Showing posts with label spyware. Show all posts
Showing posts with label spyware. Show all posts

Thursday, April 23, 2009

Twitter Under Attack Once Again

"Late Sunday night and into the wee hours of Monday we fought off a fourth attack," said Biiz Stone, co-founder of Twitter, in an update to a blog post he originally published Sunday. "Once again, we secured the compromised accounts and deleted any material that would further propagate the worm."

The latest attack -- which followed a pair of worms Saturday and a third Sunday -- originated from a just-registered account labeled "cleaning Up Mikeey," said F-Secure Corp.'s chief research officer,
Mikko Hyppfonen. Today's copycat worm infected account profiles of people who clicked on the sender's name or image in tweets like, "How TO remove new Mikeayy worm! RT!! http://bit.ly/yCL1S."

"A message like this is particularly nasty, as there were plenty of re-tweets of this malicious message sent by genuine users," Hypponen said in a blog post just minutes after Monday's attack began. "The bit.ly link got redirected back to Twitter, to user reberbrerber's profile & which would infect Twitter users who viewed it."

Twitter has since deleted the cleaningUpMikey account and the tweets it and other infected accounts spawned.

Also on Monday, Twitter again emphasized that while the worm attacks have been a nuisance, they haven't stolen any user account information. "No passwords, phone numbers, or other sensitive information were compromised as part of this renewed attack," the service's status page said early this morning.

Twitter has not responded to questions posed Sunday about the attacks, specifically about whether it had, or would, contact law enforcement officials. According to some reports, and his own Web site, teenager Michael "Mikeyy" Mooney took responsibility for the worms that circulated on Twitter over the weekend.

In his updated blog today, Stone hinted that the company would take legal action against the worms' creators. "The worm introduced to Twitter this weekend was similar to the famous Samy worm, which spread across the popular MySpace social-networking site a while back," Stone wrote. "At that time, MySpace filed a lawsuit against the virus creator, which resulted in a felony charge and sentencing. Twitter takes security very seriously and we will be following up on all fronts."

In 2005, Samy Kadmkar exploited a bug in MySpace to add as a "friend" anyone who viewed his account profile. He then copied a snippet of JavaScript to that user's profile to continue the hack. Within 24 hours, he had accumulated over a million friends.

MySpace sued, and in January 2007 Kadmkar pleaded guilty to a single felony count. He was sentenced to three years probation and 90 days of community service.

See Also
spyware removal software
how to remove cipav spyware
malicious spyware removal
remote virus scan
windows 7

Wednesday, April 22, 2009

Claria Spyware

Upon installing the program, the installation wizard states that Claria will show advertisements based on the sites a user visits on the internet. The wizard does not state that it will monitor every site a user visits and report that data back to the vendor's database as long as the software is functioning. However, this information is clarified in a detailed End User License Agreement , which is read by very few users. The End User License Agreement gives Claria the right to track and report back information regarding all of the programs on your computer, along with the first four digits of your credit card number, allowing them to know what institution you bank at.

Another huge concern of the public was the fact that the users were prohibited to remove Claria software with anti-virus or anti-spyware software. According to the End User License Agreement, the only way a user was permitted to remove the program was by using the "Add/Remove Programs" utility in the Microsoft Windows operating system.

Additionally, the End User License Agreement does not fully disclose as to what data the Claria Corporation actually collects. Many users were outraged that the program captured sensitive data that could be potentially used to commit internet crimes. Scott Eadgle, the company's Chief Marketing Officer, claims that the only information Claria collects now is behavior of "commercial intent" - referring to product research and shopping online. Eagle went on to claim that the data is filed by an anonymous computer identification number and does not collect email addresses, usernames, zipcodes or complete credit card numbers.

Removal of Claria spyware
Like several types of spyware and adware, the Claria software doesn't completely uninstall after using the "Add/Remove programs" utility. It leaves behind various files and programs such as GAIN, that lead back to the company's server, along with several fragments that can only be cleaned up by a registry cleaning application. Scoott Eadgle states that GAIN is a separate add-delivery program that only collects non-personal user data and automatically uninstalls itself after all traces 0f Claria are completely removed.

See also
remote virus scan
antivirus spyware removal
malicious spyware removal
how to remove cipav spyware
optimize your web browser

Tuesday, April 21, 2009

Gain spyware how it works and how to remove Gain spyware

The gain spyware was designed by claria corporation to get the details of of user habits about the websites they often visits so that they can display ads based on user habits

How Gain Spyware Gets In Your System
Some versions of Kazaa and other P2P programs have been known to install this. Also, it may download by the means of an ActiveX applet in Internet Explorer. If you click "Yes" to a prompt for this program, it will download and install the E-Wallet app and the GAIN app. Some versions have been known to use a file called "Trickler" to slowly and stealthily install the program and the adware component GAIN.

How to remove gain spyware
According to the publisher, Claria, you can remove it VIA the add/remove applet in the Microsoft Windows Control Panel. The adware "should" uninstall after all GAIN supported apps are gone. However if this does not work you may want to download an anti-spyware program. These automated programs can usually remove the E-Wallet Application and the GAIN Spyware App.

