Dealing With Adware And Spyware
by Lisa Phifer
Published August 2006; Posted December 2006
Abstract:
You’ll need a hybrid of host- and network-based approaches, as well as the
security professional’s greatest asset: Constant vigilance.
If early viruses like BubbleBoy and LoveBug make you pine for simpler times,
then you are probably waging war against this millennium’s far more tenacious
foe: The stubborn crop of spyware that now infests three out of four PCs. From
pesky adware like BonziBuddy to malicious malware like Trojan-Downloader-Zlob,
spyware is literally choking corporate desktops and networks. Responsible for
one out of four help desk calls and half of the PC crashes reported to
Microsoft, spyware is draining IT resources and business productivity.
Worse, spyware is now morphing from nuisance to nightmare. Those seeking
financial gain through spyware have evolved from tracking cookies and intrusive
pop-up ads to more selective and insidious methods. For example, drive-bydownloads
are installing exploit code onto PCs that merely visit websites, without user
interaction. Phishing trojans are monitoring browser activity, waiting to
capture identities and credentials during on-line banking transactions.
Keyloggers are harvesting sensitive data from victims, violating privacy laws
and industry regulations.
|
|||||
Return to Business Communications Review Gold Sponsor Archives |
About the author:
Lisa Phifer is an owner and principal consultant at Core Competence, a network security technology consulting firm based in Chester Springs, PA. A 25-year veteran of the networking industry, Lisa has been battling the spyware scourge since 2001.
This article is reproduced by special arrangement with our partner, Business Communications Review. |
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.