopes of either
finding passwords, or possibly other useful
information.
 Key loggers, as a surveillance tool, are often used by
employers to ensure employees use work computers
for business purposes only
 Such systems are also highly useful for law
enforcement and espionage
 Keystroke logging can be achieved by both hardware
and software means.
 There are two types of keyloggers :
1. Hardware Keylogger
2. Software Keylogger
HARDWARE KEYLOGGER
 Hardware keyloggers are used for keystroke
logging, a method of capturing and recording
computer users' keystrokes, including sensitive
passwords.
 Generally, recorded data is retrieved by typing
a special password into a computer text editor.
 The hardware keyloggers plugged in between
the keyboard and computer detects that the
password has been typed and then presents the
computer with "typed" data to produce a menu.
HARDWARE KEYLOGGERS
Come in three types:
 Inline devices that are attached to the
keyboard cable.
 Devices which can be installed inside
standard keyboards.
 Replacement keyboards that contain the
key logger already built-in.
SOME HARDWARE KEYLOGGERS
 Hardware KeyLogger Stand-alone Edition
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Hardware KeyLogger Keyboard Edition
looks and behaves exactly like a normal keyboard,
but it keeps a record of all keystrokes typed on it.
 KeyGhost Hardware Keylogger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 KeyKatcher Keystroke Logger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Advantages :
1. Antivirus techniques cannot catch these.
2. Work on all computing platforms.
 Disadvantages :
1. It can be spotted by a suspicious user.
SOFTWARE KEYLOGGERS
 Software keyloggers track system , collect
keystoke data within the target operating
system , store them on disk or in remote location
, and send them to the attacker who installed the
keyloggers.
 Anti malware, personal firewall, and Host-based
Intrusion prevention(HIPS) solution detect and
remove application keyloggers.
Software keylogger detection methods include:
Scan local drive for log.txt or other log file names
associate with known keyloggers.
Implement solution that detect unauthorized file
transfer via FTP or other protocols;
Scan content sent via email or other authorized means
looking for sensitive information;
Detect encrypted files transmitted to questionable
destinations.
Advantages :
1.Are hard to detect
2.Can be deployed remotely via a software vulnerability
attack
3.Are fairly easy to write
Disadvantage :
1.A good antivirus scheme could sniff these out.
2.Far fewer cons with the software, so these are much
more common than hardware-type keyloggers.
EXAMPLE OF WINDOWS
KEYLOGGERS
 Badtrans : a keylogger worm that
exploited vulnerability in outlook
express and internet explorer. It collect
keystrokes and them to various e mail
address.
 Magic lantern: FBI’s own software to
wire tap|log email passing through ISPs.
What Is Spyware ?
 Applications that send information from
your computer to the creator of the
spyware
 Sometimes consists of an apparent core
functionality and a hidden functionality
of information gathering (Trojan)
 Can be used by web sites for marketing
information, to determine their stance
with regard to competitors and market
trends
 Can also be used to log keystrokes and
send those to whomever
WHAT IS SPYWARE ?
 Software that is installed on a computer without the
user’s knowledge which monitors user activity and
transmits it to another computer. Many spyware