See also
windows spyware removal
how to remove cipav spyware
Will Your Device Work with Windows 7
Fix Windows Registry To Speed Up Your Comuter

Friday, April 17, 2009

FBI Is Using Spyware Programs against Extortionists and Hackers

In a separate March 2007 Cinicinnati -based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."

But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases.

"While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department's Computer Crime and Intellectual Property Section.

The documents, which are heavily redacted, do not detail the CIPAV's capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer's IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer's registered owner and registered company name; the current logged-in user name and the last-visited URL.

After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects.

The documents shed some light on how the FBI sneaks the CIPAV onto a target's machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That's what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject's private chat room on MySpace.c0m."

In a separate February 2007 Cincinnati -based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."

The agent phoned the FBI's Special Technologies Operations Unit for "urgent" help, expressing "the valid concern that the Unsub hackers would be 'spooked.'" But two days later the hacker, or a different one, visited the site again and "the system was able to deliver a CIPAV and the CIPAV returned data."

The software's primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks. That's illustrated in several cases in the documents, including the 2004 hunt for a saboteur who cut off telephone, cable TV and internet service for thousands of Boston residents. The man's name is redacted from the documents, but the description of the case matches that of Danny Kelly, an unemployed Massachusetts engineer.
According to court records, Kelly deliberately cut a total of 18 communications cables belong to Comcast, AT&T, Verizon and others over a three month period. In anonymous extortion letters to Comcast and Verizon, Kelly threatened to increase the sabotage if the companies didn't begin paying him $10,000-a-month in protection money. He instructed the companies to deposit the cash in a new bank account and post the account information to a webpage he could access anonymously.

When the FBI tried to track him down from his visits to the webpage, they found he was routing through a German-based anonymizer. The FBI obtained a warrant to use the CIPAV on February 10, 2005, and was apparently successful. Kelly went on to plead guilty to extortion, and was sentenced to five years probation.

The CIPAV also played a previously-unreported role in an investigation of a prolific computer hacker who made headlines after penetrating thousands of computers at Cisco, various U.S. national laboratories, and NASA's Jet Propulsion Laboratory in 2005. The FBI agent leading the case sought approval to plant a CIPAV through an undercover operative posing as a Defense Department contractor "with a computer network connected to JPL's computer network," according to one document. The FBI linked the intrusions to known 16-year-old hacker in Sweden.

And in 2005, FBI agents on the Innocent Images task force hit a wall when trying to track a sexual predator who'd begun threatening the life of a teenage girl he'd met for sex. The man's IP addresses were "from all over the world" -- a sign of web proxy use. The bureau sought and won court approval to use the CIPAV on August 9 2005.

Other cases are less weighty. In another 2oo5 case, someone was unwisely using the name of the chief of the FBI's Buffalo, New York office to harass people online. The FBI got a warrant to use the spyware to track down the fake agent.

Related Search
windows spyware removal
top 10 virus removal
Types of Spyware in your computer
Password-Manipulating Virus Spreading
How To Secure Yourself Against Conficker Worm

Thursday, April 16, 2009

Types of Spyware in your computer

Spyware is any software that collects information from a PC without the user’s knowledge. There are many different types of spyware operating on the Internet but you can generally group them into two categories: Domestic Spyware and Commercial Spyware.

Domestic Spyware is software that is usually purchased and installed by computer owners to watch the Internet behavior on their computer networks. Employers use this software to monitor employee online activities; some family members use domestic spyware to monitor other family members (such as reviewing the content of children’s chat room sessions).

Commercial Spyware (also known as adware) is software that companies use to track your Internet browsing activities. Companies that track your online habits often sell this information to marketers who then hit you with targeted advertising—ads that match your browsing interests and would most likely appeal to you.

Advertisers are delighted when they acquire such valuable marketing information so easily; in the past marketers had to bribe you to learn your preferences through contests, registration surveys and the like. Those methods of gaining your personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse. Gaining your preferences by stealth using software spies is far easier and offers a much more complete picture for the marketing industry; as a result, spyware is everywhere. For more information on how and when spyware attaches itself to your computer, read

How Did Spyware End Up on My Computer?
At the very least, spyware is a nuisance—slowing down your computer, filling your hard drive with useless gunk and marking you as a target for enterprising advertisers. Beyond intruding on your privacy, spyware can be used as a tool to perpetuate crimes, such as identify fraud. Below is a list detailing different types of spyware and the purposes for each.

Internet URL loggers & screen recorders
URL loggers track websites and pages visited online; screen recorders can take a small grayscale snapshot image of your screen every time it changes and can store or transmit these without notifying you. These methods are common to Domestic spyware.

Keyloggers & password recorders Keyloggers & password recorders
When you bank online with this software on your hard drive someone is looking over your shoulder. Password recorders do just that—track typed passwords. Keylogger software records all of your keystrokes, not just passwords.

Web bugs
Web bugs are also known as advertiser spyware or adware. When you have adware on your computer you receive targeted, popup ads after you perform some action, such as typing something into a search engine. This advertising can even appear on your screen even when you are not online. If you are pummeled with new advertising screens constantly, you most likely have web bug spyware installed on your computer.

