Explore chapters and articles related to this topic
Securing Your Computers
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
You can download and use any of the abovementioned anti-spyware software tools to keep your computer safe from spyware programs. These programs make your information as well as your system exposed to the hackers. Take the following measures to make your spyware protection more robust and effective: Use reliable and dedicated antispyware software.Many anti-spyware software embedded with the antivirus ignore minor spyware programs.Always keep your anti-spyware software up to date.Scan your computer regularly for any kind of spyware on your computer.Always be vigilant while visiting the unknown websites.Major source of spyware spreading is infected websites.Deal strictly with the pop-ups and alluring offers by clicking “x” on it.Set your browser settings to block pop-up ads.Do not open emails from the unknown senders.
Cyber Security Techniques Management
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Meenu Shukla, Fatima Ziya, Sharmila Arun, Suraj Pal Singh
The objective of this chapter is to discuss some cyber security issues which commonly occur in the internet society. Spyware is one of the most common attacks. In these attacks, the hacker can use it to gain access to the network and confidential information. Basically, Spyware is a software program that collects information about a user without his/her knowledge. Attackers can also use this software to install other programs like keyloggers that can record user passwords and user record history. The variation of the data using a laptop or a personal computer is shown in Figure 9.1b The graph shows the percentage of PCs estimated to have spyware/adware and the percentage of PCs lacking data protection [2].
Information Services
Published in Michael M. A. Mirabito, Barbara L. Morgenstern, Mitchell Kapor, The New Communications Technologies, 2004
Michael M. A. Mirabito, Barbara L. Morgenstern, Mitchell Kapor
Privacy issues also became a primary concern: How do you ensure that other people are not monitoring the sites you visit? In one example, your computer may be infected with spyware—software that you are not aware of but may be sending back information about the sites you visit. While browsing the Internet, spyware may “infect” your computer without your knowledge or consent. Thus, as you continue site hopping, this information is collected and may be sold to third parties (e.g., as an advertising tool). It is analogous to a survey, but in this case, your browsing preferences are recorded. You can actually remove spyware from your system by using other software that identifies and cleans your system—the spyware is eliminated.51Another privacy tool is to use a service that provides you with anonymous browsing. One such operation has been Anonymizer.52 You could select various privacy options, including one that would shield your Internet identity. The actual URLs you visit may also be scrambled so they are unintelligible to other individuals.You can permanently erase Internetbased information that details the sites you visit and other data. When you erase information from your hard drive, it could potentially be recovered through software and/or hardware tools. A browser may also store information about your Internet travels that you may not even be aware of—in various directories or folders.
Adaptive and Maladaptive Coping with an It Threat
Published in Information Systems Management, 2019
Tim Chenoweth, Tom Gattiker, Karen Corral
The particular security threat that we examine is spyware. Spyware is virus-like computer software that surreptitiously takes partial control of a user’s computer, often compromising data security and other aspects of system integrity. Simply put, spyware is a serious problem. For example, researchers have reported, “the rampant invasion of spyware into home and business computers threatens the foundations of the networked economy with far-reaching legal and financial consequences” (Hu & Dinev, 2005). It has been estimated that up to 13% of personal computers are infected with malware and 7% of broadband customers are infected with high-level threats – that is, bots, root-kits, and banking Trojans (Kindsight Security Labs, 2012) and that up to 13% of enterprise threat attacks are from spyware and associated malware (Collett, 2013). Antispyware software is designed to search for and disable or eliminate known spyware software; however a significant number of computer users do not install, enable, or keep their antispyware software up to date (Stewart, 2013).