• Follow us

Internet

How to get rid of spyware forever

As Director of Protection Labs & QA, Alexander Vukcevic is responsible for the development of new detection technologies and the analysis of new, still unknown malicious software. Together with his international experts team, he develops new strategies to protect computer systems and mobile devices from all types of attacks and to clean infected systems in real time.

Spyware is software that secretly monitors and collects information about your online activity, data on your device, and a wide range of personal information. This information is then exfiltrated from your device and sent to external servers for use in a variety of financial, monitoring, and advertising schemes. In addition to its various tracking abilities, spyware is primarily defined as being installed and operated without your knowledge or permission. There are spyware variants for all of the major operating systems.

Basic spyware features

There is a wide assortment of potential spying capabilities under the spyware umbrella. Some of the most common spyware functionalities are monitoring keystrokes, voice, location, and messages. In addition, spyware is also used to record account login information such as passwords which can be later used to steal a person’s identity. Here is an incomplete list of the primary monitoring abilities:

Browser cookie placementContact listsDevice document and file contentDevice monitor/displayEmail and chat monitoringKeystroke loggingPrinter activityRecord voicesSocial media activityTrack locationWebsite passwords and account user names

Commercial spyware programs are usually created to collect a wide range of relevant information about user behavior, regardless of what kind of sensitive personal information might be collected. These programs or the data are usually sold to third parties, which can then do user profiling which is harnessed by service providers to place specially tailored advertisements or to simply launch targeted attacks on users’ devices.

Most famous examples of spyware

Some of the most famous cases of spyware have been from government and corporations – not hackers. The XCP digital rights management software from Sony BMG Entertainment used a variety of spyware-like tactics and rootkit.

In the German-speaking regions of Europe, the term “Bundestrojaner” or “State Trojan” is used to describe spyware used by security forces. While this type of software is to be used only after a warrant from the court, the discovery of R2D2 and other variants have touched off efforts by antivirus developers such as the German Avira to include it on their list of malware detections.

More recently, the discovery of the zero-day vulnerability in WhatsApp and its use by the Pegasus spyware from the Israeli NSO group led to the Facebook-owned messaging app rushing out a patch to its millions of users.

Signs of spyware infection

Common signs of a spyware infection are when the device behaves sluggishly, responds more slowly than usual during regular activities such as typing or web browsing, uses an abnormal amount of bandwidth, and connects to servers not related to your regular browsing activities. In addition, for adware connected schemes, the device browser may display an unusual amount of targeted advertisements. However, for more advanced cases such as Pegasus spyware– there are often no visible signs that the targeted device has been infected.

How did I pick up that spyware?

Spyware is spread through both targeted and channeled attacks. For state-run intelligence operations, spyware use is usually targeted on a specific target. Sometimes just picking up a call on your smartphone can be enough to get a spyware infection. That is the case of the Pegasus spyware from the Isreali NSO group and its installation on smartphones. The R2D2 “Bundestrojaner” was allegedly placed on the device while going through an airport custom check.

However, these are extreme – and unusual – cases. For consumer-grade spyware, cybercriminals usually distribute it through defined channels where the spyware features are bundled along with other features into a seemingly innocent downloaded app. Both targeted and channeled attacks can exploit a zero-day software vulnerability and the specific installation tactics will vary according to device and operating system. 

However, the major spyware vulnerability point is you – the person using and installing apps on the device. As part of the installation of a new app or program, a user gives their required permission to place the spyware functionality into the system. Even on Android devices, a user gets the information about the requested permissions, but in most cases, this information is not read carefully or just completely ignored.

Detecting spyware

Antivirus apps have a mixed approach in how they approach spyware detections. For known malware combinations, the security app may directly stop the app from downloading or installing on the device. When spyware features are included in a bundled application – especially without any directly malicious activities – it may trigger a warning to the user that they are downloading a “Potentially Unwanted App,” or based on the degree of severity of the spy functionality, even classify these apps directly as malware.

How can I keep spyware off my device?

Tactics for keeping spyware at bay vary by device and operating system. However, having a quality antivirus/security system and a software updater installed are prerequisites.

For Windows-powered PCs, a good defense starts by not running the device in the Admin mode and having a separate user account for day-to-day operations. This slows down the installation process if any malicious spyware code is accidentally downloaded. Secondly, a software updater should be used to keep the various apps and programs on the device up to date. 

While Windows will usually patch its own vulnerabilities, that’s not the case for many of the other programs and a good updater will search for and automatically install updates. The third security tactic is to be more careful in installing new programs from download sites. These can come bundled with additional apps called “Potentially Unwanted Apps” which may not be directly harmful but have spyware functionalities. Click carefully on those terms and conditions.