Browser hijacking
Browser hijackers place Internet shortcuts on your Favorites Folder without prompting you. This shortcut will lead many accidental viewers to their website so that they may artificially inflate their website\'s traffic stats; this enables them to receive higher advertising revenues at the expense of your time. You may be able to get rid of these false favorites by changing your Internet options, but occasionally the only way to get rid of these annoying shortcuts is to go into your registry and delete them. However, some spyware installs a safety net for itself that resets the spyware on your registry each time you reboot. Your only option to kill this aggressive type of spyware is to reformat your hard drive or to utilize an excellent anti-spyware program.

Modem hijacking
If you use a telephone modem for your Internet connection, an unscrupulous person may be able to install an online dialer on your computer to establish a new Internet connection that uses pricy 900-type long-distance phone numbers—quite a shock when you get your next telephone bill. These dialer spyware programs often piggy-back on spam and porn emails; simply opening the email can inadvertently initiate the dialer installation. The hard-to-track villain banks on the fact that you’ll pay your phone bill in full before you take time to figure out what happened.

PC hijacking
Some borrow your computer system for their own use—spyware users can hijack your connection to send their spam through your ISP. This means that a parasitical spammer can send thousands of spam emails through your computer connection and your ISP address. High-volume, high speed Internet access lines are targeted by users of this spyware. Often victims don’t realize that their good name has been muddied until their ISP cuts them off due to spam complaints.

Trojans & viruses
Like the wooden Trojan horse that the Greeks used to enter Troy, this spyware masquerades as a something harmless yet can compromise your computer—your data may be copied, distributed or destroyed. A virus is similar but has the additional power to replicate itself, causing damage to multiple computers. Both of these vicious pieces of software fall under the definition of spyware because the user is unaware of and would not condone their true purpose.

Related Search
morris worm removal
spyware adware removal software
Password-Manipulating Virus Spreading
How To Secure Yourself Against Conficker Worm

Tuesday, April 14, 2009

17-year-old Attacked Twitter With Worm

The nettlesome program, known as a worm, targeted Twitter's network with four different attacks starting early Saturday and ending early Monday, according to Twitter co-founder.
The worm was set up to promote a Twitter knockoff, StalkDaily.com. It displayed unwanted messages on infected Twitter accounts, urging people to visit the Web site.

The worm was designed to automatically reproduce itself once its links were clicked on, but it didn't filch any personal information from the more than 6.1 million people with Twitter accounts, Stone wrote in a posting about the incident. Nearly 10,000.00 Twitter messages, known as "tweets," had to be deleted to contain the potential damage.
"We are still reviewing all the details, cleaning up and we remain alert," Stone reassured Twitter's audience.

Michael "Mikeyy" Mooney, a 17-year-old high school student who created StalkDaily, acknowledged unleashing the worm in a Monday interview with The Associated Press. Besides wanting to promote his Web site, Mooney said he wanted to expose Twitter's weaknesses.
"I really didn't think it was going to get that much attention, but then I started to see all these stories about it and thought, 'Oh my God,' " said Mooney, who lives in Brooklyn, N.Y. He first confessed his responsibility for the worm .

Mooney began having second thoughts about what he had done after reading a part of Stone's posting indicating that Twitter might pursue legal action against its tormenter. In a Monday e-mail sent to the AP, Stone said he didn't know whether Twitter will go after Mooney.
"If I get hit with a lawsuit, I am going to have major regrets and a big brick on my back," Moooney said. "I am backing off now. Twitter ignored its vulnerability (to worms) so I am hoping they can just ignore me now."

In the mean time, Mooney is retooling StalkDaily.com to accommodate more users. He has temporarily closed the site after getting swamped by the traffic triggered by his worm.
The trouble with Mooney represents another rite of passage for San Francisco-based Twitter, which has emerged a popular way to communicate on the Web and mobile phones since its debut three years ago.

Twitter's system, which limits messages to 140 characters, is used to broadcast both mundane and tantalizing information by a diverse group of users that include teenagers, celebrities, news agencies, politicians, police departments and companies.

Twitter's broadening reach makes it an inviting target for mischief makers and scam artists. Two of the Internet's biggest online hangouts, Facebook and MySpace, both have had to grapple with similar threats.

The widening usage also occasionally overwhelms the free service, whose 30 employees have been subsisting on about $55 million in venture capital until Stone and fellow co-founder Evan Williams come up with a way to generate revenue.

Although it doesn't break down as frequently as it did in its early days, Twitter periodically remains inaccessible because its computer servers can't handle all the traffic.
Such challenges have spurred speculation that Twitter eventually will be sold to a larger Internet company. Twitter already spurned a $500.00 million buyout offer from Facebook Inc. There also have been unsubstantiated reports that Internet search leader Google Inc. is eyeing a possible bid for Twitter.

Both Williams and Stone have said they intend to build Twitter into a profitable, independent company.

Related Search
virus removal software
Password-Manipulating Virus Spreading
How To Secure Yourself Against Conficker Worm

Monday, April 13, 2009

Conficker also installs fake antivirus software

Programmers have discovered another characteristic of the Conficker worm that provides an additional clue about the intent of the creators--the worm installs malware that masquerades as antivirus software.

