Spyware is the latest epidemic security threat. Investigating Factors Affecting

Size: px
Start display at page:

Download "Spyware is the latest epidemic security threat. Investigating Factors Affecting"

Transcription

1 By Younghwa Lee and Kenneth A. Kozar Investigating Factors Affecting of Anti Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing available bandwidth, annoying users with endless pop-ups, and monitoring users computer usage. As spyware makes the Internet a riskier place and undermines confidence in online activities, Internet users stop purchasing at online stores a consequence that clearly disrupts e-business. A variety of countemeasures for fighting spyware have been developed, including ant-spyware law enforcement and legislation, antispyware systems, and self-regulatory programs (see Figure 1 and Table 1). An anti-spyware Illustration by Ferruccio Sardella 72 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

2 the Like any IT innovation, determining how best to convince users to adopt it is half the battle. Such is the case for anti-spyware solutions. -Spyware s COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 73

3 system is the most widely recommended solution, which implements features that prevent, detect, and remedy the problems caused by spyware. The system monitors spyware attacks and automatically identifies and cleanses a system. Studies have identified that more than 80% of current spyware problems could be identified and resolved by using anti-spyware systems. Therefore, spyware experts such as FTC commissioner Orson Swindle strongly encourage Internet users adopt anti-spyware systems. However, contrary to our expectation for a higher adoption rate, only 10% of Internet users have actually done so [2]. Considering that anti-spyware systems effectively shield users from spyware, their low adoption rate continues to be a problem. Several suppositions have been made about this, but an empirical study has yet to be conducted. The goal of this article is to investigate the factors affecting Internet users adoption of an anti-spyware system. Our study seeks to provide a better understanding of an individual s decision to adopt an anti-spyware system, as well as provide a useful guideline on how to increase the adoption rate. The anti-spyware system adoption model was developed based on the theory of planned behavior (TPB) and previous studies of IT Antispyware solutions Types Spyware Anti-spyware law enforcement and legislation Anti-spyware systems Anti-spyware self-regulatory program Table 1. Types of spyware and anti-spyware solutions. innovation adoption. The TPB model has been widely adopted to address computer-related human behaviors because it can successfully capture individual, social, and situational factors impacting an individual s decision [1]. As this model has been effective in explaining and predicting the adoption of new information technologies, it was fitting to use it to examine the adoption of anti-spyware systems. In this context, the model hypothesizes when an individual has a favorable attitude toward an anti-spyware system; when an individual perceives social pressure to adopt or not to adopt an anti-spyware system; and when an individual perceives Classification Adware Keyloggers Trojans Scumware Dialers Browser Hijackers Internet Spyware (I-SPY) Prevention Act of 2004 SPYBLOCK Act Securely Protect Yourself Against Cyber Trespass Act (SPY ACT) Spybot Search and Destroy Spy Sweeper Ad-Aware Spector Pro Spyware Eliminator PestPatrol Spy Catcher AntiSpy AntiSpyware STOPZilla SpywareBlaster Consortium of Antispyware Technology Vendors (COAST) SpyNet SpywareInfo Definition and URL Programs that monitor Internet users online activities to initiate pop-up advertising or other targeted marketing purposes. Programs that capture and record Internet users every keystroke, including personal information and passwords. Malicious programs that appear as harmless or desirable applications, but are designed to cause loss or theft of computer data, or even to destroy the system. Programs that alter the content of Web sites Internet users are accessing, changing the normal links to reroute them to other Web sites. Programs typically used by vendors serving pornography via the Internet. Programs that run automatically every time Internet users start their Internet browser to gather info on the users surfing habits Anti-spyware terms and definitions; there are controlling factors that facilitate or constrain his or Lee her adoption, table 1 (8/05) thus influencing their intention to adopt anti-spyware software. In the same vein, previous studies of IT innovation adoption have identified factors that influence an individual s decision to adopt a new technology [3], including relative advantage, moral compatibility, ease of use, image, visibility, and trialability. These IT innovation factors are well suited for explaining the adoption of an anti-spyware system. In addition, subjective norm, perceived cost, and computing capacity are new factors identified through a focus group study with seven anti-spyware system experts and interviews with 21 anti-spyware system adopters. To increase the explanation power of the TPB 74 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

