{"id":5143,"date":"2012-03-20T20:50:18","date_gmt":"2012-03-21T00:50:18","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=5143"},"modified":"2021-07-30T11:19:55","modified_gmt":"2021-07-30T15:19:55","slug":"spyware-prevention-101","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/spyware-prevention-101\/","title":{"rendered":"Spyware Prevention 101"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20230522203515\/https:\/\/uscellphonedetective.com\/spyware\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109642\" title=\"Spyware Prevention 101\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware-2.png?resize=112%2C70&#038;ssl=1\" alt=\"Spyware Prevention 101\" width=\"112\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware-2.png?resize=150%2C94&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware-2.png?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware-2.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 112px) 100vw, 112px\" \/><\/a><strong>Spyware<\/strong> goes by many names, including <strong>adware, malware<\/strong>, <a title=\"Crimeware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Crimeware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">crimeware<\/a>, <a title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">scumware<\/a>, and <a title=\"Employee monitoring software\" href=\"http:\/\/en.wikipedia.org\/wiki\/Employee_monitoring_software\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">snoopware<\/a>. No matter what you call it, spyware&#8217;s purpose is still the same: to <strong>steal your <a title=\"Personally identifiable information\" href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">personal information<\/a><\/strong> (PII).<\/p>\n<p><a href=\"https:\/\/siliconangle.com\/2012\/09\/20\/how-your-carrier-might-be-stealing-data-from-you\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109644\" title=\"steal your identity, use your credit cards, siphon funds from your bank accounts\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-11-e1571442973316-75x56.jpg?resize=90%2C67&#038;ssl=1\" alt=\"steal your identity, use your credit cards, siphon funds from your bank accounts\" width=\"90\" height=\"67\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-11-e1571442973316.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-11-e1571442973316.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-11-e1571442973316.jpg?w=224&amp;ssl=1 224w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a><em>Help Net Security<\/em> <a title=\"www.net-security.org\" href=\"https:\/\/web.archive.org\/web\/20110303054614\/http:\/\/www.net-security.org:80\/malware_news.php?id=1602\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that once hackers have your personal information they can steal your identity, use your credit cards, siphon funds from your bank accounts, and more. Simply put: it&#8217;s bad news and you want nothing to do with it.<\/p>\n<p>The good news, according to the article, is that <a title=\"Spyware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Spyware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">spyware<\/a> prevention is possible and there are many ways to keep these dangerous programs at bay. In addition to installing the right software, users can practice these computer security tips from\u00a0<a title=\"Broomfield, Colorado\" href=\"http:\/\/maps.google.com\/maps?ll=39.9319444444,-105.065833333&amp;spn=0.1,0.1&amp;q=39.9319444444,-105.065833333%20%28Broomfield%2C%20Colorado%29&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Broomfield, CO<\/a>-based Internet security firm <a title=\"Webroot Software\" href=\"http:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Webroot<\/a>:<\/p>\n<ul>\n<li>Download software directly from the source. The article says a common way to get a spyware infection is to install free or pirated programs from file-sharing sites which have been booby-trapped with malware.<\/li>\n<li>Set your browser security settings to &#8220;high&#8221; and protect yourself from &#8220;drive-by&#8221; downloads and automatic installations of unwanted programs.<\/li>\n<li><a href=\"https:\/\/billmullins.wordpress.com\/2010\/05\/28\/download-zonealarm-free-firewall-2010-windows-7-compatible\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109646 size-thumbnail\" title=\"Use a firewall.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firewall-1.gif?resize=75%2C75&#038;ssl=1\" alt=\"Use a firewall\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firewall-1.gif?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firewall-1.gif?resize=150%2C150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Avoid questionable websites, such as those featuring adult material. They&#8217;re notorious for spreading spyware threats and causing users problems.<\/li>\n<li>Use a firewall.<\/li>\n<li>Be suspicious of email and <a title=\"Instant messaging\" href=\"http:\/\/en.wikipedia.org\/wiki\/Instant_messaging\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IM<\/a>.<\/li>\n<li>Don&#8217;t open attachments unless you know the sender and are expecting a file from them.<\/li>\n<li>Delete messages you suspect are spam (don&#8217;t even open them).<\/li>\n<li>Avoid clicking on links within messages.<\/li>\n<li><a href=\"http:\/\/www.truste.com\/blog\/2011\/04\/05\/6-tips-to-spot-stop-a-phish\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109649\" title=\"do not click on a link embedded in the email message\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4-3.png?resize=105%2C90&#038;ssl=1\" alt=\"do not click on a link embedded in the email message\" width=\"105\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4-3.png?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4-3.png?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4-3.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 105px) 100vw, 105px\" \/><\/a>Do not give personal information to unsolicited requests even if they seem legitimate.<\/li>\n<li>If you receive a request for personal information from your bank or credit card company, contact that financial institution directly, but do not click on a link embedded in the email message.<\/li>\n<\/ul>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em> Amichai Shulman &#8211; CTO, <a title=\"Imperva\" href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Imperva<\/a>\u00a0<a title=\"www.net-security.org\" href=\"https:\/\/web.archive.org\/web\/20101221203032\/http:\/\/net-security.org\/article.php?id=1508&amp;p=3\" target=\"_blank\" rel=\"noopener noreferrer\">posted<\/a> that the credentials to a Hotmail account are worth $1.50 and a Gmail account is worth over $80 to cyber-criminals. Gmail is more valuable to the attacker because of the wide variety of other Gmail cloud services that can be accessed through Gmail credentials. <\/em><\/p>\n<p><em>It is also likely that credentials used by a person for one application will most work on other applications as well. It is not uncommon for people to have the same username and password used for their Facebook account, their Twitter account, their Airline Frequent Flyer account, or any application that uses their Gmail account as the application account name.<\/em><\/p>\n<p><em>That&#8217;s why spyware is bad.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/web.archive.org\/web\/20140110065824\/http:\/\/cellphones.org\/blog\/save-your-smartphones-from-spyware-and-malware-invasion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Save Your Smartphones from Spyware and Malware Invasion<\/a> (cellphones.org)<\/li>\n<li><a href=\"http:\/\/www.phonescoop.com\/articles\/article.php?a=9773\" target=\"_blank\" rel=\"noopener noreferrer\">Google Intros &#8216;Bouncer&#8217; Security System for Android Market<\/a> (phonescoop.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spyware is called adware malware crimeware scumware its purpose is to steal PII Webroot has tips to protect PII avoid file sharing and adult sites use a firewall<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,301,536,92,140,23,951,4,1036,1063],"class_list":["post-5143","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-gmail","tag-goog","tag-google","tag-imperva","tag-malware","tag-pii","tag-security","tag-spyware","tag-webroot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=5143"}],"version-history":[{"count":8,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5143\/revisions"}],"predecessor-version":[{"id":130825,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5143\/revisions\/130825"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=5143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=5143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=5143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}