The worm, which has infected millions of Windows-based computers on the Internet, is downloading a program called Spyware Protect 2009 and displaying warning messages saying that the computer is infected and offering to clean it up for US$49.9500, according to the Trend Micro blog.

The infection alerts repeatedly appear and experts are worried that people may be clicking on them and paying for the software just to be rid of the annoying messages, thereby handing thieves their credit card information.

The fake antivirus program also attempts to install a Trojan downloader that is programmed to download new versions of Spyware Protect 2009, according to Kasperky Lab's blog. However, the domain the Trojan downloader was being accessed from has been shut down, the blog said.
The fake antivirus feature further bolsters the speculation that the motivation behind the worm is to make money and not a desire to disrupt computer or network operations.
Researchers were still analyzing new component code of the worm that began being spread via peer-to-peer and being downloaded off domains that host the Waledec worm on Wednesday but were finding the task difficult because the instructions are encrypted.

The worm spreads via a hole in Windows that Microsoft patched in October, as well as through removable storage devices and network shares with weak passwords. The worm disables security software and blocks access to security Web sites.

Despite all the news the worm has made, many computers still remain unpatched, Sophos said. Of the number of people who have used Sophos' free endpoint assessment test to check the security risk of a network since the beginning of the year, 11.00 percent did not have the Microsoft patch installed, according to Graham Cluley's blog at Sophos.
For the month of March, 10 percent of all of the people who used the Sophos assessment tool were missing the patch, he said. The company did not divulge exactly how many people had used the tool and Cluley said the statistics cannot be extrapolated to represent the number of unpatched systems on the Internet.

In an indication of infection rates, IBM's Internet Security Systems group released statistics that show that the number of unique IPs infected with Conficker.C is increasing slightly.
Based on infections seen through monitoring devices in its IBM ISS' Managed Security Services, the number has grown from just over 64,000 on April 2 to more than 71,000 on April 8, according to the unit's Frequency X blog.

"We've seen around 11 percent more unique IPs in the past few days in comparison to a week ago," the blog said, also adding that the number doesn't necessarily indicate the scope of worldwide Conficker infection.

Nearly 60.00 percent of the infections monitored by IBM ISS are in Asia, followed by 18 percent each in Europe and South America, and 4 percent in North America, the statistics show. By country, China leads with 16.6 percent, followed by Brazil at 10.800 percent, Russia at 10.200 percent and Korea at 4.600 percent, according to ISS.

Related Search

Friday, April 10, 2009

Conficker Worm Spams People Too Stupid to Download Antivirus Software

For months, we've wondered what the makers of the Conficker worm, which was set to activate on April one.

Conficker has been the object of a lot of assumption since it was first reported in march; it has since spread to between 3.1 million and 12.1 million computers running Microsoft Windows. One security expert called the computer virus a "digital Pearl Harbor." The reason why it has been so feared is because no one knew quite what it would do — it's designed to take over a computer and then wait for instructions. The only real sign of infection: Conficker blocks access to the websites of Microsoft and other antivirus software companies, making its removal more difficult. Besides that, Conficker is capable, in theory, of anything. Or nothing. April 1 came and went without the millions of infected machines showing much activity.

Then this morning Conficker started downloading a viral payload. The result? Infected machines started displaying popups offering a supposed antivirus software called "Spyware Protect 2009" for $49.951:

It's the perfect behavioral targeting: Anyone who left their machine unprotected against Conficker has a natural need for spyware blockers. Naturally, Spyware Protect 2009 does nothing of the kind; it's actually another computer virus which lets hackers steal passwords and other information— probably so they can make more dollars.

Related Search
spyware removal software
Spyware Master Sentenced
Do Free Anti Spyware Softwares Provide A Real Online Protection

Tuesday, April 7, 2009

How To Protect Yourself from Phishing and Internet Fraud

Phishy Emails. The most common form of phishing is emails pretending to be from a, bank, organization, or government agency. The sender asks to "confirm" your personal information for some reason: an order for something has been placed in your name, or your information has been vanished because of a computer problem. Another method phishers use is to say they''re from the fraud departments of well-known companies and ask to verify your information because they suspect you may be a victim of identity theft! In one case, a phisher claimed to be from a state lottery commission and requested people''s banking information to deposit their "winnings" in their accounts.

links within emails that ask for your personal information. Fraudsters use these links to attract people to phony Web sites that looks just like the real sites of the company, organization, or agency they''re impersonating. If you follow the instructions and enter your personal information on the Web site, you''ll deliver it directly into the hands of identity thieves. To check whether the message is really from the company or agency, call it directly or go to its Web site (use a search engine to find it).

Pharming: In this latest version of online ID theft, a virus or malicious program is secretly planted in your computer and hijacks your Web browser. When you type in the address of a legitimate Web site, you''re taken to a fake copy of the site without realizing it. Any personal information you provide at the phony site, such as your password or account number, can be stolen and fraudulently used.

pop-up screen. Sometimes a phisher will direct you to a real company''s, organization''s, or agency''s Web site, but then an unauthorized pop-up screen created by the scammer will appear, with blanks in which to provide your personal information. If you fill it in, your information will go to the phisher. Legitimate companies, agencies and organizations don''t ask for personal information via pop-up screens. Install pop-up blocking software to help prevent this type of phishing attack.