4 model, researchers have encouraged identifying situation-specific factors and adding them to the model. Figure 2 shows the research model consisting of nine factors believed to significantly influence an individual s adoption of an anti-spyware system. Relative advantage, moral compatibility, and ease of use are classified as attitude factors, subjective norm, visibility and image as social factors, and computing capacity, perceived cost, and trialability as perceived behavioral control factors. The definition of each factor is described in Table 2. To validate the research model, a questionnairebased field survey was conducted with Internet users who have adopted or have Factors Attitude Social Factors Behavioral Control Intention ware system adoption. The insignificance of subjective norm points out that users did not consider pressures from their referents to be important for the anti-spyware adoption decision. For perceived behavioral control, computing capacity and trialability showed a significant effect, while perceived cost did not. The significant impact of computing capacity suggests the more powerful computing environ- Sub- Factors Relative Advantage Moral Compatibility Ease of Use Subjective Norm Visibility Image Computing Capacity Cost Trialability Definition Table 2. Definitions of factors affecting the anti-spyware system adoption. Lee table 2 (8/05) an interest in adopting an anti-spyware system. Some 292 subjects were recruited to the study through advertisements addressing an online privacy community, as well as local and student newspapers. In the end, 212 usable responses were gathered. The average age of the respondents was 27.6 years Gender old. 67% of subjects Female were male, and 65% (n = 70) were industry professionals. They had an ** Ease of Use Relative Advantage ** Moral Compatibility average of nine months Subjective Norm of experience with antispyware system adop- Image * Visibility ** Computing Capacity tion. Data was analyzed * Cost using Partial Least Trialability Squares (PLS). * As illustrated in Figure 3, the model successfully explains an individual s adoption intention (R 2 = 0.83) and actual adoption (R 2 = 0.55) of the anti-spyware system. 1 Six out of nine factors showed a significant influence on anti-spyware system adoption intention. Relative advantage, moral compatibility, visibility, image, computing capacity and trialability were significant factors, whereas ease of use, subjective norm, and perceived cost were not. Out of three attitude factors, relative advantage was the strongest factor affecting the adoption intention. It indicates that people are inclined to adopt an antispyware system when they perceive it as a useful, effective means for keeping their computing environment safe and thus enhancing their task performance. Moral compatibility also showed a significant influence suggesting the stronger the belief that adopting anti-spyware systems is a morally correct behavior to contribute to the overall safety of the Internet environment, the higher the intention to adopt it. The insignificance of ease of use reflects The degree to which an individual believes that using an anti-spyware system would enhance his or her task performance The degree to which the adoption of an anti-spyware system is compatible with one s moral perception The degree to which an anti-spyware system is easy to learn and use The degree to which an individual perceives social pressure to adopt or not to adopt an anti-spyware system from his/her referents The degree to which an individual observes others adoption of an anti-spyware system The degree to which the adoption of an antispyware system enhances one s image as a technical and moral leader among his/her referents. The degree to which an anti-spyware system fits with capacity of one s computer and networks The degree to which an individual perceives purchasing an anti-spyware system is expensive The degree to which it is possible to try using an anti-spyware system before adoption An indication of a person's readiness to use an anti-spyware system Actual anti-spyware system use Male (n = 142 ) *** * ** ** * * Table 3. Results by different gender and age. Lee table 3 (8/05) 1 R 2 = 0.83 means that 83% of individual s adoption intention is explained by antecedents including attitude, social factors, and perceived behavioral control. Age 30 and Below (n = 85 ) ** ** 0.17 ** * * 0.1 * Above 30 (n = 127 ) *** *** * ** * * * Statistically significant at * : p <0.05, ** : p <0.01, *** : p <0.001 that Internet users did not perceive any difficulty in installing and using the system. Most current anti-spyware systems are equipped with user-friendly installation procedures and menus that help the users easily implement and use them. With respect to social factors, Internet users were significantly influenced by visibility and image, but not subjective norm. The significant effect of visibility addresses Internet users tendency of exhibiting herding behavior in adopting a system. That is, when Internet users observe the adoption of antispyware systems by their friends, family, colleagues, and other referent groups, they have more intention to adopt the system. Perceiving the adoption as an opportunity to enhance their image as a technical leader is also a strong motivator of anti-spy- COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 75

