Spring Cleaning Your Office? Know What to Do with E-Waste
Keep Your Identity Safe When Filing Taxes This Year
Why use Penn+Box when Storing Data in the Cloud
Mobile Device Security - 3 Recommendations for Cloud Users (Hint: That's You!)
Be Aware of QR Code Risks
It’s Data Privacy Month: Update Your Facebook Privacy Settings and More
How Are You Celebrating Data Privacy Month?
Stay Secure while Working on Public Wi-Fi Networks
Protecting Your Finances During This Year's Holiday Shopping Season
Cloud and You
Security and Privacy Online Training & Tools
October: Free Secure Disposal of Paper and Electronics at Employee Resource Fair; NCSAM
Student Privacy - What Do I Need To Know? A FERPA Reminder
Top 10 Tips for Securing Your Smartphone or Tablet
Working Off Campus? Some Tips to Consider
Tagged with virus , spyware
Tuesday, February 9, 2010 - Almanac Vol. 56, No. 21
Spyware: Who's "watching" you - and why?
It's no longer news that all sorts of hardware and, especially, software exist for the specific purpose of surreptitiously tracking what people do with their personal computers, which websites they visit (and purchase from), whom they communicate with, and what sensitive data reside on their systems. Known generically for years as "spyware" and "adware", these programs have now been lumped by some experts into the classification of "privacy-invasive software" along with other varieties like "stealware" and "scareware".
Whatever the motivation of the people who write and spread these programs (and there are literally hundreds of reasons), the ongoing danger is that computer users still tend to collect multiple infections because, like bacteria, spyware/adware tend to "colonize" a host
computer, and the users are rarely aware that the software is there. And of course, that's the point – the creators don't want you to know it's there. In many cases, spyware/adware is "piggybacked" onto "free" software that's often described as Internet "optimizers" or "accelerators", and is often part of the installation of popular peer-to-peer filesharing software
such as eDonkey and KaZaa (yet another reason to avoid those programs). And, the term "drive-by download" has been coined to describe intrusive software downloaded and installed from questionable websites without the visitor's knowledge.
In addition to the dangers of your activities and information falling into the hands of others, once the level of infection reaches "critical mass," your computer will simply slow to a crawl as it tries to run all the "parasite" processes that produce, among other things, endless "pop-up" ads.
The first step in combatting spyware/adware is to acquire and use anti-spyware software. For Windows users, the University has a site license for Symantec Endpoint Protection 11.0.5, which will help to protect your system. It can be downloaded from www.upenn.edu/computing/product. The newest version of Mac OS has some spyware protection built in. Avoid "optimizers", "accelerators" and "cool toolbars" - they tend to be
"carriers" and besides, they generally don't work anyway.
Wikipedia has an excellent, and more detailed discussion at en.wikipedia.org/wiki/Spyware