Use anti-virus and anti-spyware software, and a firewall, and keep them up to date. A spam filter can help reduce the number of phishing emails you get. Anti-virus software, which scans incoming messages for troublesome files, and anti-spyware software, which looks for programs that have been installed on your computer and track your online activities without your knowledge, can protect you against pharming and other techniques that phishers use. Firewalls prevent hackers and unauthorized communications from entering your computer - which is especially important if you have a broadband connection because your computer is open to the Internet whenever it''s turned on. Look for programs that offer automatic updates and take advantage of free patches that manufacturers offer to fix newly discovered problems. Go to www.onguardonline.gov and www.staysafeonline.org to learn more about how to keep your computer secure.

Beware of email attachments if you''re expecting them and know what they contain. Even if the messages look like they came from people you know, they could be from scammers and contain programs that will steal your personal information.

Act immediately if you''ve been hooked by a phisher. If you provided account numbers, PINS, or passwords to a phisher, notify the companies with whom you have the accounts right away. For information about how to put a "fraud alert" on your files at the credit reporting bureaus and other advice for ID theft victims, contact the Federal Trade Commission''s ID Theft Clearinghouse, www.consumer.gov/idtheft or 877-438-4337, TDD 202-326-2501.

Report phishing, whether you''re a victim or not. Tell the company or agency that the phisher was impersonating. You can also report the problem to law enforcement agencies through NCL''s Fraud Center, www.fraud.org. The information you provide helps to stop identity theft.

Related Search
spyware removal

Friday, April 3, 2009

Conficker zombie botnet attacked 3.51 million computers

Early versions of Conficker called home to 251 different domain names every day to check for updates. Since Wednesday, machines infected by with the latest version of the worm (Conficker-C) began using a sample of 501 out of pre-programmed 50,000 domains a day to search for upgrades.

The unknown virus writers who created the worm are yet to publish any such update, but the call-back actions has allowed anti-virus firms to come up with an approximation of how many machines are infected by Conficker-C for the first time.

According to Vietnamese antivirus firm there are around 1.3m machines are infected with Conficker-C. A breakdown of infections by country, compiled by Bkis, can be found here. The combined number of computers infected by Conficker A and B is 2.21m, according to Vietnamese antivirus firm.

That total of around 3.5m is in line with a detailed technical analysis by Conficker which puts the size of the Conficker botnet at between three and four million strong.
IBM's X-Force has a mash-up using Google Maps or Conficker infections across the world, which can be found here. The Conficker Working Group has published more detailed infection maps here.

Estimates of the number of machines ever infected by Conficker vary from ten to 15 million, but these figures ignored disinfections and other factors. It's more meaningful to talk of the current number of zombie drones rather than the number ever infected, because it gives a much better idea of the potential for harm.


Related Search
Complete Online Security from Spyware and Adware
Do Free Anti Spyware Softwares Provide A Real Online Protection

Thursday, April 2, 2009

Malicious spyware Collecting Your Data

A lot of these viruses are affecting Rexbug in a huge way, businesses can't carry on their work while this software is on their computer," said Brandon Goantt, a computer technician at Computer Medical Center.

Surfing the web and clicking a seemingly harmless ad is all it takes to get a virus these days on a PC.
"90.01% of what we do here is cleaning up these viruses," said Chad Carlile, the store manager at Computer Medical Center.

The malicious programs try to look like the original spyware protection programs, with one drastic difference. They claim your virus protection is poor and in need of their help, but in reality they infect your computer, and steal your credit card information.

"A lot of those things are made to look like software that the users are used to seeing on their computer, like Norton Anti-Virus, or Mcaffee Anti-Virus. These softwares are mimicking that software so they can scam them to get money from them," said Gantt.

"You might get a popup that says your computer is infected, you need to click here to run this anti-virus software to get rid of these viruses you have. Once you click on that, you basically have installed the virus," said Carliile.


G0antt continues, "You want a good mix, there are three programs we recommend here at Computer Medical Center, AVG Anti-Virus, Super Anti-Spyware, and Malware Bytes."

Carliile agrees, "What they don't realize is that virus protection software is (only) a guard dog at the front door."

So if something gets passed the guard dog, and your Anti-virus software can't clean it, you might need to turn to the experts.

Related Search
Spyware Master Sentenced
Do Free Anti Spyware Softwares Provide A Real Online Protection

Monday, March 30, 2009

Global 'cyber spy' network In China identified

cyber spy network based about entirely in China has hacked into computer networks around the world, stealing classified information from governments and private organizations in more than 99 countries, Canadian researchers has reported.

The system, dubbed "GhostNet" by the researchers, infiltrated networks in dozens of embassies, foreign ministries, government departments and offices in several cities belonging to the Dalai Lama's Tibetan government-in-exile, the Canadian team said.

The network was uncovered after the Munk Centre for International Studies was initially approached by the Dalai Lama's office to investigate allegations of Chinese espionage.
In over 9 months of study, they then found a far larger spy network, targeting more than 1,285 infected computers in 102 countries.

Easy to hide
One of the characteristics of cyber-attacks of the sort we document here is the ease by which attribution can be obscured," Deiibert said.