5 Figure 1. Countermeasures of spyware. Legislation ment (such as large RAM, fast CPU, and a high-speed Internet connection) led to a stronger intention to adopt the system. Trialability also showed a significant effect reflecting people trying the system before adopting it. The insignificance of perceived cost suggests the price of an anti-spyware system is not an inhibitor of adoption. Finally, three out of four factors showed significant influence on actual adoption. intention, computing capacity, and trialability were significant, but perceived cost was not. Further analysis was conducted to examine whether the adoption decision is different across gender and age. With respect to gender, all the relationships between adoption factors of male users were the same as those in the original model shown in Figure 3. However, for female respondents, several interesting results were found (see Table 3). Compared to the findings of the original model, subjective norm was found to be significant, while image was not. These findings suggest that women were strongly influenced by mandatory pressure from their referents, whereas they did not highly consider enhancement of their image. In addition, moral compatibility of female adopters was found to be much stronger than for males, indicating women are more sensitive to moral values. Finally, the effect of trialability is much stronger in females than males, suggesting women are more conservative customers. That is, women prefer more hands-on experience with anti-spyware software before actual adoption. To examine the effect of age difference, the original data was divided into two groups: 30 and below and over 30. For the former, major differences from the original model come from moral compatibility and perceived cost. Contrary to the findings of the original model, perceived cost was a significant factor for the younger group while moral compatibility was not. Internet Spyware Prevention Act of 2004 SPYBLOCK Act Securely Protect Yourself Against Cyber Trespass Act s Anti-Adware s Anti-Key Logger s Anti-Trojan Horse s Self-Regulatory Program SpyNet SpywareInfo Attitude Relative Advantage Moral Compatibility Ease of Use Social Influence Subjective Norm Visibility Image Behavioral Control Computing Capacity Cost Trialability Figure 2. The antispyware system adoption model. NO SPYWARE These results indicated the younger adopters did not seriously consider moral value, but were sensitive to the price Lee of an fig anti-spyware 1. (8/05) system in their adoption decision. For the older group, subjective norm was found Intention of of to be significant explaining that the older adopters importantly consider normative beliefs from referents when adopting Lee fig the 2. system. (8/05) STRATEGIC SUGGESTIONS Based on our research findings, this study provides several strategic suggestions on how to increase the adoption of the anti-spyware systems. First, developers should design anti-spyware systems that align better with adopters usefulness and effectiveness expectations. Several reports pointed out that any single antispyware system could not successfully identify and 76 August 2005/Vol. 48, No. 8 COMMUNICATIONS OF THE ACM

6 clean all types of spyware [2]. Therefore, anti-spyware system experts recommend using multiple systems. This is not desirable since this requires the adopters to expend more effort in maintaining multiple systems, not to mention increased cost. Legislators, online users, and developers should work together to create a consensus of the maliciousness of spyware. Most Internet users believe that spyware is an obvious menace that erodes the security of the Internet. However, some users believe that spyware is beneficial in that it provides more effective and personalized customer service, as well as free stateof-the-art applications. They may not have enough knowledge to fully understand the malicious Attitude Relative Advantage Moral Compatibility Ease of Use Social Influence Subjective Norm Visibility Image Behavioral Control Computing Capacity Cost Trialability Figure 3. Research findings. aspects of spyware. Therefore, an ongoing effort to educate Internet users of the problems caused by spyware is necessary. It is also recommended that anti-spyware system developers include explanations that emphasize moral image and innovativeness of adopters in their marketing strategy. For instance, advertisements could explain how an individual s adoption of an anti-spyware system contributes to the improvement of Internet security. Ads could also emphasize that users of anti-spyware systems indicate savvy computer users and industry leaders. To increase the visibility for potential adopters, antispyware system venders should create and manage online discussion databases, anti-spyware communities, and promote the integration of recommendation-to-friends links on their Web sites. As the size of antispyware communities increases, the number of new adopters would also increase due to improved awareness. Anti-spyware developers and marketers should provide more opportunity for users to have hands-on experience with anti-spyware systems. The free versions available on the Internet only provide the most basic security functions, such as determining whether a PC is infected. Removing the spyware would require purchasing an anti-spyware system. Since reducing the perceived uncertainty of potential adopters toward anti-spyware systems is critical for adoption, offering fully functional free anti-spyware systems for a limited time period (say, a 30-day free trial) is recommended. Developers must create multiple versions of antispyware systems to cater to specific user needs, such as financial ability, operating system environments, and *** ** ** * Intention of (R 2 = 0.83) * * * * * desktop or laptop computers. Finally, Lee developers fig 3. (8/05) should tailor their marketing efforts to increase the adoption rate. For example, our findings show an effective way to reach potential women adopters is to provide more trial opportunities. In summary, spyware is the newest threat to betray the trust of Internet users, invade their privacy, and deteriorate their productivity. This problem is exacerbated by the increased number of people online and the increased time they spend online. The creators of spyware programs are also becoming more experienced and agile, which should serve to underscore the importance of promoting anti-spyware research. If we do not provide adequate defenses against spyware, we risk undermining the confidence of Internet users. An anti-spyware system must be perceived as a powerful weapon to counteract the effects of spyware. Ongoing efforts to develop improved anti-spyware systems that meet users needs and influence them to adopt a system should continue to enable building a secure Internet environment. c References 1. Ajzen, I. Attitudes, Personality, and Behavior. Open University Press, Milton- Keynes, England, Kawamoto, D. Few corporations use the anti-spyware tools; news.zdnet.com/ _ html 3. Moore, G.C. and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information s Research 2, 3 (1991), Younghwa Lee (gabelee@ku.edu) is an assistant professor in the School of Business at the University of Kansas, Lawrence, KS. Kenneth A. Kozar is associate dean and a professor of information systems in the Leeds School of Business at the University of Colorado, Boulder ACM /05/0800 $5.00 of (R 2 = 0.55) Statistically significant as *: p<0.05, **: p<0.01, ***: p<0.001 COMMUNICATIONS OF THE ACM August 2005/Vol. 48, No. 8 77

