Malware Spyware & Viruses
Dec 25, 2015
Malware
Spyware
& Viruses
OverviewOverviewWhat does it look like?What does it look like?
What is it?What is it?
How can you prevent it?How can you prevent it?
What can you do about it What can you do about it when you get it?when you get it?
What’s wrong with
my computer ?
Symptoms of MalwareSymptoms of Malware
Pop-up adds increasePop-up adds increase Home page changes without your consentHome page changes without your consent Unusually S-L-O-W systemUnusually S-L-O-W system Screen image does unusual things (upside Screen image does unusual things (upside
down/reverses)down/reverses) Rude messages may appearRude messages may appear Unknown icons appear in the Unknown icons appear in the
bottom of the screenbottom of the screen
MALWAREMALWARE
Name of the “bad Name of the “bad stuff” that gets into stuff” that gets into your computer. your computer.
And there is all kinds of bad stuff out there!!
Adware is annoying.Adware is annoying.
But serious danger to your But serious danger to your computer lies in computer lies in
Viruses &Viruses &
SpywareSpyware
VIRUSVIRUS
Computer viruses, Computer viruses, like biological like biological viruses, can viruses, can replicate replicate themselves.themselves.
Viruses can take over Viruses can take over your computer.your computer.
Serious Consequences of VirusesSerious Consequences of Viruses
Virus - a hidden program that reproduces Virus - a hidden program that reproduces and destroys portions of a computer’s and destroys portions of a computer’s storage, memory or network:storage, memory or network:
Infects files (hard drives & floppy drives)Infects files (hard drives & floppy drives) Invades operating systemsInvades operating systems Targets memory storage (RAM & boot Targets memory storage (RAM & boot
sectors)sectors)
SPYWARESPYWARE
malicious tracking of malicious tracking of software that users software that users are unaware of.are unaware of.
Serious Consequences of SpywareSerious Consequences of Spyware
Spyware - hidden software that Spyware - hidden software that tracks user’s Internet habits:tracks user’s Internet habits:
Can lead to identity theft!Can lead to identity theft! Steals personal information & Steals personal information &
address bookaddress book Uses your computer as a secret Uses your computer as a secret
server to broadcast undesirable files server to broadcast undesirable files (i.e., pornography)(i.e., pornography)
How can I prevent it?How can I prevent it? PasswordsPasswords
Don’t know = Don’t openDon’t know = Don’t open
Avoid Spam Advertised ProductsAvoid Spam Advertised Products
Pop-up BoxesPop-up Boxes
Use Safe BrowsersUse Safe Browsers– Firefox / OperaFirefox / Opera
How can I prevent it?How can I prevent it?
Install security software /$$$Install security software /$$$– Anti-virusAnti-virus– Anti-spywareAnti-spyware– FirewallFirewall
How can I prevent it?How can I prevent it?
Download /install security updates Download /install security updates and patchesand patches
Computer Clean-UpComputer Clean-Up
Remove any programs that you do not Remove any programs that you do not need or did not add.need or did not add.
Restart your computer in safe mode.Restart your computer in safe mode. Disable the system’s restore.Disable the system’s restore. Clear the cache of cookies.Clear the cache of cookies. Run a virus scan.Run a virus scan. Update the computer’s virus protection. Update the computer’s virus protection. Back up your files.Back up your files.
REFERENCES REFERENCES
Department of Academic Information Technology. (2007). Department of Academic Information Technology. (2007). Malware: The Enemy Within.Malware: The Enemy Within. 1-4. 1-4.
Retrieved from http://www.brooklyn.cuny.eduRetrieved from http://www.brooklyn.cuny.edu
McAfee, Inc. (2008). McAfee, Inc. (2008). McAfee’s 10-Step Internet Safety Plan for Your Family.McAfee’s 10-Step Internet Safety Plan for Your Family. [Power Point Slides]. [Power Point Slides]. Retrieved from Online Web Site: Retrieved from Online Web Site: http://usmcafee.com/en-us/local/docs/McAfeeInternetSafetyPlan.pdfhttp://usmcafee.com/en-us/local/docs/McAfeeInternetSafetyPlan.pdf
Mystic Network Solutions. Mystic Network Solutions. How Do I Remove Viruses From My Computer?.How Do I Remove Viruses From My Computer?. Retrieved March 2, 2009 Retrieved March 2, 2009 from the World Wide Web: from the World Wide Web: http://mysticnetworks.com/uploads/How_Do_I_remove_viruses_from_my_computerhttp://mysticnetworks.com/uploads/How_Do_I_remove_viruses_from_my_computer..
Net for Beginners. (2009, January). Net for Beginners. (2009, January). Spyware-Malware 101.Spyware-Malware 101. 1-2. Retrieved from http:// 1-2. Retrieved from http://
www.netforbeginners.about.comwww.netforbeginners.about.com
NewsTiger Direct. (2007, January). NewsTiger Direct. (2007, January). Viruses, Spyware and Malware.Viruses, Spyware and Malware. 1-10. Retrieved from 1-10. Retrieved from
http://www.news.tigerdirct.com/2007http://www.news.tigerdirct.com/2007
Primeweb Computer and Website Services. Primeweb Computer and Website Services. Computer Clean Up Tutorial. Computer Clean Up Tutorial. Retrieved March 2, 2009 Retrieved March 2, 2009 from the World Wide Web: http://www.primeweb.ca/docs/computer_clean_up_tutorial.docfrom the World Wide Web: http://www.primeweb.ca/docs/computer_clean_up_tutorial.doc
REFERENCES CONTINUEDREFERENCES CONTINUED
Spyware Prevent Guide. Spyware Prevent Guide. Retrieved March 2, 2009 from: Retrieved March 2, 2009 from: http://geekgirls.com/security_spyware_prevention.htmlhttp://geekgirls.com/security_spyware_prevention.html
Ten Steps to Malware Prevention.Ten Steps to Malware Prevention. Retrieved March 2, 2009 from: http://www.malwarehelp.org/ten- Retrieved March 2, 2009 from: http://www.malwarehelp.org/ten-steps-to-malware-prevention-part-1.htmlsteps-to-malware-prevention-part-1.html
University of Vermont. University of Vermont. Safe Computing Malware Clean-up GuideSafe Computing Malware Clean-up Guide. January 18, 2005. http://. January 18, 2005. http:// www.uvm.edu/cit/safecomputing/MalwareRemovalGuide.www.uvm.edu/cit/safecomputing/MalwareRemovalGuide.