"Regardless of who or what is ultimately in control of GhostNet, it is the capabilities of misuse, and the strategic intelligence that can be harvested from it, which matters most."
He said the study highlighted the growing capabilities of cyber attacks and the ease with which the internet can be used to gather high value and sensitive information

Related Search
spyware removal software
Spyware Master Sentenced
Do Free Anti Spyware Softwares Provide A Real Online Protection

Friday, March 27, 2009

New Malware & Viruses

According to ESET, a computer security firm, the most recent virus and other malware attacks are sophisticated and insidious as they rely on socially engineered tactics that lure probable victims into downloading malicious code on their systems. The statement came as a warning that ESET raised during a briefing to the press in Makati City (Philippines).

The security company states that amidst all Internet threats, fake anti-malware programs pose the greatest danger. According to it, a pop-up box would usually emerge saying that there is a spyware or malware on the user's system; therefore, the user needs to click on link to get free anti-spyware or anti-malware software.

The spyware or malware, while taking gain of the genuine software, continues to stay on the user's system despite the free protection solution.
Other variations of similarly socially engineered malicious software also exist like false codecs that generate pop-up boxes informing possible sufferers that there is need to download some specific software to run and watch video files. Apart from spreading via the Internet, spyware, viruses and other malicious programs are transmitted by modern methods of "sneakernet" like being carried on USB (universal bus) storage devices such as multimedia cards and flash disks rather than floppy disks.

Another threat spreading like this is the Downadup or Conficker computer worm that has come up recently. This virus creeps into systems and makes its own copies on other computers. This implies that if any single computer is infected within a network of computers, the infection will disseminate across the whole network.

For instance, if one school computer is infected with the Conficker virus and it does not have the appropriate antivirus, then the malware could spread across the entire network of the school, potentially corrupting other PCs.

Related Search
virus removal
Remote Virus Scan and Removal
How To Catch A Computer Virus
Facebook profiles targeted by hackers

Tuesday, March 24, 2009

“Botnet” spyware creator gets four-year prison sentence

John Schiefer, the creator of the malicious "botnet" computer program, was sentenced by a federal court on Wednesday, for four years for infecting as many as 250,001 computers. Schiefer was computer security consultant from Los Angeles and employee of Santa Monica, California based search engine startup Mahalo.

28-years-old Schiefer was found guilty of using botnet spyware programs to infect and access thousands of computers to steal the identities of the owners of the computers. Schiefer admitted using "botnets" to turn the computers into "zombies" to thieve the identities of victims nationwide by illegally picking information from their PCs and wiretapping their communications.

Commenting on Schaefer’s conduct, the U. S. District Judge A. Howard Matz said, "This kind of conduct is actually far more devastating than assaulting a prison officer." Schiefer was arrested in 2007 under a large U. S. FBI enforcement action against botnet makers, called Operation Bot Roast 2. Schiefer was previously found guilty to hacking, fraud and wiretapping charges. Schiefer created his botnet army while he was a consultant at 3.5G Communications, a small Los Angeles telecommunications company.

The Judge said that Schiefer was employed "to protect people from this kind of conduct, yet he engaged in this kind of conduct."

According to the U. S. Attorney's Office, Schiefer applied the malware, which he called a "spybot," to wiretap electronic communications being sent online from the zombie computers to PayPal and other Web sites. Thus, Judge Matz also ordered Schiefer to pay restitution of $19,000 to PayPal and other companies Judge Matz said, "There's a pathology that society has to deal with. There are people who want to display their prowess in Internet technology -- but they screw up big time."

Mahalo top executives stated that they didn't know about Schiefer's criminal activities when they hired him. In a blog posting, Mahalo founder Jason Calacanis said that still he stands by his employee. Calacanis said, "I consider myself a fairly decent judge of character, and after spending months with John, I'm convinced he was an angry stupid kid when he launched his botnet attack (which did .0000000001% of the damage it could have). Now he's an adult who just wants to make a decent living, spend time with his significant other and breathe the clean air off the Pacific Ocean by our offices in Santa Monica. When he comes out, I hope to be able to offer him a job and that we can work together again."

Related Search
spyware removal

Friday, March 20, 2009

Online Internet Infections: 4 Simple Tips

59% of Online Businesses have been sufferers of hackers, every time you access the Internet it is almost certain that some form of intrusive software is attempting to infiltrate your computer, even your existing Operating System can cause major problems.

The following article will provide four tips which whilst is not definitive, can dramatically reduce the risk of becoming subject to such problems.

The first advice is to install virus removal Software. A virus can completely weaken your computer and potentially cause the entire loss of all information. This can be prevented by installing Anti-Virus Software which will scan your machine to detect any pre-existing viruses and also prevent any new viruses from attacking your computer. However it is crucial that the Software which you adopt is regularly kept up to date.

Viruses can also be avoided by being extra vigilant with regards to what you download and what e-mail attachments you view. It is best to assume that anything could be infected and only access it if you are certain of its authenticity.