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

An empirical investigation of anti-spyware software adoption: A multitheoretical perspective

An empirical investigation of anti-spyware software adoption: A multitheoretical perspective Available online at www.sciencedirect.com Information & Management 45 (2008) 109 119 www.elsevier.com/locate/im An empirical investigation of anti-spyware software adoption: A multitheoretical perspective

More information

Author details. Accessing spyware awareness and defences amongst security administrators

Author details. Accessing spyware awareness and defences amongst security administrators ltitle: Author: Course: Accessing spyware awareness and defences amongst security administrators Mayia Koliarou MSc Network Systems Engineering (2008/09) University: School of Computing & Mathematics,

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

An Analysis on Spyware Law SB 1436 (November 2004)

An Analysis on Spyware Law SB 1436 (November 2004) EECE 412 Term Project 1 An Analysis on Spyware Law SB 1436 (November 2004) By Claudia Fong, Wallace Hung, Kartik Markandan Abstract This paper analyzes the California Senate Bill 1436 - Consumer Protection

More information

SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION

SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION Carl J. Case, St. Bonaventure University, ccase@sbu.edu ABSTRACT Spyware has been identified as one of the emerging and growing threats to organizations.

More information

Webroot Software, Inc.

Webroot Software, Inc. Webroot Software, Inc. Enterprise Spy Audit Stealth Version Webroot Software, Inc. 2560 55th Street, Boulder, CO 80301 Toll Free: 800.870.8102 Telephone: 303.442.3813 Facsimile: 303.442.3846 www.webroot.com

More information

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011. NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important

More information

Spyware Study. Prof. Robila CMPT 495. Computer and Data Security. Group: Francis Rivera Douglas Schemly Igor Yussim. Due:

Spyware Study. Prof. Robila CMPT 495. Computer and Data Security. Group: Francis Rivera Douglas Schemly Igor Yussim. Due: Spyware Study Prof. Robila CMPT 495 Computer and Data Security Group: Francis Rivera Douglas Schemly Igor Yussim Due: December 12, 2005 Table of Contents Topic Page Spyware and the History of 3 Spyware

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Kim Duffy Internet Security Systems Agenda What are the trends? Why should I be concerned? How does Spyware

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

How To Understand What A Virus Is And How To Protect Yourself From A Virus

How To Understand What A Virus Is And How To Protect Yourself From A Virus Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

THE GENERATION GAP IN COMPUTER SECURITY:

THE GENERATION GAP IN COMPUTER SECURITY: Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever.

