Photos: How does spyware get on your PC?

Photos: How does spyware get on your PC?

Summary: And what can it do?

TOPICS: Security

 |  Image 3 of 3

  • Thumbnail 1
  • Thumbnail 2
  • Thumbnail 3
  • Some methods of installing spyware on a PC are obvious to the more tech-savvy user. A pop-up which openly asks a user if they want to install an application may seem crude but if it tells a user they need this tool to access a website they may be inclined to click.

    The use of an install window that users will have seen when installing applications they do want may also create an impression of legitimacy.

    Often such windows will be persistent, said Chien, popping up repeatedly and preventing the user from navigating away. They will keep popping up until the user caves in or shuts down their browser via their task bar (ctrl + alt + del).

    Media downloads can also be a source of spyware. Chien said he illegally downloaded episodes of Family Guy over BitTorrent "purely for research purposes" and found the files he received contained spyware application 180 Search Assistant, now called Zango.

  • The end user licensing agreement (Eula) can also be a giveaway and Chien warned that users should never take it for granted that there aren't nasty surprises lurking a long way down the terms and conditions.

    GAIN features heavily in many tales of spyware woe, due to its association with the widely used Kazaa application.

    Despite claiming it is an entirely legitimate organisation, GAIN and the associated Gator name are familiar thorns in the side of many anti-spyware advocates.

    Chien said not only does the GAIN Eula state it will relay information back from the user's PC, it also states - in hope perhaps more than expectation - that users cannot remove the spyware from their PC or even encourage others to do. Other Eula's Chien has seen even include references to the fact the application may access and exploit user data held in Outlook address books and other critical applications.

    Many spyware applications are programmed so as to be close to impossible to remove once installed, warned Chien.

Topic: Security

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories


Log in or register to start the discussion