The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!

We have some serious problems. These narcissistic bugger programmers that develop application and browser hijackers, pop-up pushers, adware scams and other bogus blots of code that only make life worse, need to be taught a lesson or two. They are like fleas, pesky taggers, used gum thrown on the pavement that you just stepped in, but way worse. And for what reason? Advertising?

The graffiti artist or "tagger" is trying to make a name for himself by either creative representation or pure mass distribution. Hey, you are all annoying, you are all vandals, but really, your destruction is trite. We are not afraid of you we just think your art is ugly.

Of course you can get some bug spray or clean your shoe, but these hijacks will cost you a whole lot more. Oh yeah, I have seen massive amounts of destruction brought about by malicious code, and I am not talking about viruses.

Let's Reason

Truthfully, I think we need to intervene and get a hold of this situation. There are companies that produce "hijackers" for the sake of advertising. But that code has grown far too chaotic to serve as any means for honest advertising. I am hired every day to fix problems brought about by certain American corporate advertising campaigns.

Most of us have experienced the various "Trojans" that hijack your Internet browser start and search pages, changing them to some site that they are advertising for, let alone the formidable "about.blank" page. The Trojan then makes it difficult to change these setting back, often requiring Registry edits and special removal tools just so you can get back to easy Internet browsing.

Let's look at some industry specifics.

One of the largest Adware agencies WhenU.com of New York, distributes its software piggybacked on popular "free" applications downloaded from the Internet. Once on your computer, it then distributes advertisements in the form of pop-ups to your desktop as you browse the Internet. Who's to blame in this scenario, WhenU or its clients that actually pay WhenU to distribute their ads? Merck, T-Mobile, Priceline, Verizon, to name a few.

And mortgage brokers. I would say that 50% of all the spam I receive is based around some untrue promise about an enormously low interest rate for which I qualify. Strange, most of the junk mail I get in my street mailbox is the same crap. WHO FALLS FOR THIS? It must work if the junk keeps coming and coming.

I am not talking specifically about spam here, that is a story in itself, but I am talking about unfair marketing techniques that need to be controlled. We all see our fair share of mortgage company pop-ups, don't we?

Give me the shotgun!

The worst of the worst are the various toolbar distributors that promise a better Internet experience. CoolWebSearch, Hotbar, WyWebSearch, and the horrid "My Search Assistant" which mutates itself if you try to uninstall it. How creepy is that? Every time you uninstall the hijacker, it places itself in a different spot on your computer and renames itself, so the next time you restart your PC, it re-installs. Trust me, the longer you keep this program on your system, the worse your system gets. More and more pop-ups which lead to more spyware and adware and the resolution is horrendous. Wipe and reload.

The Reverence

Bow down to the savior of smart computing. Learn to understand how your system gets infected. Learn to use the appropriate spyware and adware prevention programs and removal tools. Learn to get some help before it is too late. The difficult part if finding who to trust.

That's where I come in.

Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. a network consulting, web design and hosting company in California. As well, Greg runs a web based distributorship for Ujena swimwear and clothing. Please visit My Shop Girl Sexy Swimwear and Web Bikini Store and Clothing for Women for details.

All past articles written by Greg Richburg are available at Netricks Tech News.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

EPA Chief's Spending on Security: Nearly Double His Predecessors'
New York Times
Scott Pruitt, the head of the Environmental Protection Agency, spent roughly $3.5 million in taxpayer funds on his personal security detail during his first year in office, 1.7 times what his predecessors spent each year on average, according to ...
EPA spent $3.5 million to protect Scott Pruitt, nearly twice the typical security costCNBC
Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reportsWashington Post
EPA spent nearly $3.5M on Pruitt securityCNN
Reuters -CBS News -Politico -EPA
all 121 news articles »

Reuters

Apple sees steep increase in US national security requests
Reuters
Apple said it received as many as 16,249 national security requests affecting up to 8,249 accounts during the second half of 2017. The number of requests rose 20 percent compared with the first half of 2017, when Apple received 13,499 such requests.
Apple sees steep increase in US national security-related data requestsBusiness Insider
Steam Link (BETA) - Apps on Google PlayGoogle Play
Steam LinkSteam
Twitter
all 158 news articles »

Barron's

GDPR Inc.: Profiting From Strict New Security Rules
Barron's
The strict European Union–mandated online security law—which affects how companies gather and handle information about Europeans—has “helped us grow our company significantly,” says Hilary Wandall, chief data governance officer at TrustArc, ...


Forbes

Amazon Alexa Security - - How Secure Are Voice Assistants And How Can You Protect Yourself?
Forbes
Voice speakers such as the Amazon Echo have already shown themselves to be less than trustworthy. Only a few months ago, consumers complained about sinister laughter coming from the Amazon Alexa assistant. Meanwhile, the always listening devices ...
An Amazon Echo recorded a family's conversation, then sent it to a random person in their contacts, report saysWashington Post
Woman says her Amazon device recorded private conversation, sent it out to random contactKIRO Seattle

all 484 news articles »

Forbes

Corporate File Systems Tell A Different Security Story
Forbes
At the same time, over the last several years, data security spending has been on a growth trajectory and is expected to reach almost $100 billion worldwide in 2018, according to Gartner. It's hopeful to think that increased investments in security ...


The Onion (satire)

Jared Kushner's Security Clearance Restored
The Onion (satire)
White House senior advisor Jared Kushner had his security clearance restored after temporarily losing it amid the uncertainty of the special counsel's ongoing investigation. What do you think? “I know I feel safer already knowing he is back at the helm.”.


New York Times

Important Case for National Security
New York Times
Yes, I know. This wasn't really about football. Well, it was a little. There are those goal posts in the grid. But what I liked about this puzzle by Jeff Chen was that it gave me an opportunity to learn a bit more about something being discussed in the ...


IGN

E3 Lays Out Security Guidelines for This Year's Show
IGN
By Michael Koczwara Things have gotten a little more strict when it comes to security on the show floor of this year's E3. Backpacks will no longer be allowed on the show floor unless you are part of the media or an exhibitor at the show. Anyone else ...


WTVD-TV

EPA has spent more than $3.5 million on Pruitt's security in first year in office
WTVD-TV
The agency says that Pruitt needed 24/7 security - more than previous administrators - in response to an "unprecedented number of threats" against him. Because of the threats, the EPA says, Pruit and his security team needed to fly first class and the ...


KSHB

Blue Valley school district brings implements added security measurements
KSHB
OVERLAND PARK, Kan. — Parents of the Blue Valley school district received a letter this week informing parents of some of the general safety enhancements, hoping to add another layer of security in schools. “I think security is the answer to a lot of ...

Google News

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More