Some CureZone members have discovered spyware on their computers. Some even made allegations that one particular person is spying on them. ??? Please!
Before you make any similar allegations, please learn abot the subject you are talking about. Unless you are a computer secury expert, and in the same time very lucky, there is no simple way for you to know who is trying to spy on you, if anyone..
Learn!
http://en.wikipedia.org/wiki/Spyware
Spyware is a type of program that watches what users do with their computer and then sends that information over the internet. Spyware can collect many different types of information about a user. More benign programs can attempt to track what types of websites a user visits and send this information to an advertisement agency. More malicious versions can try to record what a user types to try to intercept passwords or credit card numbers. Yet other versions simply launch popup advertisements.
Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, however, spyware — by design — exploits infected computers for commercial gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.
According to a November 2004 study by AOL and the National Cyber-Security Alliance, 80% of surveyed users' computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for the installation of the spyware. [3]
As of 2006, spyware has become one of the preeminent security threats to computer-systems running Microsoft Windows operating-systems (and especially to users of Internet Explorer because of that browser's collaboration with the Windows operating system). Some malware on the Linux and Mac OS X platforms has behavior similar to Windows spyware, but to date has not become anywhere near as widespread. In an estimate based on customer sent scan logs, Webroot Software, makers of Spy Sweeper, said that 9 out of 10 computers connected to the internet are infected and 86% of those surveyed suffered a monetary loss due to spyware.[4]
Just the fact that you have found Spyware or Adware on your computer does not mean that anyone in particular was targeting you!!! You are most likely just one out of millions other people targetted.
Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.
The most direct route by which spyware can infect a computer involves the user installing it. However, users tend not to install software if they know that it will disrupt their working environment and compromise their privacy. So many spyware programs deceive the users, either by piggybacking on a piece of desirable software such as Kazaa, or by tricking the users to do something that installs the software without them realizing. Recently, spyware has come to include "rogue anti-spyware" programs, which masquerade as security software while actually doing damage.
Classically, a Trojan horse, by definition, smuggles in something dangerous in the guise of something desirable. Some spyware programs get spread in just this manner. The distributor of spyware presents the program as a useful utility — for instance as a "Web accelerator" or as a helpful software agent. Users download and install the software without immediately suspecting that it could cause harm. For example, Bonzi Buddy, a spyware program targeted at children, claims that:
Spyware can also come bundled with shareware or other downloadable software, as well as music CDs. The user downloads a program (for instance, a music program or a file-trading utility) and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does. In some cases, spyware authors have paid shareware authors to bundle spyware with their software. In other cases, spyware authors have repackaged desirable free software with installers that add spyware.
A third way of distributing spyware involves tricking users by manipulating security features designed to prevent unwanted installations. The Internet Explorer Web browser, by design, prevents websites from initiating an unwanted download. Instead, a user action (such as clicking on a link) must normally trigger a download. However, links can prove deceptive: for instance, a pop-up ad may appear like a standard Windows dialog box. The box contains a message such as "Would you like to optimise your Internet access?" with links which look like buttons reading Yes and No. No matter which "button" the user presses, a download starts, placing the spyware on the user's system. Later versions of Internet Explorer offer fewer avenues for this attack.
Some spyware authors infect a system by attacking security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. The spyware author would also have some extensive knowledge of commercially-available anti-virus and firewall software. This has become known as a "drive-by download", which leaves the user a hapless bystander to the attack. Common browser exploits target security vulnerabilities in Internet Explorer and in the Microsoft Java runtime.
The installation of spyware frequently involves Microsoft's Internet Explorer. As the most popular Web browser, and with an unfortunate history of security issues, it has become the largest target. Its deep integration with the Windows environment and its scriptability make it an obvious point of attack into Microsoft Windows operating systems. Internet Explorer also serves as a point of attachment for spyware in the form of browser helper objects, which modify the browser's behaviour to add toolbars or to redirect traffic.
