Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission... It can log your keystrokes, which websites you visit, read you email, and even prowl your hard drives. At some point in time, it transmits its harvested information to the owner. Transmitting this data can slow your computers resources which can result in programs taking longer to load, make for longer waits for WebPages to load, and even complete system failures can occur.

A different type of Spyware called Adware can be included in a download. You didn't notice it was included in the download when you read the user agreement since you might have given up on reading the user agreement after 2000 or 3000 words into it. That's what they wanted you to do! Or maybe, shame shame, you didn't even read it!

Webroot recently finished a survey that concluded the average home computer has 28 pieces of Spyware on it. I recently stumbled across an admiringly clever piece of Spyware that recorded both sides of Instant Messaging Programs!

Just the other night I read that some unsuspecting Stock Investors found their accounts empty one morning.... they had downloaded a Beta Stock Tweaking Tool that had a keylogger on it.

Oh, let's not forget the Website you are at when a 'Pop Up' states you need a 'Plug In' to view something special there. If you don't have your Java or your Virtual Basic updates, you could be providing all the information on your computer to a very interested third party. Pop Ups can be very deceiving. Do you quickly close out a Pop Up or click the No button? What if the code that runs it is set up to run no matter what option you pick?

So there you are, a victim of Spyware. You've been used! You want revenge! You shout, "If only I could invent the perfect Anti-Spyware Tool!" Well maybe you shout something else, I know I have.

Would this perfect Anti-Spyware Tool tell you when visit a Website that has Spyware? Would it prevent Spyware from transmitting your information that it has collected? Would it even prevent Spyware form becoming active? Would it make Coffee too?

Ah if only it could be.

You have to safeguard your personal information when you are online.

It's been said by a few that one way to curb the spread of Spyware is to allow it to collect certain types on information from you. Information you agree to. In turn, for collecting this information, you are compensated in some way. There are Websites and programs out there that do this in some way or form. You accrue points or whatever that you redeem for cash or a blender or whatever. Regardless of how its done, it might be a way to reduce the anxiety of wondering if your personal information is being harvested and even worse, what they are using it for.

About the Author:

Doug Woodall has a website at http://www.spywarebiz.com

There he provides free information and recommended products to combat Spyware.

He is a member of the IWA (International Webmasters Association)

Doug can be reached at [email protected]

Article edited for proper content by Wendy McCallum

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

WBAL Baltimore

Security guard fatally shoots man in Catonsville
WBAL Baltimore
A security guard fatally shot a man who fired his own gun after refusing to leave a Catonsville business Saturday, Baltimore County police said. County police said security guards were asking people to leave the parking lot because the business was closed.
Man killed after gunfire exchange with security guard at Catonsville ...Fox Baltimore

all 11 news articles »

Washington Post

Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reports
Washington Post
The round-the-clock security detail for Environmental Protection Agency Administrator Scott Pruitt cost taxpayers almost $3.5 million during his first year in office, according to figures published Friday by the agency. EPA spent more than $2.7 million ...
EPA Chief's Spending on Security: Nearly Double His Predecessors'New York Times
EPA chief's security bill soars, agency cites death threatsReuters
EPA spent nearly $3.5M on Pruitt securityCNN
Bloomberg -CBS News -CNBC -Politico
all 118 news articles »

WIRED

Security News This Week: T-Mobile Web Portal Exposed 74 Million Accounts
WIRED
T-Mobile has about 74 million customers, and the company added a credential login to protect the tool after receiving the alert from security researcher Ryan Stevenson. Per its bug bounty program, T-Mobile awarded Stevenson $1,000 for the discovery.


CNBC

Google awarded this teenager $36000 for finding a security flaw
CNBC
Ezequiel Pereira was about a month shy of 17 when he first got paid for exposing a Google security flaw through its bug bounty program. Pereira got his first computer when he was 10, took an initial programming class when he was 11 and then spent years ...


CBS New York

NYPD: Security Guard Struck & Killed By Glass Panel At Manhattan Construction Site
CBS New York
NEW YORK (CBSNewYork) — A security guard was killed and a worker was hurt when a large panel of glass fell at a construction site near Central Park Saturday morning. The FDNY said it responded to calls for a construction related accident at 217 West ...
Security guard dies after falling glass from Central Park Tower ...New York Daily News
Security guard crushed to death at Midtown construction site; 1 injuredWABC-TV
Security Guard Killed By Falling Glass Panel In Midtown: NYPDPatch.com
WPIX 11 New York
all 9 news articles »

KCRG

EPA has spent more than $3.5 million on Pruitt's security in first year in office
KCRG
WASHINGTON, D.C. (ABC News) -- The Environmental Protection Agency confirmed Friday that it has spent more than $3.5 million on Administrator Scott Pruitt's security team since taking office, significantly more than his two predecessors.
EPA spends 30 percent more on Pruitt's security, cites death threatsYahoo News

all 49 news articles »

Kansas City Star (blog)

Security of the midterm elections needs attention now
Kansas City Star (blog)
When top intelligence officials went to Capitol Hill one morning last week to give House members a classified briefing on the security of the upcoming elections, only 40 or so bothered to show up. In other words, nine out of 10 lawmakers thought they ...
Homeland Security announces 15000 additional seasonal visas for companies at risk of failureThe Hill
Homeland Security issues 15000 more H-2B visas amid crab industry labor shortage in Maryland, elsewhereBaltimore Sun
Homeland Security authorizes 15000 visas to help struggling companiesUPI.com
The Boston Globe -Paulick Report
all 79 news articles »

The Jerusalem Post

Four Gazans breach security fence, flee back after IDF troops open fire
The Jerusalem Post
Thousands of Gazans have been demonstrating along the security fence since March 30, and on Friday some 5,000 gathered in two locations, burning tires and throwing stones at IDF troops, who fired tear gas and live rounds toward rioters. While no ...
Watch: Bomb placed near Gaza security fence neutralizedArutz Sheva
PA threatens to cut security ties with Israel if Gaza blockade liftedMiddle East Monitor

all 482 news articles »

Reuters

Jailed British-Iranian aid worker to face trial on security charges: Iran court head
Reuters
DUBAI (Reuters) - A detained British-Iranian aid worker sentenced to five years in jail in Iran is to face a second trial on new security charges, the semi-official Tasnim news agency on Saturday quoted Tehran Revolutionary Court's head Musa ...
Jailed British-Iranian Aid Worker To Face Trial On New Security ChargeRadioFreeEurope/RadioLiberty
Detained Iranian-British woman to face 'security charges'Tampabay.com

all 14 news articles »

9to5Mac

Netgear informs Arlo users of potential security threat, suggests changing passwords
9to5Mac
We take the privacy and security of your account and personal information very seriously and have initiated an investigation into the suspicious activity. From our initial investigation, it appears that attackers may be using credentials obtained from ...

Google News

Computer Security

What is computer security? Computer security is the process of... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More