Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Anti-Spyware Protection: Behind How-To Tips > NetSparsh - Viral Content you Love & Share

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But?

A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away.

Hint one: What on earth is spyware?

When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And?

"There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market."

This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222

Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially.

As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure.

On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers.

What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet.

So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information.

According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan.

Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much.

Hint Two: Too Many Promises Made -- Is it Possible to Keep them?

There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't.

Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works ? it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped.

So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains.

What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates.

Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc. Learn more -- visit the company's website: http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NPR

Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny
NPR
"Election officials have been doing a ton around election security, but if that same thing isn't going on at the vendor level, then that creates a really big potential vulnerability for the entire system," said Edgardo Cortéz, an election security ...

and more »

WOAI

Security guard nearly run over after stumbling onto drug deal
WOAI
SAN ANTONIO - A security guard is nearly run over after breaking up a drug deal on Perrin Central near Perrin Beitel and Wurzbach Parkway. Police said that about 1 a.m. Friday the guard saw four people in the parking lot of the Oak Springs Apartments ...

and more »

Politico

NSA: Security breaches of hacking tools curtailed snooping
Politico
The National Security Agency shut down expensive and vital operations as a result of top secret information being spirited out of its headquarters by a fired NSA computer engineer who claims he took the sensitive records home to work on bolstering his ...


Mashable

A woman accosted a security guard with a fanny pack containing a pigeon
Mashable
A well-planned surprise can be an absolute joy. A surprise birthday party? So much fun! An unexpected gift? Yes, please! A surprise pigeon? Hard pass. Following an altercation with employees at a Social Security Administration office in Virginia on ...
Woman hits security guard with fanny pack containing pigeon, police sayMyPalmBeachPost
Woman pulls knife on security guard, hits him with fanny pack that had pigeon insideWashington Post
Woman pulls knife on security guard, then hits him with bag that had pigeon insideThe Independent

all 37 news articles »

WIRED

Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer
WIRED
The internet's decentralized nature means that the clocks behind every web browser and web application can actually have major discrepancies, which in turn can undermine security protections. In a step toward addressing these inconsistencies, the ...


The Verge

Amazon is turning the Echo into a security system
The Verge
Amazon is adding a few new features to the Echo that turn it into one of the basic pieces of a smart security system. Since Echo speakers are always listening, they'll be able to start listening for the sound of broken glass, or for a smoke or carbon ...
Alexa Guard turns Echo products into security devicesTechCrunch
Alexa Guard makes your Echo a home security deviceEngadget
ADT and Amazon Team Up to Provide Customers With New Home Security FeaturesNasdaq

all 2,304 news articles »

USA TODAY

Terrorism task force investigating 'security breach' at Orlando Melbourne airport
USA TODAY
MELBOURNE, Fla. – The Joint Terrorism Task Force is overseeing the investigation into an overnight incident involving a man suspected of hopping a fence at the Orlando Melbourne International Airport and boarding a vacant American Airlines Airbus in a ...
Student with pilot's license arrested after security breach at Melbourne International AirportWFTV Orlando
Orlando Melbourne International Airport security breach: What we knowFlorida Today
Officials ID student pilot accused of breaching Florida airport securityNews 13 Orlando
SpaceCoastDaily.com -Palm Beach Post -Florida Today
all 1,042 news articles »

The State of NAIC's Data Security Model Law
Insurance Journal
Most states have yet to adopt a cyber security model law for the insurance industry like the one approved by the National Association of Insurance Commissioners in 2017, but one expert believes the industry should be prepared for what he sees as an ...


ZDNet

SingHealth data breach reveals several 'inadequate' security measures
ZDNet
Investigation into Singapore's most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations. The findings were revealed on the first day of hearings led by ...

and more »

CIO

Pentagon CIOs struggle with legacy tech, security. Sound familiar?
CIO
Flanders, CIO of the Defense Health Agency, is gearing up to consolidate control over the Pentagon's sprawling network of treatment centers, in the process centralizing a far-flung set of IT operations that raise a host of security and device ...

Google News

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More