Security Information |
|
Anti-Spyware Protection: Behind How-To Tips
There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But? A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away. Hint one: What on earth is spyware? When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And? "There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market." This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222 Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially. As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure. On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers. What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet. So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information. According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan. Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much. Hint Two: Too Many Promises Made -- Is it Possible to Keep them? There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't. Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works - it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped. So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains. What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates. Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end. Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc.Learn more -- visit the company's website: http://www.anti-keyloggers.com
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronis’ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette AITX's RAD-R Welcomes Steve Danelon as President, Strengthening Leadership for Residential Security Solutions GlobeNewswire Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com Security and Sanctions in Post-Assad Syria The National Interest Online 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. |
home | site map |
© 2006 |