Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Photos: How does spyware get on your PC?

1 of 3 NEXT PREV
  • 40147744-1-chien3.jpg

    And what can it do?

    Speaking at the Virus Bulletin 2005 conference in Dublin, Eric Chien, senior antivirus researcher at Symantec, outlines the common ways users are picking up spyware. Pop-up windows which suggest security updates and clock settings are available, or new messages are unread, often tempt less security-minded users to click.

    "We've actually seen people create a full screen pop-up of a fake 'blue screen'," said Chien. Users are forced to act out of the belief their machine has crashed.

    Chien said there are currently around 11,000 families of spyware applications and those intent on getting the malicious software onto users' machines are coming up with almost as many ways of doing so.

    All photos: Will Sturgeon

    Published: October 11, 2005 -- 14:30 GMT (07:30 PDT)

    Caption by: Will Sturgeon

  • 40147744-2-chien1.jpg

    Some methods of installing spyware on a PC are obvious to the more tech-savvy user. A pop-up which openly asks a user if they want to install an application may seem crude but if it tells a user they need this tool to access a website they may be inclined to click.

    The use of an install window that users will have seen when installing applications they do want may also create an impression of legitimacy.

    Often such windows will be persistent, said Chien, popping up repeatedly and preventing the user from navigating away. They will keep popping up until the user caves in or shuts down their browser via their task bar (ctrl + alt + del).

    Media downloads can also be a source of spyware. Chien said he illegally downloaded episodes of Family Guy over BitTorrent "purely for research purposes" and found the files he received contained spyware application 180 Search Assistant, now called Zango.

    Published: October 11, 2005 -- 14:30 GMT (07:30 PDT)

    Caption by: Will Sturgeon

  • 40147744-3-chien2.jpg

    The end user licensing agreement (Eula) can also be a giveaway and Chien warned that users should never take it for granted that there aren't nasty surprises lurking a long way down the terms and conditions.

    GAIN features heavily in many tales of spyware woe, due to its association with the widely used Kazaa application.

    Despite claiming it is an entirely legitimate organisation, GAIN and the associated Gator name are familiar thorns in the side of many anti-spyware advocates.

    Chien said not only does the GAIN Eula state it will relay information back from the user's PC, it also states - in hope perhaps more than expectation - that users cannot remove the spyware from their PC or even encourage others to do. Other Eula's Chien has seen even include references to the fact the application may access and exploit user data held in Outlook address books and other critical applications.

    Many spyware applications are programmed so as to be close to impossible to remove once installed, warned Chien.

    Published: October 11, 2005 -- 14:30 GMT (07:30 PDT)

    Caption by: Will Sturgeon

1 of 3 NEXT PREV
  • 40147744-1-chien3.jpg
  • 40147744-2-chien1.jpg
  • 40147744-3-chien2.jpg

And what can it do?

Read More Read Less

And what can it do?

Speaking at the Virus Bulletin 2005 conference in Dublin, Eric Chien, senior antivirus researcher at Symantec, outlines the common ways users are picking up spyware. Pop-up windows which suggest security updates and clock settings are available, or new messages are unread, often tempt less security-minded users to click.

"We've actually seen people create a full screen pop-up of a fake 'blue screen'," said Chien. Users are forced to act out of the belief their machine has crashed.

Chien said there are currently around 11,000 families of spyware applications and those intent on getting the malicious software onto users' machines are coming up with almost as many ways of doing so.

All photos: Will Sturgeon

Published: October 11, 2005 -- 14:30 GMT (07:30 PDT)

Caption by: Will Sturgeon

1 of 3 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • How to protect your Google Account with the Advanced Protection Program

    If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, ...

  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums