MUHAMMAD SYAHMI RIFQY BIN JASNIN 403
Spyware describe software with malicious behavior that aims to get the information about a person or organization and send search information to another entity in a way that harms the users.
WHAT IS ‘SPYWARE’
TYPES OF SPYWARE
Infostealers are programs that have the ability to scan infacted computers and steal a variaty of personal information
Similar to infostealers, the only difference being that they are specially design to steal login credentials from infacted devices
Spyware programs that record the keystrokers typed on a keyboard connected to an infacted computer
Programs that are design to access and record sensitive information that is either stored on or processed through online banking systems
EXAMPLES OF SPYWARE
Take advantage of the secuirity vulnerabilities in internet explorer to hijack the browser, change the setting, and send browsing data to its author
Disconnect the victim’s computer from a local phone line and connect them to a toll number designed for accessing pornographic sites
This program would monitor the victim’s web surfing habbits and use the information to serve them with better-targeted ads.
This program uses vulnerabilities in the active codec to download itself through to a computer and record search and browsing histories, as well as keystrokes
You should use the best antivirus software to remove any infacted or compromised files it detects You shouldn’t open any attachments or click on any links that are included in suspicious emails or messages you receive on social media Finally, even if your computer is showing no signs of a spyware infaction, you should still can it for all potential threats at least once a week
THANK YOU !