Free Essay

Spyware - What on Earth Is That?

In:

Submitted By teejustice
Words 1264
Pages 6
SPYWARE – WHAT ON EARTH IS THAT?

Today’s technology has advanced from a time where the government used spyware for espionage purposes to the average American gaining information from another person’s personal computer, mobile phone, or technology device. Knowing how to prevent routes of infection and ways of removing spyware is information that Americans should be well aware of to ensure the best security for their technology devices. If not, they might become a victim like I was. “Spyware is software that monitors a user's computing; the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information.” (From Wikipedia - The Free Encyclopedia, 2012) The spyware software performs these actions without appropriately obtaining a person’s consent first. The most common ways a computer can become infected are through advertising (software that displays advertisements is called adware), pop-ups, downloading shared music and software torrents, visiting a website with malicious ActiveX or JavaScript scripts, opening email attachments, downloading anything from crack sites, and watching certain videos. “ According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware.” (Close-Up Media, 2009) Some people mistake spyware for viruses which damage the user’s personal files or operating system. Spyware, on the other hand, does not necessarily damage the computer but overall damages the user’s experience. | | |
Although a computer may become infected by its user during downloading or other means, it can also come from an authorized user who wants to install the spyware because an employee or child might be abusing their privileges on certain technology devices. How does spyware work for mobile parental controls? The parent purchases PhoneSheriff and installs the software onto their child's phone (monitored). They configure the program according to their specific needs. The child uses the phone normally. PhoneSheriff blocks and filters the actions specified and silently reports all actions to the parent's PhoneSheriff account. The parent logs into their online account from any Internet web browser. The parent can then view activities from the monitored phone (SMS text messages, phone call information, GPS location, uploaded photos, and web browsing information). It starts every time the monitored phone is booted but remains stealth to its user. (SheriffPhone, 2012)
No matter if spyware is installed onto a technology device by an unauthorized or authorized user, there are several ways to help protect the device from spyware or other unwanted software. On the Microsoft Safety & Security website, its PC Security suggests:
Step 1: Use a firewall; Step 2: Update software; Step 3: Adjust Internet Explorer security settings; Step 4: Download and install antispyware protection; and Step 5: Surf and download more safely. Here are a few helpful tips that can protect a user from downloading software they don't want: * “Only download programs from websites you trust. If you're not sure whether to trust a program you are considering downloading, enter the name of the program into your favorite search engine to see if anyone else has reported that it contains spyware. * Read all security warnings, license agreements, and privacy statements associated with any software you download. * Never click "Agree" or "OK" to close a window. Instead, click the red "x" in the corner of the window or press Alt + F4 on your keyboard to close a window. * Be wary of popular "free" music and movie file-sharing programs, and be sure you understand all of the software packaged with those programs. * Use a standard user account instead of an administrator account”
(Microsoft, 2012)

Spyware removal can often be difficult to remove depending on the level of infection or because it might be designed to be difficult to remove. If a user attempts to uninstall the software, they might find that the program reappears as soon as they restart their computer. If a person is unsuccessful in removing the spyware, they may need an anti-spyware software tool to complete the job. Not only will it help with removing spyware but most anti-spyware helps protect your computer from viruses and other malicious software. It might be difficult to download tools if your computer is infected with spyware. In this case, the user can try one of the following options Close-Up Media suggests: * Use another computer to download the tools to a disk. * Get help through the anti-spyware manufacturer support. * Find a local expert.
(Close-Up Media, 2009)

