Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box
Security Starts With You
New Regulatory Changes: Do They Apply to Your Area?
Protecting Yourself from Rogue AntiVirus Warning Scams
Security and Privacy Tips for World Travelers
Handling Documents and Data of Faculty and Staff Who Have Left Penn
Spring Cleaning Your Office? Know What to Do with E-Waste
Keep Your Identity Safe When Filing Taxes This Year
Why use Penn+Box when Storing Data in the Cloud
Mobile Device Security - 3 Recommendations for Cloud Users (Hint: That's You!)
Tagged with virus , spyware
Tuesday, February 9, 2010 - Almanac Vol. 56, No. 21
Spyware: Who's "watching" you - and why?
It's no longer news that all sorts of hardware and, especially, software exist for the specific purpose of surreptitiously tracking what people do with their personal computers, which websites they visit (and purchase from), whom they communicate with, and what sensitive data reside on their systems. Known generically for years as "spyware" and "adware", these programs have now been lumped by some experts into the classification of "privacy-invasive software" along with other varieties like "stealware" and "scareware".
Whatever the motivation of the people who write and spread these programs (and there are literally hundreds of reasons), the ongoing danger is that computer users still tend to collect multiple infections because, like bacteria, spyware/adware tend to "colonize" a host
computer, and the users are rarely aware that the software is there. And of course, that's the point – the creators don't want you to know it's there. In many cases, spyware/adware is "piggybacked" onto "free" software that's often described as Internet "optimizers" or "accelerators", and is often part of the installation of popular peer-to-peer filesharing software
such as eDonkey and KaZaa (yet another reason to avoid those programs). And, the term "drive-by download" has been coined to describe intrusive software downloaded and installed from questionable websites without the visitor's knowledge.
In addition to the dangers of your activities and information falling into the hands of others, once the level of infection reaches "critical mass," your computer will simply slow to a crawl as it tries to run all the "parasite" processes that produce, among other things, endless "pop-up" ads.
The first step in combatting spyware/adware is to acquire and use anti-spyware software. For Windows users, the University has a site license for Symantec Endpoint Protection 11.0.5, which will help to protect your system. It can be downloaded from www.upenn.edu/computing/product. The newest version of Mac OS has some spyware protection built in. Avoid "optimizers", "accelerators" and "cool toolbars" - they tend to be
"carriers" and besides, they generally don't work anyway.
Wikipedia has an excellent, and more detailed discussion at en.wikipedia.org/wiki/Spyware