The second tip is to install Anti-Spyware Software. Spyware is software that is placed on your computer to secretly gather information about the user. This information could be browsing patterns which is passed on to advertisers or can even log each key pressed by the user in order to obtain details such as passwords and bank details etcetera. It can slow your computer down, alter your home page and produce numerous unwanted links to websites.
This software must too be kept up to date and can be obtained free through various different websites.
The third tip is to install Firewall Software. A Firewall is a piece of Software designed to shield your computer from unauthorised access and unwanted Internet activity. This is particularly important in the business environment. Firewall should be set to work on both incoming activity and outgoing so that you can control both what leaves and enters your computer.

The final tip is with regard to the Operating System issue as mentioned in the introduction. Some Operating Systems develop problems with time which were not anticipated at the point of installation. These problems can be remedied via an update known as a patch. These can be obtained through the supplier’s website. Those users which have Windows XP can activate an internal automatic update facility which is a built in tool to keep Windows up to date.
The Software mentioned above is vital in trying to beat Internet crime as well as protecting your computer against software which can severely damage its operation.

Wednesday, March 18, 2009

How Much You Know About Spywares

So where do you get your spyware removal and prevention software? Adware spyware removal tools are also available for free, usually on Web sites of security software companies. Some other popular Spyware Scanning and Removal Software includes Lava Soft’s Ad-Aware, it's a great FREE software program to help in identification and removal of Spyware software 0n your computer.

When you decide to use a Spyware Removal program, you will be facing a lot of conclusion making. The majority of companies that produce spyware tend to be unethical in that they will use any means necessary to get you to install their spyware and try to make sure you don't remove it. And if you thinking of removing spyware without the help of professional software company, and for free, you should take care to download and install programs that cancel out the threat of spyware from your computer for a long time.

The presence of a toolbar that you did not install on your system, may well be another tell tale sign of spyware presence. If you take a few precautions and install software on your system you should be well protected in the fight against spyware. And if you happen to install software that has no reviews or anything about it on the internet there is a chance that it might be one of those software with spyware in it.

There are many programs that you can download to block adware and spyware from infecting your computer. Even though some adware is harmless and even some webmasters programs that track there movements for marketing purposes, don't you think it is your right to decide who knows your business and not have it stolen from you by some malicious adware spyware program.

Some of the most popular spyware removers include Lavasoft's Ad-Aware SE and Spybot - Search and Destroy. But one of the most popular free spyware programs that you can download is Lavasoft's AdAware. No matter whether you choose, a spyware remover that is free or one that costs money, the important thing is that you get rid of your spyware as soon as possible before the problem gets out of control.

For most users, it is suggested to choose Spyware blocker and remover programs instead of Anti-Spyware programs capable of just one task. The trouble is Spyware manufactures furtively attach these parasites within other programs you download.

Related Search
Spyware Master Sentenced
Computer Virus Removal
How To Catch A Computer Virus
How To Protect Your Computer From Online Attacks
Complete Online Security from Spyware and Adware

Tuesday, March 17, 2009

Complete Online Security from Spyware and Adware

It has been reported that a vast majority of people whose computers are connected to the internet but without any spyware removal or adware removal tools are infected with some kind of virus, Trojan, spyware or adware programs without their knowledge. These malicious programs install themselves discreetly using backdoor entry points and try to steal information from

computers for illegal activities such as sending spam mails. Certain websites block access to personal computers.that happens, such computers have been compromised. When servers come across any suspicious activity, they will block access to such suspicious IPs to prevent any further damage. Getting blocked from accessing a website is not as serious as losing our personal data to third parties who may misuse them.

The malicious software programs and spyware programs that sneak into computers can cause a variety of damage. Some of them just sit there and watch computer users' activities and communicate to the person who installed the malicious software;others will take screen shots of our computer activity and send them regularly to some third party. There are other programs that aim at all the login details and other sensitive information such as our credit card details and our bank account details. The data in our computer can be misused in a variety of ways and the damage caused to us can be of various degrees depending on the nature of the malicious program that is housed in our computer without our knowledge.

Thursday, March 12, 2009

How To Protect Your Computer From Online Attacks

Keeping your computer secure from nastier on the web is often overlooked, but taking a few simple steps can minimize the risks from viruses, Trojans, worms, spyware and all other forms of infections.

Protection is the best way to protect a computer from being attacked by malicious software, also known as malware. Users can avoid malware infecting their computers by using a firewall. But if a PC has already been infected by malware, the cause of the infection could be eliminated by using anti-virus or spyware removal software. So what is a "firewall" exactly? And what do we mean by virus removal software.

What is Firewall

A firewall will try and prevent infection in the first place, and acts as a first line of defense against the web's more unpleasant elements. It monitors inbound and outbound web traffic on a computer, searching and blocking behavior consistent with malware. Whichever operating system you use, check that your firewall is already switched on. This happens as standard with Windows Vista and later versions of Windows XP but not with Mac OS X.

Check if your machine's firewall is on by opening the control panel and selecting firewall settings. Then look at the check box to see if Microsoft's firewall is switched on or off. That said, commercial alternatives can provide a more comprehensive level of protection. There are many tried and tested third-party firewalls available. Some less-known but perfectly adequate pieces of software, are available as a free download.

Many of the free packages also have grown-up fully featured paid-for alternatives. If you decide to plump for a third party firewall, you may need to switch the Microsoft firewall off. Often MS firewall will conflict with third party firewalls.