Unfortunately, I learned the hard way about spyware. An insecure boyfriend purposely installed spyware (PhoneSheriff) onto my cell phone. I allowed him access to my phone to download music for me; however, I believe this was the opportunity he needed to install the spyware software. For some time I was unaware of how he was able to track my whereabouts because he would make appearances at locations that I believed were simply coincidences. He also knowingly knew of my SMS text messages but I believed it was due to him accessing my phone when I laid it down somewhere.
One day, during a disagreement, he told me that he had tracked my phone calls, GPS locations, and web browsing information because he had installed spyware on my phone. I was very irate to find out that he had invaded my privacy. Later, I searched the applications on my phone but could not find any unwanted software. I immediately went to my cell phone carrier for assistance. They informed me that the application was stored under a unique name that related to a GPS application already installed on my phone and this was the reason I missed it. The cell phone carrier employee uninstalled the program on my phone and I was relieved that my information could never be comprised again by my boyfriend. Although I did not betray my boyfriend in any form of cheating, I realized that since he did not trust me, he was not worth having the title of ‘my boyfriend’. Our next encounter was me ending the relationship. (Smiles)
The best defense against spyware and other unwanted software is not to download it in the first place. Also, a user should keep in mind that there are computer programs that truly "spy" on you. “There are applications designed to sit silently on your desktop and intercept personal information like usernames and passwords. These programs include Bugdrop, Back Orifice and VX2. These are more like viruses or hacker tools than spyware.” (Coustan, 2012) Nonetheless, Americans need to know how to prevent spyware from infecting their technology devices and if it does, how to remove it to keep their confidential information safe from unauthorized users. The more information a user knows about this rising topic will help prevent them from the mental and emotional damage that I endured. Hopefully, a minimal amount of Americans will not have to suffer from spyware and hopefully I will not have to suffer by it any more.

Works Cited
Close-Up Media. (2009). SMobile Systems: 1 in 63 Smartphones Infected by Mobile Spyware and Malware. ProQuest Science Journals.
Coustan, D. (2012). How Stuff Works . Retrieved 11 15, 2012, from How Spyware Works: http://computer.howstuffworks.com/spyware1.htm
From Wikipedia - The Free Encyclopedia. (2012). Spyware. Retrieved 10 24, 2012, from From Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/Spyware
Microsoft. (2012). PC Security. Retrieved 11 10, 2012, from Safety & Security Center: http://www.microsoft.com/security/pc-security/spyware-whatis.aspx
SheriffPhone. (2012). PhoneSheriff. Retrieved 11 15, 2012, from PhoneSheriff: http://www.phonesheriff.com/features.html

Similar Documents

Premium Essay

Network Design Proposal

...Name: Professor: Course: Date: Network Topology Associations especially in this case, school, depend vigorously on the capacity to share data all through the association in a proficient and beneficial way. Since the organization is lodging understudy individual data and also managerial resources and organization data, it is fundamental that the framework is still utilitarian, solid, and secure. PC systems have considered this innovation and are presently separated of verging on each business. The building housing some offices, classrooms, a library, and computer labs has two choices with regards to setting up a system. They can utilize a totally wired system, which utilizes organizing link to associate PCs, or they can utilize a remote system, which utilizes radio frequencies to interface PC. Remote systems or commonly called wireless network have permitted associations to wind up more versatile; in this way, associations are currently utilizing a blend of both wired and remote systems. They fundamental equipment format for the two sorts of systems are genuinely comparative yet for an association to go remote it requires a couple of more equipment parts. In spite of the convenience nature of computer system, they do open the association up to security and protection dangers. In the event that an organization is confronted with a security they are ways that they can alter and forestall future security dangers. As you read on, you will figure out how the system has turned...

Words: 3084 - Pages: 13

Premium Essay

Botnet

...BOTNET What is Botnet? Botnets are malicious software that criminals distribute to computers and turn them into a zombie. When a computer is infected with a botnet your computer can perform tasks over the internet while you have no clue its happening. Normally criminals infect a large number of computers forming a network or a botnet. Botnets send out spam emails to spread viruses attack other computers and to commit other kind of crime and fraud. Some botnets can be large some can be small but size does not matter either way damage will be done regardless. Some of the most popular botnets are Conficker which never has activated to cause significant damage, but that don’t exactly means the threat is gone for it still remains very active. Another one is called Zeus. Zeus is a large botnet and has much detection mainly because individuals can configure it to use a different command. Zeus is mainly is configured to steal information such as banking credentials and send it to its attacker. Waledac works thru a peer-peer network and it can load malicious software, and proxy HTTP content to host malicious websites. Bredolab main focus is on downloading Scareware, fake anti-virus programs, and Ransonware. Their plan is to infect many computers with these programs and hope the victims purchase these programs and make some profit. Pushdo/Cutwail is two different botnets that use each other. Pushdo is a loader which means it downloads components to install on a system. It is customized...