programs are set to monitor what web sites you
visit them generally for advertising /marketing
purposes.
 Software or hardware installed on a
computer without the user's knowledge
which gathers information about that
user for later retrieval by whomever
controls the spyware.
 Spyware can be broken down into two
different categories:
 surveillance spyware
 advertising spyware.
 Spyware oriented in the 1990’s with programs that
secretly observed and logged user web surfing
habits. It can do more than steal your personal
information but also job user PC of its speeds,
stability and Internet acess efficiency
CLASS OF SPYWARE
TRACKING COOKIES
 Cookies that can track your Web
activities
 May include cookies that contain
user names
passwords
other private information that you
enter on web sites (SSN, banking
info, credit cards)
BROWSER HIJACKING
 Hosts File
Redefine the addresses of trusted
sources, i.e. anti-virus tools, software
patches and upgrades
 Home Page
Redefine the page that opens up when
you start your browser
BROWSER HIJACKING
 Search Page
Redefine the page that opens up when
you enter an undefined URL
Redefine the page that opens up when
you click your “Search” button
 Error Pages
Redefine the pages that open when an
error occurs.
KEYLOGGERS
 Were originally designed to record all
keystrokes of users in order to find
passwords, credit card numbers, and
other sensitive information
SPYBOTS
 Spybots are the prototypical example of
“spyware.” A spybot monitors a user’s
behavior, collecting logs of activity and
transmitting them to third parties.
 A spybot may be installed as a browser
helper object, it may exist as a DLL on
the host computer, or it may run as a
separate process launched whenever the
host OS boots.
MALWARE & ADWARE
 Malware
Refers to a variety of malicious
software, including viruses, worms,
Trojan horses.
 Adware
Software that displays advertisements
tuned to the user’s current activity,
potentially reporting aggregate or
anonymized browsing behavior to a
third party
Spyware Vs Virus
1. Motivation Profit
2. Monitor online
activities for
commercial gain
3. Difficult to relate
symptoms with
spyware infection.
4. New technology
(less than 5 years)
1. Intent Harmful
2. Damage computer
system, corrupt files
and destroy data
3. Easy to relate
symptoms with virus
infection: Corrupt
program files, loss of
computer storage
memory, deletion of
critical files.
4. Old Technology
SPYWARE VS TROJAN
HORSE
 Spyware programs are sometimes
installed as Trojan horses of one sort or
another.They differ in that their creators
present themselves openly as businesses,
for instance by selling advertising space
on the pop-ups created by the malware.
Most such programs present the user
with an End-User License Agreement
which purportedly protects the creator
from prosecution under computer
contaminant laws. However, spyware
EULAs have not yet been upheld in
court.
SPAYWARE PREVALENCE
April 16, 2004; BBC News (UK) - PCs
'infested' with spy programs. Internet
provider EarthLink says it uncovered
29.5 million examples of spyware on
over 1 million computers scanned
between January and March. These
parasite programs sometimes come
attached to software downloaded from
the Web.
PRESERVATION OF SPYWARE
 Do not installed free software availble
on internet.
 Do not click on email attachments or
links of you don’t know the sender or
even if you send know the sender, but
the content is unexpected.
 Do not installed unknown software.
 Do not click on links or buttons or pop-
up windows.
THANKTHANK
YOUYOU

