Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[October 17, 2024, 05:05:06 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses
 Next generation spyware
Pages: [1]   Go Down
  Print  
Author Topic: Next generation spyware  (Read 1296 times)
Taruna
Elite Member
*****



Karma: 13
Offline Offline

Posts: 845

Hi ALL


View Profile
Next generation spyware
« Posted: January 03, 2007, 11:51:32 PM »


Once upon a time, spyware was a fairly benign nuisance. The original point of spyware was to allow vendors to monitor the user's computer activity and Internet usage so that they could gather marketing data they could use to target ads more likely to attract the user's attention.
The distinction between adware and spyware was primarily a difference between whether the vendor was up front with disclosing their monitoring activity, or if the vendor secretly 'spied' on the user without any notification or authorization. The worst affect of such spyware was typically unwanted pop-up advertising based on the monitoring that the spyware had done.

Over time though, spyware has taken on a much larger role in the malware world and has matured into a method of propagation that can be used to deliver a variety of malware types and malicious software. While there are still unique attributes that technically separate spyware from a Trojan, virus or other forms of malware, many recent and current threats blur the line and converge the various types of malware together.

Webroot Software, makers of the antispyware product SpySweeper, classify three different types of software under the umbrella heading of 'spyware threats'. There is the traditional adware, which still primarily just spy and gather data in a semi-benign fashion, but they also consider Trojans and System Monitors as types of spyware.

Trojans, at least those considered under the heading of spyware, tend to be either backdoors or downloaders. A backdoor is a Trojan that opens a port or provides some other covert means for an attacker to gain access to an infected system and execute malicious programs of their choosing. A downloader is a Trojan that initiates a connection with some external server to download and install other malicious programs which could include Bots or backdoor software.

System monitors are programs such as keystroke loggers that capture and record every keystroke typed on the computer. Many system monitor programs, such as SpyBuddy, go even farther, logging the programs that are used, Web sites that are visited, instant messaging chat sessions and more. The captured data is either automatically sent to an external server or email address, or there is some type of backdoor that allows the attacker to access the infected computer to retrieve the data.

The originators of the spyware concept may not have set out with such malicious intent. Their goal was strictly to maximize ad sales revenue by ensuring that the ads users see are for products and services that interest them. But, it didn't take very long for malicious developers to figure out that if you can secretly install software on a user's computer to monitor their computer activity, you can also use that software to capture personal information such as passwords and bank account numbers, or that you can use the same attack vector to install other types of malicious software. As it stands now, spyware ranks as one of the prime distribution methods for malware and is a threat that network and security administrators need to aggressively defend against.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.146 seconds with 23 queries.