What is ANTI-VIRUS

While a firewall is the first line of defence, it should also be used in conjunction with good anti-virus and anti-spyware software.

These pieces of software should hunt down and eliminate malicious software lurking on a machine. But make sure only one piece of anti-virus software is installed at a time.
If you purchase or download new anti-virus software, uninstall any previous protective software that may be running on your machine.

Like the firewall, running multiple anti-virus suites can cause software conflicts and create major computer performance issues.

There are also paid-for and free versions of anti-virus and anti-spyware software available.
Many of the free options have fewer and more basic features than the full price alternatives.
In addition, it is important to make sure that anti-virus software and the operating system is updated regularly.

New threats are being released onto the web all the time, so anti-virus and operating system updates are required to combat these threats.

For less experienced users, many of these updates can be performed automatically, by instructing both the operating system and anti-virus to auto-update.

Related Topic
Spyware Master Sentenced
Computer Virus Removal
How To Catch A Computer Virus

Friday, March 6, 2009

Spyware Master Sentenced

A California computer security consultant was sentenced Wednesday to 4 years in federal prison for using spyware (spyware removal) that turned thousand of computers into "zombies" so he could steal their owners' identities.

John Schiefer, 26, admitted using "botnets" -- armies of infected computers -- to steal the identities of victims nationwide by extracting information from their personal computers and wiretapping their communications.

"This kind of conduct is actually far more devastating than assaulting a prison officer," said U.S. District Judge A. Howard Matze, referring to the case heard just prior to Schiefer's.

Matz said Schiefer had been employed "to protect people from this kind of conduct, yet he engaged in this kind of conduct."

Schiefer and several unindicted associates developed and distributed a malicious computer code to vulnerable computers, then used to code to assemble armies of up to 250,000 infected computers, which they used to engage in a variety of identity theft schemes, prosecutors said.

In pleading guilty last April to computer fraud, Schiefeer acknowledged installing malicious computer code, or "malware," that acted as a wiretap on compromised computers.

The victims -- unaware their computers had been turned into "zombies" -- continued to use them to engage in commercial activities.

Schiefer used the malware, which he called a "spybot," to intercept electronic communications being sent online from the zombie computers to PayPal and other Web sites, according to the U.S. Attorney's Office.

"There's a pathology that society has to deal with," Matz said. "There are people who want to display their prowess in Internet technology -- but they screw up big time."

Schiefer also admitted signing up as a consultant with a Dutch Internet advertising company in order to defraud it with his botnets.

He promised to install the company's programs on computers only when the owners gave consent. Instead, Schiefer and two co-schemers installed that program on about 150,000 computers that were infected with their malware, prosecutors said.

Schiefer advised his associates to moderate the number of installations so it appeared they were legitimate and not the result of a malicious computer program that was propagating itself. The company eventually paid Schiefer more than $19,001.

Schiefer was a member of the "botnet underground" and the case was the first prosecution of its kind in the United States, according to the U.S. Attorney's Office.

Along with the prison sentence, Matz ordered Schiefer to pay restitution of $19,000 to PayPal and other companies.

Thursday, March 5, 2009

spyware and adware - what it is, and how to avoid it

The first thing you need to know about protecting yourself from these things is to totally understand what they do. 0nce you know what spyware and adware is, you'll be able to take measures against it infecting your machine.

What Is Spyware?
According to Microsoft, "spyware" is a malicious type of program with the aim of collecting personal information or changing the configuration of your computer. Spyware unethical, in that it is 0ften downloaded without your permission. Usually, you won't know it's even there when it enters your system, and you'll need to have spyware removal software installed in order to remove it.

What Is Adware?
The difference between spyware and adware is not large, and they are essentially the same kind of thing. With spyware, it is possible that your personal information could be given to another source. In other words, is "spying" on you, hence the name spyware. With adware, however, the software is designed primarily to display advertisements on the user's PC.
Is It All Bad?

It is unfortunate, but several people tend to believe that all types of this software are harmful and definitely should be avoided. That's not always the case. Of course, in most cases spyware adware are harmful and are not the kind of thing you want on your PC, but there are exceptions where you may actually want software like this on your PC.

Remember, to make it spyware it has to be downloaded to your computer without your consent. Spyware can sometimes be downloaded through things as "driveby" downloads or through other exploits, so that the user never even knows it is on their machine. Any program that is downloaded with the users permission is technically not spyware.

Why would you want to have spyware that tracks your personal information and surfing habits running on your computer? And more importantly, why would you want those advertisements? Well, there may be some exceptional cases be useful. For example, you may actually sign up for a service online and when you do you may also agree to receive targeted ads.

Companies like this find it useful to track where you go 0nline (monitoring your surfing habits) and looking at what you do, in order to provide you with ads that are highly targeted to your interests. For example, if you were to search for dog food, spyware company may give you advertising from dog food companies. So, rather than seeing annoying ads that have no interest to you, you may instead see things that are targeted and useful to what you are searching for.

Related Search
Computer Virus Removal
Facebook profiles targeted by hackers
Online Bank Accounts Under Virus Attack
Do Free Anti Spyware Softwares Provide A Real Online Protection