In a few cases, a worm or virus has delivered a payload of spyware. For instance, some attackers used the W32.Spybot.Worm worm to install spyware that popped up pornographic ads on the infected system's screen. [6] By directing traffic to ads set up to channel funds to the spyware authors, they can profit even by such clearly illegal behaviour.
http://en.wikipedia.org/wiki/Spyware
Malicious programmers have released a large number of fake anti-spyware programs, and widely distributed Web banner ads now spuriously warn users that their computers have been infected with spyware, directing them to purchase programs which do not actually remove spyware — or worse, may add more spyware of their own. [17] [18]
The recent proliferation of fake or spoofed antivirus products has occasioned some concern. Such products often bill themselves as antispyware, antivirus, or registry cleaners, and sometimes feature popups prompting users to install them. This is called Rogue software.
Known offenders include:
For details, please see "Rogue/Suspect Anti-Spyware Products & Web Sites"
On 2006-01-26, Microsoft and the Washington state attorney general filed suit against Secure Computer for its Spyware Cleaner product. [19]
To deter spyware, computer users have found a number of techniques useful in addition to installing anti-spyware software.
Many system operators install a web browser other than Microsoft's Internet Explorer (IE), such as Opera or Mozilla Firefox. Though such web browsers have also suffered from some security vulnerabilities, because most users that are likely to fall for spyware aren't using them, these browsers are not targeted as much as Internet Explorer. Not a single browser ranks as safe, because in the case of spyware the security comes with the person who uses the browser.
Some Internet Service Providers — particularly colleges and universities — have taken a different approach to blocking spyware: they use their network firewalls and web proxies to block access to Web sites known to install spyware. On March 31, 2005, Cornell University's Information Technology department released a report detailing the behavior of one particular piece of proxy-based spyware, Marketscore, and the steps the university took to intercept it. [20] Many other educational institutions have taken similar steps against Marketscore and other spyware. Spyware programs which redirect network traffic cause greater technical-support problems than programs which merely display ads or monitor users' behavior, and so may attract institutional attention more readily.
Some users install a large hosts file which prevents the users computer from connecting to known spyware related web addresses. However, by connecting to the numeric IP address, rather than the domain name, spyware may bypass this sort of protection.
Spyware may get installed via certain shareware programs offered for download. Downloading programs only from reputable sources can provide some protection from this source of attack. Recently, CNet revamped its download directory: it has stated that it will only keep files that pass inspection by Ad-Aware and Spyware Doctor.
Sony's Extended Copy Protection involved the installation of spyware from audio compact discs through autorun. This practice sparked considerable controversy when it was discovered.
Spyware is any application that makes potentially unwanted changes to your computer while collecting information about your computer activities. This information may then be sent to a third party for malicious purposes, without your knowledge or consent. Spyware arrives bundled with freeware or shareware, through e-mail or instant messenger, as an ActiveX installation, or by someone with access to your computer. Unlike traditional personalization or session cookies, spyware is difficult to detect, and spyware removal is difficult (if not impossible) for the average user.
Anyone who uses a computer is susceptible to spyware infection. Your online actions, whether you're surfing the Internet or checking e-mail, can attract spyware. These programs find their way onto your system and install themselves in several possible places on your PC, including your registry, start up menu, files and folders. Many spyware programs ensure their survival by sprinkling traces of the program throughout your PC to make full removal more difficult (and sometimes nearly impossible). Once installed, spyware operates silently in the background.
File-sharing programs and swapping music, photos or other files are also well-known avenues for spyware infection. Sometimes spyware is bundled with a desired program, and is disclosed in buried text as part of the end-user-license agreement (EULA). These days, spyware may hop onto your system when you visit certain Web sites.
Spyware comes in many forms including adware, keyloggers, Trojans, system monitors, browser hijackers, and dialers. It ranges from benign - adware tracking cookies, which let online companies track your activities on a Web site and tailor pop-up ads based on your choices - to more nefarious spyware programs like Trojans, keyloggers and system monitors, which are capable of capturing keystrokes, online screenshots, and personally identifiable information like your social security number, bank account numbers, logins and passwords, or credit card numbers.
Ultimately, your identity and private information can be compromised by these malicious programs. On a corporate level, spyware can compromise network and data security, corporate assets and trade secrets.
Aside from potential identity theft, many spyware programs steal from you by cluttering your computer's memory resources and eating bandwidth as it "talks" to the spyware's home base using your Internet connection. This could lead to your computer suffering system crashes and/or slower performance.