Words: 700 - Pages: 3

Free Essay

Introduction to Computer

...1) A computer is unique compared to any other machine because of its ability to ________. process large amounts of information simultaneously process complex math functions change its programming use many different types of software Score: 1 2) Bits are used to measure ________. storage capacity data transfer and Internet connection rates the size of files the amount of time a user is connected to the Internet Score: 1 3) The smallest, most lightweight, and inexpensive computer is the ________. notebook laptop netbook client Score: 0 4) Distributed computing distributes ________. the processing of tasks across a group of computers power ability across all users Internet usage across the entire network disk storage for all computer users Score: 1 5) Smartphones use ________ technology, allowing users to perform several functions with one device. embedded design invisible computing convergence grid computing Score: 1 6) The intersection of a row and a column in a spreadsheet is called a ________. field text cell record Score: 1 7) Shaynia has been working with her colleagues on a Word...

Words: 2580 - Pages: 11

Premium Essay

Yela

...GO Com Concepts_Ch01.qxd 3/6/07 4:46 PM Page 1 1 Computer Concepts chapterone Basic Computer © 2010 Pearson Education, Inc., Concepts Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. OBJECTIVES At the end of this chapter you will be able to: 1. Define Computer and Identify the Four Basic Computing Functions 2. Identify the Different Types of Computers 3. Describe Hardware Devices and Their Uses 4. Identify Types of Software and Their Uses 5. Describe Networks and Define Network Terms 6. Identify Safe Computing Practices Computer Concepts 1 GO Com Concepts_Ch01.qxd 3/6/07 4:46 PM Page 2 Introduction Computers are an integral part of our lives. They are found in homes, offices, stores, hospitals, libraries, and many other places. Computers are part of cars and phones, and they enable you to access bank accounts from home, shop online, and quickly communicate with people around the world by means of e-mail and the Internet. It is difficult to find a business or occupation that doesn’t rely on computers. Whether it’s a truck driver who keeps an electronic travel log or a high-powered stockbroker who needs up-to-the-second market information, computers make these tasks easier, more efficient, and more accurate. © 2010...

Words: 21782 - Pages: 88

Premium Essay

Supervisor

...Cyber Security Student: Maurice Jones Class ISSC461: IT Security: Countermeasures Instructor: Professor Christopher Weppler Date: 2 August 2013 Introduction “In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home (President Barack Obama, 2012).” Technology has changed the total lifestyle of people around the world. Here in the United Stated, society’s daily lives revolve around social interaction, economic stability, job security and information dominance. Information Dominance is “the degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations other than war while denying those capabilities to the adversary (US Cyber Command, 2012).” Corporations as well as many of the world’s governments have risen and fallen due to their degree of Information Dominance and Information Security. Cyber-attacks have increased exponentially within the last 10 years. Battlefield lines that were once drawn in the sand no longer exist. Cyber-attacks can occur from any location in the world and at any time. A Cyber-terrorist has the ability to use current communication infrastructure to launch an attack that could cripple a nation. In 2012, Defense Secretary, Leon Panetta spoke at the Business Executives for National Security (BENS) summit....

Words: 3217 - Pages: 13

Premium Essay

Challenges to Criminal Law Makers

...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...

Words: 24175 - Pages: 97

Premium Essay

Engineer

...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...

Words: 24175 - Pages: 97

Premium Essay

Cybersecurity Vulnerability Facing It Managers Today

...VULNERABILITY FACING IT MANAGERS TODAY INTRODUCTION Vulnerabilities in the recent cyber world varies from organization to another, depending particularly on the operations and what is on the ground. These varies from the web server weaknesses which allows hackers to take over the web server to very classy side network activities that use things like data or packet timing to gather confidential data from computers/networks. Vulnerabilities are liable and experience in the computers with which members of staff use to run their daily job requirements. The aim of this work is unveil these weaknesses facing Information System managers in recent time. Because the modern organization is clearly and predominantly associated with the use of information and information systems, this work does not focus particularly on any industry. 1|Page CYBERSECURITY VULNERABILITY FACING IT MANAGERS TODAY VULNERABILITY/ WEAKNESS COMPARE TO THREAT In cyber world, vulnerability is defined as the weakness a computer hardware or its software system that can be exploited. This is completely way different when we talk about cyber threats. A threat is simply the ways or means with which these vulnerabilities are being taken advantage of or exploited. A simple example of these threats is clearly seen in the case of a Malware/Spyware in a computer/network. This, depending on the target operation, exploits any available vulnerable aspect of the information system. These vulnerabilities when present and unattended...

