Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Anti-Spyware Protection: Behind How-To Tips > NetSparsh - Viral Content you Love & Share

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But?

A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away.

Hint one: What on earth is spyware?

When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And?

"There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market."

This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222

Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially.

As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure.

On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers.

What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet.

So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information.

According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan.

Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much.

Hint Two: Too Many Promises Made -- Is it Possible to Keep them?

There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't.

Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works ? it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped.

So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains.

What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates.

Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc. Learn more -- visit the company's website: http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Security, privacy experts weigh in on the ICE doxxing
TechCrunch
In what appears to be the latest salvo in a new, wired form of protest, developer Sam Lavigne posted code that scrapes LinkedIn to find Immigration and Customs Enforcement employee accounts. His code, which basically a Python-based tool that scans ...
Trump signs executive order on immigration, but says 'zero tolerance' will continueUSA TODAY
GitHub, Medium, and Twitter take down database of ICE employee LinkedIn accountsThe Verge
Federal agencies continue to advance capabilities with Azure Government – Azure Government CloudMSDN Blogs - Microsoft
GitHub
all 42 news articles »

EFF

Journalists and Digital Security: Some Thoughts on the NYT Leak Case
EFF
The leak investigation involving a Senate staffer and a New York Times reporter raises significant issues about journalists, digital security, and the ability of journalists to protect confidential sources. The New York Times recently revealed that the ...


BBC News

Venezuela crisis: UN says security forces killed hundreds
BBC News
Venezuelan security forces have carried out hundreds of arbitrary killings under the guise of fighting crime, the UN's human rights body says. In a report, it cites "shocking" accounts of young men being killed during operations, often in poor ...
Killings by security forces rife in Venezuela, rule of law 'virtually absent': UNReuters
Venezuelan security forces killed 'hundreds', rule of law 'virtually absent', UN saysTelegraph.co.uk

all 221 news articles »

Los Angeles Times

Protesters gather outside Homeland Security Secretary Kirstjen Nielsen's home
Los Angeles Times
About two dozen people gathered Friday morning outside the Virginia home of Homeland Security Secretary Kirstjen Nielsen in response to the Trump administration's policy on separating children from their parents at the border. According to an organizer ...
Homeland Security Secretary Kirstjen Nielsen heckled outside her homeKGO-TV
DHS Secretary Nielsen casts immigration crisis as 'a national security issue'ABC News
Shaheen calls for Homeland Security secretary's resignationConcord Monitor

all 1,741 news articles »

Security Intelligence (blog)

Why Security Skills Should Be Taught, Not Hired
Security Intelligence (blog)
Chief information security officers (CISOs) across the globe have long lamented the fact that so many job applicants lack the security skills they need to fill crucial security positions. Put bluntly: IT leaders have simply failed to create a pipeline ...


Digital Trends

Improving security means killing the password, but that battle has just begun
Digital Trends
(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity. Passwords are often cited as the biggest problem with modern digital security. They're supposed to be complicated, unique, and ever changing, and yet few ...

and more »

Tom's Guide

Millions of Baby Monitors, Security Cameras Easy to Hack
Tom's Guide
In a new report, information-security firm SEC Consult details a vulnerability the snoop might have exploited. If SEC Consult is right, many other baby monitors, security cameras and webcams made by the same manufacturer (hint: it isn't FREDI) might be ...


Wall Street Journal

EU Set to Impose Sanctions on Myanmar Security Officials
Wall Street Journal
The European Union is set to impose sanctions on seven Myanmar military and border guard police officials over the mass expulsion of ethnic Rohingya, according to diplomats, in a sign that EU leaders will go beyond words in punishing Myanmar security ...

and more »

Mac Rumors

Apple iOS Passcode Crack Revealed by Security Researcher. Watch the Exploit in Action
Fortune
An iPhone can be unlocked with a virtual keyboard pretending to type lots of passcodes, a security researcher revealed Friday. By sending all possible four-digit PIN combinations as if they came from a USB keyboard, the cracking method bypasses Apple's ...
Security Researcher Discovers Method for Brute Forcing iPhone Passcode in iOS 11Mac Rumors

all 74 news articles »

The National Security Law Podcast: It's a Girl!
Lawfare (blog)
A quick run-down of other DOJ national security developments this week includes new charges against a man allegedly responsible for leaking the CIA “Vault 7” materials to Wikileaks and also a Wisconsin woman who allegedly hacked the social media ...

Google News

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More