Software Information |
|
Most Dangerous Types of Spyware are on the Rise: How to Choose the Weapon
Bad News - the Threat is Bigger than it Seemed How recently it was ? when even many journalists thought that spyware gathers mostly information to be used for targeted advertising. Definitions like "spyware, a.k.a. adware, is?" were pretty common in articles. Keyloggers and system monitors were mentioned as dangerous, but relatively rare. Until the Spy Audit survey made by ISP Earthlink and Webroot Software clearly showed - they are not rare at all. The results of the survey are here: http://www.earthlink.net/spyaudit/press/ and http://www.earthlink.net/about/press/pr_spyauditsurvey/ Reading them will be time well-spent for everybody who uses Internet and at least sometimes deals with information valuable enough to be stolen; in fact, it means just everybody. "Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" ? that's the exact quote. Considering the number of computers scanned during this survey (which lasted for a whole year 2004), there is nothing left but to come to the conclusion ? it must be true to fact. Despite the fact that one of the Spy Audit authors is an anti-spyware vendor, there is no doubt that the results are trustworthy ? there has been more than 4.6 million system scans made in 2004. It seems that the results of the survey might be like the bolt from the blue even for the specialists, not to mention general public. 16.48% of all scanned consumer PCs in 2004 had a system monitor installed. It means that 16.48% of these users were definitely under monitoring (who monitors them ? that's another question). 16.69% had a Trojan horse program, and this is a troubling sign, too ? it is a keylogging module that Trojans often have inside. "Information-stealing Trojan" in descriptions most often means "keylogger-containing Trojan". Both figures give us an overwhelming 33.17% PCs contaminated with some program with information stealing capability. Even if not all these Trojans were information-stealing ones, the situation is distressing anyway. Schools of Phish and Herds of Trojan Horses "Traditional" phishing and spoofing (sending emails linked to a bogus bank Web site and waiting for unwitting customers) are, unfortunately, not new phenomena. It is a modernized two-stage scam which includes contaminating the victim's machine with a keylogger-containing Trojan horse program that is spreading like a wildfire now. This scheme is without doubt much more dangerous; in this case the victim needn't follow the link in the email. Trojan horse lurks in the background until the victim types particular titles or URLs into his browser. Once the user visits one of a number of banking Web sites the malicious code is triggered into action, capturing passwords and taking screenshots. Then the information is sent to remote hackers who can use it to break into the bank account and steal money. There were several outbreaks in activity of such information-stealing Trojans which targeted bank customers in 2004. Actually, such a scam was first used in Brazil ? when the notorious Trojan named Troj/Banker-AJ appeared, experts recalled that the security firm Sophos had warned earlier in 2004 about criminals who used similar techniques to break into Brazilian online bank accounts. Crooks may use pretty ingenious and "efficient"(if such a word could be appropriate for this activity) techniques to place the Trojan into users' PCs ? letters can be mimicking CNN news alerts, or offering to reserve the very latest book about Harry Potter in the series before it is published in July. Who knows what will they invent next? Looking for Solutions to the Problem In 2004 it become as clear as day to anyone - from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security. Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing valuable information (like passwords, SSNs), certainly facilitate these crimes. Software vendors by all means are responding to the threat to meet the enormous demand for anti-spyware protection. Several big anti-virus vendors, such as Norton and McAfee, have already begun providing anti-spyware protection as well. Microsoft also joined the anti-spyware market this year (and has already become a target for the malicious Trojan called Bankash-A; fortunately, no serious damages reported so far). Symantec plans to announce new features to fight spyware in some of its enterprise antivirus and intrusion prevention products. Besides, there also are ? literally - hundreds of stand-alone anti-spyware developers and vendors. The number of anti-spyware software they all develop, promote and sell is constantly growing - and will grow in future. So will the profits. According to predictions from the market advisory firm IDC, the market for anti-spyware solutions is expected to boom in the next few years. Anti-spyware software revenues will soar from US$12 million in 2003 to $305 million in 2008. But what about end users ? are they going to benefit from such a variety of anti-spyware solutions available at the market? Or will they just feel bewildered and lost in all this mass of ads offering instant relief from nasty and dangerous spyware? It looks like most people are already confused because advertising is pretty much alike ? how to distinguish a high-quality product from some hit-or-miss software developers fabricated in haste just to get quick profit? What a user can (actually must) do is to know what exactly he or she is buying or installing for free. Here are several simple common-sense tips: The first step is to visit the site of the company that produces this product. Look it through. Read "about us" section. How long does this company exist? Ignore "testimonials" ? there is no guarantee that it wasn't the company's PR manager who wrote them. It would be better to search, say, Google groups for opinions. A good old background check will also do a lot of good. It takes some time, though ? but peace of mind later is worth half an hour's browsing the Web now. The simplest way is to search for the product's name along with such words like "installs", "spyware", "adware", "popups", etc. There are even lists of suspicious, low-performing, or adware-installing products. See, for example, http://www.spywarewarrior.com/rogue_anti-spyware.htm - an ample list of anti-spyware you'd better not buy. By the way, the whole this site is worth studying thoroughly. The fact that you are not a tech person doesn't mean you can afford not knowing the basic principles these products are based on. What a user can expect from an anti-spy product and what is simply impossible? Most anti-spyware products apply signature databases, i.e. rely on simple pattern-matching technique. Detecting spy software is the crucial step of the whole process ? all the protection depends on whether the anti-spy software is able to detect as many malicious programs as possible. The bigger the database is and the more often it is updated, the more reliable protection the product will provide. Signature base, which most anti-spy products depend on, is actually the "list" of signatures ? small pieces of spy programs' codes. Anti-virus or anti-spy program actually scans the system and compares its codes with those in signature bases. So, in this case only the spies whose signatures already are in the base will be detected and eventually "caught". As long as anti-spy software is regularly updated and the system doesn't come across some unknown spy product, everything is all right. The problem is that there is good deal of people capable of creating something brand-new, unknown to anti-spyware developers. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when cybercriminals make their biggest profits. The advantage of signature base analysis is that programs based on this method of detection can be of wider range ? it is possible to include signatures from different types of spyware and adware into a single database. However, regular release of updates for these bases becomes crucial. If the developer fails to do it properly and on time, there is a considerable risk for such a program to become "Jack of all trades and a master of none." The conclusion is simple ? if a product applies signature database, it's better to choose anti-spyware with the biggest and most frequently updated base. Don't expect absolute protection ? with this technique it is simply unattainable. But in case of information-stealing programs, like keyloggers or keylogging-containing Trojans, a single "overlooked" program may mean lost valuable data. Since signature analysis can't ensure protection against constantly appearing brand-new keyloggers, blocking the very process of keylogging would be better. Such a technology already exists, and it may be the next step towards more reliable protection against the most malicious types of spy programs. Alexandra Gamanenko currently works at Raytown Corporation, LLC - the independent software developing company, which created the technology capable of blocking the very process of keylogging. Visit its website: http://www.anti-keyloggers.com
|
RELATED ARTICLES
Databases ? How We Love to Hate Them! You've finally created databases that you can actually use to store and manipulate all your critical data. That's great news and quite an accomplishment. But in your rush to get your employees to start entering information into these databases, you skipped the training process and let them go at it alone. Microsoft Great Plains Data Conversion ? Overview For Developer Looks like Microsoft Great Plains becomes more and more popular, partly because of Microsoft muscles behind it. Now it is targeted to the whole spectrum of horizontal and vertical market clientele. Small companies use Small Business Manager (which is based on the same technology ? Great Plains Dexterity dictionary and runtime), Great Plains Standard on MSDE is for small to midsize clients, and then Great Plains serves the rest of the market up to big corporations. Do You Want Your Own Fully Programmable ERP? - Part 1 We are in a transition phase in the Managerial Administration models of any company or Government, because three factors are summing for that: Call Alert Notifications - Free Answering Machine Software for PCs If you're online using a dialup Internet connection, you'll probably want to download one of the free call alert software applications like Callwave or AOL Call Alert that can answer, record, and forward incoming calls to your home, office or cell phone. In fact, if you run a small business, Call Wave also offers a dedicated business fax service too. These software offerings are fully reviewed online at http://www.callalertreviews.com. Microsoft CRM Data Import FAQ Microsoft CRM has built-in conversion tool, however you should probably first try third party conversion tool, such as Scribe. It is relatively expensive and has bunch of importing capabilities, that you might never use and need. Scribe allows you to map objects in source and target, when source is ACT! for example. If you are just realized the need to load data into CRM ? please research Microsoft CRM import tool and Scribe. Here we will describe other option and possibilities Making The Decision To Automate Your Software Testing Not every software testing project can or should be automated. Before your department accepts a new test automation project, you should establish a process by which projects are reviewed and either accepted or rejected. This can be done with a simple Test Automation Acceptance Checklist. Algebra Help Software Need help making sense of algebra? Have algebra lectures in your classroom left you scratching your head and wondering: "How on earth did they get that answer"? Do not despair, because help is at hand. AlgebraSolver from Softmath can make all the pieces of the algebra puzzle fall into place, improving your grasp of the subject with step-by-step problem solving that demonstrates exactly how a solution has been reached. Quick Summary of Basic and Common Linux Commands There are many commands that are used in linux on a daily basis, ones that everyone should know just to get by. Like back in the days of DOS, you had to know how to work with the command line