Words: 2288 - Pages: 10

Free Essay

Browser Mostly Used

...Chapter I Introduction A. Background of the Study A browser is software application that provides a way to look at and interact with all the information on the World Wide Web (Goertz, 2001). It uses HTTP to submit requests of web servers over the Internet on behalf of the browser user. Web browser is use for retrieving and presenting information resources identified by a Uniform Resource Identifier (URI) that may be video, image, web page, or other kinds of content. It can also be used to access information provided by web servers in private networks or files in file systems. There has been a virtual explosion of browsers which are designed according to their operating system and others, target specific users such as those majoring on social networking. There are also clones of established browsers such as Firefox and Google Chrome which seek to improve on the original by being “leaner” of offering different features (Anonymous, 2011). According to Bowler (2009) the browser world have spent time focusing on delivering their product to multiple OS. This helps them build many of the browsers such as Mozilla Firefox, Google Chrome, Opera, Internet Explorer and Safari. Mozilla started from scratch — Firefox was the result. And now users have no shortage of browsers to choose from, partly due to the work of the Mozilla foundation. the first full point release of Mozilla’s popular open-source Web browser in nearly three years, combines user-interface, performance and Web-standards...

Words: 8185 - Pages: 33

Premium Essay

Public Speaking Book

...A BRIEF CONTENTS PART 1 • GETTING STARTED 1. Becoming a Public Speaker 2. From A to Z: Overview of a Speech 3. Managing Speech Anxiety 4. Ethical Public Speaking 5. Listeners and Speakers 1 2 8 1 4 23 30 PART 2 • DEVELOPMENT 6. Analyzing the Audience 7. Selecting a Topic and Purpose 8. Developing Supporting Material 9. Locating Supporting Material 10. Doing Effective Internet Research 1 Citing Sources in Your Speech 1. 36 37 49 57 64 73 83 PART 3 • ORGANIZATION 1 Organizing the Speech 2. 1 Selecting an Organizational Pattern 3. 1 Outlining the Speech 4. 92 93 103 1 10 PART 4 • STARTING, FINISHING, AND STYLING 15. Developing the Introduction and Conclusion 16. Using Language 1 22 1 23 1 31 PART 5 • DELIVERY 1 Choosing a Method of Delivery 7. 18. Controlling the Voice 19. Using the Body 1 39 1 40 1 44 1 48 PART 6 • PRESENTATION AIDS 20. Types of Presentation Aids 21. Designing Presentation Aids 22. A Brief Guide to Microsoft PowerPoint 154 155 161 164 PART 7 • TYPES OF SPEECHES 23. Informative Speaking 24. Persuasive Speaking 25. Speaking on Special Occasions 1 74 1 75 188 21 7 PART 8 • THE CLASSROOM AND BEYOND 230 26. Typical Classroom Presentation Formats 27. Science and Mathematics Courses 28. Technical Courses 29. Social Science Courses 30. Arts and Humanities Courses 31. Education Courses 32. Nursing and Allied Health Courses 33. Business Courses and Business Presentations 34. Presenting in Teams 35. Communicating in Groups 231 236 240 243 246 248 25 1 253 258...

