SPYWARE

Published on
Scene 1 (0s)

SPYWARE

MUHAMMAD SYAHMI RIFQY BIN JASNIN 403

Scene 2 (7s)

Spyware describe software with malicious behavior that aims to get the information about a person or organization and send search information to another entity in a way that harms the users.

WHAT IS ‘SPYWARE’

Scene 3 (21s)

TYPES OF SPYWARE

INFOSTEALERS

Infostealers are programs that have the ability to scan infacted computers and steal a variaty of personal information

PASSWORD STEALERS

Similar to infostealers, the only difference being that they are specially design to steal login credentials from infacted devices

0 1

0 2

0 3

0 4

KEY LOGGERS

Spyware programs that record the keystrokers typed on a keyboard connected to an infacted computer

BANKER TROJANS

Programs that are design to access and record sensitive information that is either stored on or processed through online banking systems

Scene 4 (51s)

EXAMPLES OF SPYWARE

Take advantage of the secuirity vulnerabilities in internet explorer to hijack the browser, change the setting, and send browsing data to its author

COOLWEBSEARCH

Disconnect the victim’s computer from a local phone line and connect them to a toll number designed for accessing pornographic sites

TIBS DIALER

This program would monitor the victim’s web surfing habbits and use the information to serve them with better-targeted ads.

GATOR

This program uses vulnerabilities in the active codec to download itself through to a computer and record search and browsing histories, as well as keystrokes

ZLOB

Scene 5 (1m 22s)

CONCLUSION

You should use the best antivirus software to remove any infacted or compromised files it detects You shouldn’t open any attachments or click on any links that are included in suspicious emails or messages you receive on social media Finally, even if your computer is showing no signs of a spyware infaction, you should still can it for all potential threats at least once a week

Scene 6 (1m 44s)

THANK YOU !

SECURITY

COMPANY