and how to navigate around. Learning new commands is always hard, especially when there are so many new ones that don't always seem to make sense in their names. Microsoft Great Plains Jewelry ? Implementation & Customization Overview Each Industry and market niche has business specific and unique requirements to ERP/Accounting System. Microsoft Business Solutions Great Plains is ERP platform, ready for third party modules additions and customizations, plus being SQL Server-based system it opens you wide spectrum of integration options and tools. In this small article we'll give you Microsoft Great Plains implementation and setup highlights, typical for Jewelry retail network. Reporting Tools for Microsoft Great Plains ? Overview For Developers Looks like Microsoft Great Plains becomes more and more popular, partly because of Microsoft muscles behind it. Now it is targeted to the whole spectrum of horizontal and vertical market clientele. Small companies use Small Business Manager (which is based on the same technology ? Great Plains Dexterity dictionary and runtime), Great Plains Standard on MSDE is for small to midsize clients, and then Great Plains serves the rest of the market up to big corporations. There are several reporting tools available and you definitely need to know which one to use for different types of reports. How To Avoid Getting Hooked By Pfishing "Pfishing", sometimes spelled "Phishing", is a word that's used to describe a method of identity theft where con men use fake e-mail that looks like it comes from legitimate sources. This e-mail is designed to hoodwink you into giving out personal and financial information. Once the scammers receive your information they use it to either clone your identity or to empty out your bank accounts and run up your charge cards. Here are some tips on how to avoid becoming the next victim. Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice In the new era of internet marketing the problem of severe competition comes into the first position. If you look back into 1990-th you will find high tech companies using traditional sales techniques: purchasing local and regional businesses contact lists, making cold calls and then trying hard sales closing techniques, such as "selling to the top" ? IBM style, selling to VITO (very important top officer), etc. It did work those old days. We would dare to announce that these days are gone and these techniques are now obsolete. A Case Study on Selecting Contract Management Software Professional services firm cuts costs and improves productivity with integrated software system. Microsoft Great Plains e-Commerce ? additional considerations for programmer Microsoft Great Plains, designed back in 1990th as database transferable and graphical platform independent ERP application ? Great Plains Dynamics/Dynamics C/S+/eEnterprise. For eCommerce developer the most important is to understand Great Plains tables structure and business processes in Sales Order Processing, Accounts Receivables, Inventory Control (inventory items allocation, backordering, etc), posting to Bank Reconciliation and General Ledger. And this is where Great Plains structure seems to be not transparent. Let's give you highlights: ERP Implementation: Success Factors As seeing large number of implementations ? in our case these are Microsoft Business Solutions Products: Great Plains, MS CRM, Navision ? we would like to give you our opinion on what should you consider to do to secure implementation success. These principles should work as for large corporation as well as for midsize and even small business. We will not be talking about old-wisdom, which you know from the college classes or business school about management and staff involvement into the decision making, brainstorming, etc. ? we'll be ERP specific Microsoft CRM Customization Secrets ? Second Edition This article is for advanced Microsoft CRM SDK C# developers. It describes the technique of direct SQL programming, when SDK doesn't have the functionality to do the job. Microsoft Great Plains Implementation in Russia ? Overview for Consultant Microsoft Business Solutions Great Plains is very popular ERP platform in the USA, Canada (including French speaking Quebec/Montreal), U.K., Australia, New Zealand, South Africa, Middle East: OAE, Egypt, Arabia, Latin America. Former versions ? Great Plains Dynamics/eEnterprise was also popular in Europe: France, Poland, Russia. When Microsoft acquired Navision Software ? and handed it out to its subdivision: Microsoft Business Solutions ? we saw some geo-strategy changes. Navision, the leader on the European mid-market and successfully overcoming such localization barriers as language translation, adaptation to country-specific taxes and payroll taxes ? was chosen as preferred or the only recommended solution for emerging markets. In Russia we saw dramatic situation, when multiple Great Plains Dynamics/eEnterprise resellers went out of business. At the same time, Russia is huge and lucrative market for ERP/MRP applications and we envision large number of multi-national companies, having GP as their Headquarters chosen solution and who needs Great Plains to be implemented for Russian subsidiary. Here are the implementation highlights for you: Five Tips For A Great Software Demo Whether you need to close a sale, gather end-user feedback, show progress to your customer, or simply explain how your product works, sooner or later, you will need to demo your software product. Microsoft Great Plains Chemicals & Paint Industry Implementation & Customization Notes Microsoft Great Plains fits to majority of industries, in the case of Chemicals & Paint you should consider implementation with balanced approach of utilizing existing Great Plains standard module and light customization and reporting with Great Plains Dexterity, MS SQL Server stored procedures, Modifier/VBA and direct .Net publishing from Great Plains Company database. Let's consider industry requirements and their implementation in Microsoft Great Plains: Groupware: What Works the Way Businesses Do? Groupware |
home | site map |
© 2005 |