More Related Content

What's hot (20)

Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
System hacking
System hackingSystem hacking
System hacking
 
Unit 1
Unit 1Unit 1
Unit 1
 
Dos attack
Dos attackDos attack
Dos attack
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Email security
Email securityEmail security
Email security
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Similar to Keyloggers and Spywares

Similar to Keyloggers and Spywares (20)

ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Keyloggers and Spywares

  • 1. PRESENT BY : Ankit Mistry (130280105026) KEY LOGGERSKEY LOGGERS && SPYWARESSPYWARES
  • 2. WHAT IS KEY LOGGER????  A key logger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker  Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.
  • 3.  Key loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only  Such systems are also highly useful for law enforcement and espionage  Keystroke logging can be achieved by both hardware and software means.
  • 4.  There are two types of keyloggers : 1. Hardware Keylogger 2. Software Keylogger
  • 5. HARDWARE KEYLOGGER  Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.  Generally, recorded data is retrieved by typing a special password into a computer text editor.  The hardware keyloggers plugged in between the keyboard and computer detects that the password has been typed and then presents the computer with "typed" data to produce a menu.
  • 6.
  • 7. HARDWARE KEYLOGGERS Come in three types:  Inline devices that are attached to the keyboard cable.  Devices which can be installed inside standard keyboards.  Replacement keyboards that contain the key logger already built-in.
  • 8. SOME HARDWARE KEYLOGGERS  Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer.  Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it.  KeyGhost Hardware Keylogger a tiny hardware device that can be attached in between a keyboard and a computer.  KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.
  • 9.  Advantages : 1. Antivirus techniques cannot catch these. 2. Work on all computing platforms.  Disadvantages : 1. It can be spotted by a suspicious user.
  • 10. SOFTWARE KEYLOGGERS  Software keyloggers track system , collect keystoke data within the target operating system , store them on disk or in remote location , and send them to the attacker who installed the keyloggers.  Anti malware, personal firewall, and Host-based Intrusion prevention(HIPS) solution detect and remove application keyloggers.
  • 11. Software keylogger detection methods include: Scan local drive for log.txt or other log file names associate with known keyloggers. Implement solution that detect unauthorized file transfer via FTP or other protocols; Scan content sent via email or other authorized means looking for sensitive information; Detect encrypted files transmitted to questionable destinations.
  • 12. Advantages : 1.Are hard to detect 2.Can be deployed remotely via a software vulnerability attack 3.Are fairly easy to write Disadvantage : 1.A good antivirus scheme could sniff these out. 2.Far fewer cons with the software, so these are much more common than hardware-type keyloggers.
  • 13. EXAMPLE OF WINDOWS KEYLOGGERS  Badtrans : a keylogger worm that exploited vulnerability in outlook express and internet explorer. It collect keystrokes and them to various e mail address.  Magic lantern: FBI’s own software to wire tap|log email passing through ISPs.
  • 14. What Is Spyware ?  Applications that send information from your computer to the creator of the spyware  Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan)  Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends  Can also be used to log keystrokes and send those to whomever
  • 15. WHAT IS SPYWARE ?  Software that is installed on a computer without the user’s knowledge which monitors user activity and transmits it to another computer. Many spyware programs are set to monitor what web sites you visit them generally for advertising /marketing purposes.
  • 16.  Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.  Spyware can be broken down into two different categories:  surveillance spyware  advertising spyware.
  • 17.  Spyware oriented in the 1990’s with programs that secretly observed and logged user web surfing habits. It can do more than steal your personal information but also job user PC of its speeds, stability and Internet acess efficiency
  • 19. TRACKING COOKIES  Cookies that can track your Web activities  May include cookies that contain user names passwords other private information that you enter on web sites (SSN, banking info, credit cards)
  • 20. BROWSER HIJACKING  Hosts File Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades  Home Page Redefine the page that opens up when you start your browser
  • 21. BROWSER HIJACKING  Search Page Redefine the page that opens up when you enter an undefined URL Redefine the page that opens up when you click your “Search” button  Error Pages Redefine the pages that open when an error occurs.
  • 22. KEYLOGGERS  Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 23. SPYBOTS  Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties.  A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.
  • 24. MALWARE & ADWARE  Malware Refers to a variety of malicious software, including viruses, worms, Trojan horses.  Adware Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
  • 25. Spyware Vs Virus 1. Motivation Profit 2. Monitor online activities for commercial gain 3. Difficult to relate symptoms with spyware infection. 4. New technology (less than 5 years) 1. Intent Harmful 2. Damage computer system, corrupt files and destroy data 3. Easy to relate symptoms with virus infection: Corrupt program files, loss of computer storage memory, deletion of critical files. 4. Old Technology
  • 26. SPYWARE VS TROJAN HORSE  Spyware programs are sometimes installed as Trojan horses of one sort or another.They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an End-User License Agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.
  • 27. SPAYWARE PREVALENCE April 16, 2004; BBC News (UK) - PCs 'infested' with spy programs. Internet provider EarthLink says it uncovered 29.5 million examples of spyware on over 1 million computers scanned between January and March. These parasite programs sometimes come attached to software downloaded from the Web.
  • 28. PRESERVATION OF SPYWARE  Do not installed free software availble on internet.  Do not click on email attachments or links of you don’t know the sender or even if you send know the sender, but the content is unexpected.  Do not installed unknown software.  Do not click on links or buttons or pop- up windows.