More information

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Koji Muto Institute of Systems & Information Technologies/KYUSHU 2 nd Laboratory Contents Introduction P2P file-sharing

More information

Current Developments in Adware and Spyware. Eric Goldman Marquette University Law School Eric.goldman@marquette.edu http://eric_goldman.tripod.

Current Developments in Adware and Spyware. Eric Goldman Marquette University Law School Eric.goldman@marquette.edu http://eric_goldman.tripod. Current Developments in Adware and Spyware Eric Goldman Marquette University Law School Eric.goldman@marquette.edu http://eric_goldman.tripod.com Last updated August 5, 2004 Definitions Spyware/adware

More information

Introduction to Free Computer Tools

Introduction to Free Computer Tools Introduction to Free Computer Tools About me Serge Aubin Technology Advisor / OLS-N Programmer / DBA - 9yrs Web design / Web applications Intranet/Extranet Today s session Terminology Anti-Spyware software

More information

Understanding Internet Security. What you need to protect yourself online.

Understanding Internet Security. What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Table of Contents SECTION ONE Internet Security: What

More information

Spyware: What Influences College Students to Use Anti-Spyware Tools?

Spyware: What Influences College Students to Use Anti-Spyware Tools? Spyware: What Influences College Students to Use Anti-Spyware Tools? Michael R. Ward wardmr@appstate.edu D. Scott Hunsinger hunsingerds@appstate.edu Department of Computer Information Systems Appalachian

More information

Laplink PCdefense Reviewer s Guide

Laplink PCdefense Reviewer s Guide Laplink PCdefense Reviewer s Guide TM Reviewer s Guide TM Letter from the CEO Overview Target Markets Features, System Requirements, Pricing & Availability Competitive Advantages Comparison Chart Glossary

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

How to Deal with Spyware A CyberAngels Quick Tutorial

How to Deal with Spyware A CyberAngels Quick Tutorial How to Deal with Spyware A CyberAngels Quick Tutorial Adapted from the US Computer Emergency Readiness Team Spyware and Adware After completing this tutorial, you will be able to: Identify the main risks

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Module 5: Analytical Writing

Module 5: Analytical Writing Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey

More information

Spyware and Adware What s in Your Computer?

Spyware and Adware What s in Your Computer? Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your

More information

Understanding Spyware

Understanding Spyware APECTEL WG Meeting 2005 Seoul, Korea Understanding Spyware GOH Seow Hiong Director, Software Policy (Asia) Business Software Alliance September 2005 1 Outline About BSA The Cyber Landscape of Today What

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Protecting Organizations from Spyware

Protecting Organizations from Spyware A Websense White Paper Protecting Organizations from Spyware Abstract: Once considered only an annoyance, spyware has evolved from a nuisance to a malicious threat. Preventing spyware from infiltrating

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

What is Spyware? Daniel Jonasson danjo620@student.liu.se. Johan Sigholm johsi264@student.liu.se. Abstract. 2 Theory.

What is Spyware? Daniel Jonasson danjo620@student.liu.se. Johan Sigholm johsi264@student.liu.se. Abstract. 2 Theory. What is Spyware? Daniel Jonasson danjo620@student.liu.se Johan Sigholm johsi264@student.liu.se Abstract During the last few years the term spyware has become increasingly spread. The definition, though,

More information

Running head: SPY? WHERE?: UNDERSTANDING SPYWARE

Running head: SPY? WHERE?: UNDERSTANDING SPYWARE Spy? Where?: Understanding Spyware 1 Running head: SPY? WHERE?: UNDERSTANDING SPYWARE Spy? Where?: Understanding Spyware Benny C. Rayner East Carolina University Spy? Where?: Understanding Spyware 2 Abstract

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Chapter 10. Privacy and Security. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 10. Privacy and Security. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Page 282 Discuss the privacy issues related to the presence

More information

Bookmarks for Desktop Self-Defense

Bookmarks for Desktop Self-Defense Basic Security Tips Bookmarks for Desktop Self-Defense Get Safe Online http://www.getsafeonline.org/ Get Safe Online will help you protect yourself against Internet threats. The site is sponsored by government

More information

NewNet 66 Network Security

NewNet 66 Network Security NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Symptoms of a Data Breach in Your Business

Symptoms of a Data Breach in Your Business Cyber Security: What you need to know to protect your business February 2014 Presented by: Jon Zayicek Vice President Sera-Brynn Topics: The landscape is changing What are the threats? How to protect your