Android phones are best protected by checking app reviews and downloading them only from the official app markets. This will reduce to odds of downloading an app with spyware characteristics. In addition, read the fine print about what permissions are requested or which information an app may collect about your during its operation.

Alexander Vukcevic is the director of Protection Labs & QA at Avira.

Read More



Leave A Comment

More News

Latest ITProPortal news

Foxconn president resigns to run for office 2019-06-21 08:00:29He wants to focus on his presidential campaign.

Google confirms it's leaving the tablet business 2019-06-21 07:58:09It's throwing everything it has into the laptop business.

US city votes to pay ransomware demand 2019-06-21 07:30:31Riviera Beach can't catch a break.

iPaaS: The true digital transformation enabler 2019-06-21 07:00:33At the heart of any digital transformation project is the same principle – getting access to data and managing that data effectively.

5G can help start ups compete better 2019-06-21 06:30:585G could give birth to a whole new wave of start-up businesses, who would leverage the technology to compete better against well-established players i

Leaked passwords are only the tip of the 2019-06-21 06:30:45The true cause of the problem isn’t what one company does or doesn’t do with their security, but the underlying premise that personally id

The rise of voice commerce 2019-06-21 06:00:46This is a burgeoning trend that could be a huge market in the very near future.

IT issues creating workplace "black hole" 2019-06-21 06:00:33Employees are losing hours fixing stuff around the office.

GDPR compliance: is your business at risk of 2019-06-21 05:30:57Since the introduction of GDPR last year, small businesses have faced increased pressure to develop and alter their existing policies in line with the

How continuous deployment can help you keep pace 2019-06-21 05:00:10With every company now a software company, here's how continuous deployment makes you stand out from the crowd.

Keeping up with digital transformation: Is your ERP 2019-06-21 04:30:46Digital transformation need not be a scary term, but the foundation of your ERP strategy.

Why the jewellery sector is in major need 2019-06-21 04:00:07How blockchain and modern technology has helped to change the way the sector is functioning.

TechRadar: Internet news

The best student laptops: all the best options 2019-07-03 14:17:34The best laptops for college students – everything from Chromebooks to the new Dell XPS 13.

GTA 6: all the latest news and rumors 2019-07-03 14:05:37Now that Red Dead Redemption 2's development is over, we can't help but speculate about Grand Theft Auto 6...

God of War 2 PS4: everything we know 2019-07-03 14:04:28We've gathered all the rumors and news surrounding the God of War sequel.

Shenmue 3: release date, trailers and news 2019-07-03 13:36:18Here's all we know about the long-awaited Shenmue 3 so far, with the latest trailers.

The best Ultrabooks 2019: top thin and light 2019-07-03 13:35:34We've put together a definitive list of the best Ultrabooks.

Nvidia GeForce RTX 2060 Super vs RTX 2060: 2019-07-03 13:33:13How much has the RTX 2060 Super improved upon the original RTX 2060? We investigate.

How to get rid of spyware forever 2019-07-03 13:30:45Tactics for keeping spyware at bay vary by device and operating system. However, having antivirus installed are prerequisites.

The best gaming PC 2019: 10 of the 2019-07-03 13:07:14Equipped with the latest processors and graphics cards, these are the best gaming PCs of 2019.

Chinese officials reportedly installed spyware on tourist phones 2019-07-03 13:05:26Border agents have begun to snoop and install spyware on the smartphones of travelers trying to enter China's Xinjiang region.

The best monitor 2019: the top 10 monitors 2019-07-03 12:41:29We've dug deep to find only the best monitors in the US, UK and Australia.

Disney Plus price, release date, shows and movies 2019-07-03 12:33:59Disney Plus will include exclusive shows and movies from the Marvel, Star Wars and Pixar universes – as well as The Simpsons.

Samsung Cloud storage: Everything you need to know 2019-07-03 12:33:34Check out the cloud storage option that’s present on all Samsung smartphones and tablets.

TechCrunch » Enterprise

Equinix and Singapore’s GIC will launch a $1 2019-07-02 00:20:35Equinix, one of the world’s largest data center companies, announced that it will form a $1 billion joint venture with GIC, Singapore’s so

Video platform Kaltura adds advanced analytics 2019-07-01 15:15:26You may not be familiar with Kaltura‘s name, but chances are you’ve used the company’s video platform at some point or another, give

We’ll talk even more Kubernetes at TC Sessions: 2019-07-01 12:00:58You can’t go to an enterprise conference these days without talking containers — and specifically the Kubernetes container management syst

Tara.ai, which uses machine learning to spec out 2019-07-01 06:09:59Artificial intelligence has become an increasingly important component of how a lot of technology works; now it’s also being applied to how tech

Enterprise SaaS revenue hits $100B run rate, led 2019-06-28 11:48:44In its most recent report, Synergy Research, a company that monitors cloud marketshare, found that enterprise SaaS revenue passed the $100 billion run

We’re talking Kubernetes at TC Sessions: Enterprise with 2019-06-27 12:48:01Over the past five years, Kubernetes has grown from a project inside of Google to an open source powerhouse with an ecosystem of products and services

Fellow raises $6.5M to help make managers better 2019-06-27 11:21:30Managing people is perhaps the most challenging thing most people will have to learn in the course of their professional lives – especially beca

Fungible raises $200 million led by SoftBank Vision 2019-06-27 11:00:24Fungible, a startup that wants to help data centers cope with the increasingly massive amounts of data produced by new technologies, has raised a $200

Cathay Innovation leads Laiye’s $35M round to bet 2019-06-27 10:22:46For many years, the boom and bust of China’s tech landscape have centered around consumer-facing products. As this space gets filled by Baidu, A

Amperity update gives customers more control over Customer 2019-06-27 09:03:26The Customer Data Platform (CDP) has certainly been getting a lot of attention in marketing software circles over the last year as big dawgs like Sale

Bright Machines wants to put AI-driven automation in 2019-06-26 11:16:00There’s a mythology around today’s factories that says everything is automated by robotics, and while there is some truth to that, it&rsqu

Vulcan Cyber announces $10M Series A to automate 2019-06-26 09:20:42Many software vulnerabilities are already known, and vendors have even issued patches, but the problem is there are so many patches that it’s of

ExtremeTechInternet –

SpaceX Lost Contact With 3 Starlink Satellites 2019-07-01 14:32:03Losing three satellites in a matter of weeks doesn't sound great, and indeed, it would be preferable if none of them failed. However, SpaceX CEO Elon

Udemy Class Review: Rocket Engineering and Interstellar Space 2019-07-01 13:02:48Udemy’s Rocket Engineering and Interstellar Space Propulsion course provides a considerable amount of information on both topics crammed into a

Microsoft Adds Tracking Prevention to Latest Chromium Edge 2019-06-28 14:07:34The latest feature to appear in a pre-release build is tracking prevention. You'll have to tinker with the settings to turn it on, but the process sh

How Shipping a Huawei Phone Via FedEx Made 2019-06-26 16:11:42How a Huawei phone and a FedEx delivery turned into an international incident. The post How Shipping a Huawei Phone Via FedEx Made International News

Udemy Class Review: The Foundations of Computer Design 2019-06-26 11:01:13We look at Udemy's The Foundation's Of Computer Design course to see how well it performs its job of teaching the basics of computer design. The pos

Firefox Zero-Day Used to Install Mac Malware 2019-06-21 17:43:28Mozilla issued an emergency Firefox patch earlier this week, citing a dangerous zero-day exploit. Because it believed hackers were exploiting the flaw

‘Reset’ Nest Cams Could Still Send Video to 2019-06-21 08:36:26The Wirecutter confirmed with a Nest Cam that, yes, Wink retains access to the camera after a reset. This is the case even if someone else sets up the

A Rogue Raspberry Pi Let Hackers Into NASA’s 2019-06-20 12:26:28NASA’s Jet Propulsion Laboratory (JPL) works with some of the most advanced technology in the world including Mars rovers and space telescopes.

Mozilla Issues Emergency Zero-Day Firefox Patch 2019-06-19 15:50:22Mozilla advises all Firefox users to update to the latest version of the browser as soon as possible. The company has just become aware of a zero-day

Protect Your Online Privacy With the 5 Best 2019-06-17 12:21:48Investing in a VPN is a smart choice right now, but the options are vast. To help narrow things down a bit, we've rounded up five of our very favorit

People Aren’t Patching for the BlueKeep Windows Exploit, 2019-06-06 13:32:22Now even the NSA is getting worried that the so-called BlueKeep flaw could result in a dangerous worm that spreads across the globe, wreaking havoc on

Microsoft Says Forced Password Resets Don’t Improve Security 2019-06-04 13:07:28For decades, the baseline password practices Microsoft provided to customers suggested forcing employees to change their passwords every 60 days. Acco


Disclaimer and Notice:WorldProNews.com is not responsible of these news or any information published on this website.