Words: 104318 - Pages: 418

Premium Essay

It 105

...COLLEGE OF AGRICULTURE AND TECHNOLOGY Main Campus Alcate, Victoria, Oriental Mindoro Name: ______________________________ Course & Year: _____________ Laboratory Exercises No. 1 Identifying Parts/Components of Personal Computers Objectives: o o o o o o Identify the components of a PC Identify the desktop components Explain the PC Start up processes Familiarize with the computer Identify the elements of the computer system Identify the first tasks to be performed while troubleshooting PCs Date: _____________ Score:____________ General Directions     Read and understand each statement carefully. Write the questions and your answers on your activity sheet. Avoid unnecessary erasures. Use black or blue pen only. Answer the following: 1. What is computer? Give its characteristics, capabilities, and limitations? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________...

Words: 12098 - Pages: 49

Free Essay

Ip190-Ip5

... Their primary market is centered on providing information technology and network implementations for new technology innovation solutions designed to provide best practices by adopting the policies and procedures which have been internally implemented within their own infrastructure and passed on to its nation customer base. After working with many diverse businesses it became evident there were several essential components missing from the initial business plan and required revisiting the information technology systems and business requirements to grow a successful technology firm. The process started by researching and asking key question such as what would be the benefits to our business? This required some serious consideration because of the vast choices on the market it became feasible to allow management to discuss what is important to them. The data gathered from this informational exchange between upper management and Information Technology teams along with the sales teams input proved to be invaluable towards creating a list of key requirements. The main points discussed were of course the cost which is always of most concern to any organization. Next was how to reach potential clients, creating a more effective business relationship with all of...

Words: 4462 - Pages: 18

Premium Essay

Alexis Liudnsey

...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and: 1) _______ A) improved decision making. B) improved business practices. C) improved efficiency. D) improved flexibility. 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? 2) _______ A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 3) An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support: 3) _______ A) decision making and control in an organization. B) the creation of new products and services. C) communications and data flow. D) managers analyzing the organization's raw data. 4) The three activities in an information system that produce the information organizations use to control operations are: 4) _______ A) information retrieval, research, and analysis. B) input...

Words: 3444 - Pages: 14

Premium Essay

Xuynya

...Table of Contents Introduction 2 Human Aspect 3 Internet Security System10 Mobile Computing16 Conclusion21 References22 Introduction Background of the Company Apple was by two college dropout students: Steve Wozniak and Steve Jobs with the motto of “Think Differently”. In the early 1980s, Steve Wozniak left the company and Steve Jobs hired John Sculley as the President of the company. After facing many failures, Apple launched its Macintosh computers for house hold users. In mid 1980s, Steve Jobs had to leave the company because of his controversial relations with the president. At that time John Sculley rejected the offer of Microsoft‘s CEO, Bill Gates to license the Macintosh operating system to Microsoft. After this refusal, Gates developed DOS operating system and in late 1980s, the competition between DOS and Macintosh decreased Apple's sale, workforce and resignation of John Sculley. So, Apple's current CEO planned to purchase Next Step operating system of Jobs in order to improve the Macintosh operating system. In late 90s Jobs again became the CEO of the company and be started surprising relations with Microsoft by developing a Macintosh version of office software. Apple also took cost saving measures like streamlining the product line, production of printers. Steve Jobs brought Apples' focus on two concepts of consumer series with the prefix “I” for internet like iMac, iBook laptop and professional with prefix “power” such as PowerMac desktop and PowerBook...

Words: 5675 - Pages: 23

Premium Essay

Swot – an Analysis of Apple Incorporated

...strengths, weaknesses, opportunities, and threats that will have to be addressed or Apple could eventually experience a decline in its market share. A SWOT analysis not only can help an organization realize it strengths, weaknesses, opportunities, and threats it can also help the organization capitalize on the weaknesses that may exist with other organizations. Introduction Apple Inc. was founded 1976 and was the brain child of Steven Jobs and Steven Wozniak. Although the organization was actually born on April Fool’s Day many will agree that Jobs and Wozniak’s vision for the future of computers was much bigger than a foolish dream or prank. Wozniak had a love for developing computers and while working for Hewlett-Packard he developed what would become the first Apple Computer (Apple, n.d.). It was Jobs vision of the future with computers that pushed Wozniak to realize his dream of selling his first very graphic computer. Apple struggled its first year trying to convince the public to purchase its newly graphic designed computer. It was not until 1977 when Apple...

Words: 5329 - Pages: 22