More information

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy Computing Guide THE LIBRARY www.salford.ac.uk/library How to set up McAfee virus scanning software and become computer virus savvy A virus infection of your workstation can seriously disrupt your learning,

More information

Outpost For Home Users

Outpost For Home Users Outpost For Home Users. Scope of This Document In this white paper we analyze potential risks and threats to home computers, as well as discuss some solutions for these computers secure. Scope of This

More information

Survey of Spyware Tools and Counter Measures

Survey of Spyware Tools and Counter Measures Survey of Spyware Tools and Counter Measures Dr. Robert W. Baldwin Plus Five Consulting, Inc. Kevin W. Kingdon Intellitrove, Inc. Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

5 Simple Ways To Avoid Getting An Avalanche of Spam

5 Simple Ways To Avoid Getting An Avalanche of Spam Customer Education Series 5 Simple Ways To Avoid Getting An Avalanche of Spam A Business Owners Guide To Eliminating The 10-15 Most Unproductive Minutes Of Each Employee s Day 5 Easy Ways to Avoid Getting

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+ ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail

More information

Spyware: Causes, Effects and Prevention

Spyware: Causes, Effects and Prevention Spyware: Causes, Effects and Prevention Two-thirds of Internet technology professionals believe spyware will be the top threat to network security this year, according to a January 2005 poll by WatchGuard

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Andree E. Widjaja Jengchung Victor Chen

Andree E. Widjaja Jengchung Victor Chen Andree E. Widjaja Jengchung Victor Chen Institute of International Management National Cheng Kung University, Tainan, Taiwan Andree/Victor 1 Agenda Introduction Cloud Computing Information Security and

More information

Intel vpro and Information Security. Itai Yarom Senior Technical Lead LAN Access Division Intel Israel

Intel vpro and Information Security. Itai Yarom Senior Technical Lead LAN Access Division Intel Israel Intel vpro and Information Security Itai Yarom Senior Technical Lead LAN Access Division Intel Israel The Power of Two: It s all about You The Intel brand delivers a promise to you and your customers,

More information

Securing small business. Firewalls Anti-virus Anti-spyware

Securing small business. Firewalls Anti-virus Anti-spyware Securing small business Firewalls Anti-virus Anti-spyware Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence

More information

How Much Does Spyware Cost Your Business?

How Much Does Spyware Cost Your Business? The Cost of Spyware to your Business We know why writers of Spyware do so; for the money. Hackers, once satisfied with villainy as their reward wrote viruses, which brought them no financial gain. Now,

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

HIPAA Training Part III. Health Insurance Portability and Accountability Act

HIPAA Training Part III. Health Insurance Portability and Accountability Act HIPAA Training Part III Health Insurance Portability and Accountability Act POLICIES & PROCEDURES Goals Learn simple ways to protect information. Learn how to continually give training. Learn how to continually

More information

One of the most challenging problems. A Framework for Spyware Assessment

One of the most challenging problems. A Framework for Spyware Assessment By Merrill Warkentin, Xin Luo, and Gary F. Templeton A Framework for Spyware Assessment The formulation of spyware policy must be a global effort and should reflect an understanding that not all spyware

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

Spyware. How to avoid hidden software on your computer

Spyware. How to avoid hidden software on your computer Spyware How to avoid hidden software on your computer Has your computer been functioning abnormally? Do you have random internet pages or pop-ups appear out of nowhere? Has your computer dramatically slowed

More information

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY Hector J. Garcia, Jr., Texas A&M University-Kingsville Dr. Ralph Reilly, University of Hartford Dr. Jack D. Shorter, Texas A&M University-Kingsville,

More information

The answers vary widely, but there are five components to every spyware definition:

The answers vary widely, but there are five components to every spyware definition: What's spyware? The answers vary widely, but there are five components to every spyware definition: Users don't knowingly request spyware. Spyware applications operate on the user's computer and have not

More information

Putting Web Threat Protection and Content Filtering in the Cloud

Putting Web Threat Protection and Content Filtering in the Cloud Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

Additional details >>> HERE <<<

Additional details >>> HERE <<< Additional details >>> HERE http://dbvir.com/noadware/pdx/chsd32085/

More information

DataSheet Outpost Firewall Pro 2009 Your Essential Defense against Internet Threats

DataSheet Outpost Firewall Pro 2009 Your Essential Defense against Internet Threats Outpost Firewall Pro 2009 Data Sheet Page 1 [EN] DataSheet Outpost Firewall Pro 2009 Your Essential Defense against Internet Threats What Makes an Essential Defense? New types of threats require new types

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

case study Webroot Software Spy Sweeper Enterprise Summary Introductory Overview ORGANIZATION: PROJECT NAME:

case study Webroot Software Spy Sweeper Enterprise Summary Introductory Overview ORGANIZATION: PROJECT NAME: The Computerworld Honors Program Summary, Inc. is the creator and publisher of the award-winning Spy Sweeper line of anti-spyware products for consumers, small businesses and enterprises worldwide. Based

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive. Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least

More information

Scui.Int.(Lahore),26(5),2071-2076,2014 ISSN 1013-5316; CODEN: SINTE 8 2071

Scui.Int.(Lahore),26(5),2071-2076,2014 ISSN 1013-5316; CODEN: SINTE 8 2071 Scui.Int.(Lahore),26(5),2071-2076,2014 ISSN 1013-5316; CODEN: SINTE 8 2071 ASSESSMENT OF ANTI SPYWARE TOOLS FOR SIGNATURE AND BEHAVIOR BASE TECHNIQUES Nabeel Alam Khattak 1, Dave Chadwick 2, Riaz Ahmed

More information

How To Protect Your Small And Medium Sized Business From Security Threats On The Internet

How To Protect Your Small And Medium Sized Business From Security Threats On The Internet WEBROOT SOFTWARE A GUIDE TO SECURITY FOR SMALL & MEDIUM BUSINESS Companion Guide to State of Internet Security: Protecting the SMB Full report available at www.webroot.com Table of Contents Are You an

More information

FEDERAL TRADE COMMISSION (FTC) Public Workshop Questions: Monitoring Software on Your PC: Spyware, Adware, and Other Software

FEDERAL TRADE COMMISSION (FTC) Public Workshop Questions: Monitoring Software on Your PC: Spyware, Adware, and Other Software FEDERAL TRADE COMMISSION (FTC) Public Workshop Questions: Monitoring Software on Your PC: Spyware, Adware, and Other Software DISTRIBUTING COMPUTING INDUSTRY ASSOCIATION (DCIA) Response to FTC Questions

More information

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy What is spyware? Broad class of malicious and unwanted software Steal control of a PC for the benefit of

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Introduction (Contd )

Introduction (Contd ) Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

thriller INTERNET SECURITY

thriller INTERNET SECURITY + thriller INTERNET SECURITY Saturday, October 31, 2009 1:30 PM 3:00 PM Matthew 28:18-20 Website Ministry + Agenda 2 Scripture (Col 3:12-15) Prayer Internet Security Security Threats Security Protection

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster.

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster. How to Use Anti-Spyware Tools Spyware are programs that get installed on your computer without your permission. Some spyware is relatively harmless, and some spyware can destroy your computer. Most anti-virus

More information

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits. SecureIT Plus PC Security To learn more about Security Coverage s suite of security features, select from the Quick Links that follow. This document can also be printed, or saved to your desktop and used

More information

PC & Internet Security

PC & Internet Security PC & Internet Security Hello, my name is Charles Prince and I am a spokesperson for Avast Software whose home office is in Prague, the Czech Republic. I am not a salesman and I am not here to try to sell

More information

BEST PROTECTION FOR DESKTOPS AND LAPTOPS. Client Security

BEST PROTECTION FOR DESKTOPS AND LAPTOPS. Client Security BEST PROTECTION FOR DESKTOPS AND LAPTOPS Client Security UP-TO-DATE SOFTWARE IS THE KEY TO SECURITY 83%[1] of top ten malware could have been avoided by using up to date software. Criminals ruthlessly

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

How not to lose your computer or your research. M.R. Muralidharan SERC IISc

How not to lose your computer or your research. M.R. Muralidharan SERC IISc How not to lose your computer or your research M.R. Muralidharan SERC IISc The Battle has changed 08 Threat Landscape Shift 2004 Landscape Virus Threats are noisy & visible to everyone Threats are indiscriminate,

More information

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business By Masashi SUGIURA* This paper is intended to summarize the security solutions of NEC together with the present

More information