In this video, Lisa Bock explains the fundamentals of Spyware, a type of Malware. Explore some of the ways spyware watches and captures user activity. Understand how spyware infects a system, causing extreme slow-downs, excessive pop-ups, computer crash. She will also cover how black-hat hackers use the collected information for nefarious purposes.
- [Voiceover] Malware can be grouped in five different categories, spyware, viruses, worms, trojans and rootkits. Spyware is a form of malware that is placed onto a system by a number of different methods, and is used by organized crime, hackers, advertisers, and even countries. Once a system is infected with spyware, data is harvested by various methods. Spyware can monitor screen activity, capture keystrokes, gather web form data, track your internet usage, and also, allow an attacker to gain unauthorized access to sensitive data, and then the spyware phones home with the information.
Once the data is collected, it is many times sold to others for use in identity theft, spam, and other predatory activities. Spyware is designed to monitor your movement on the internet, such as places you have visited, and some cases can hijack your connection, and redirect you to other websites. When spyware or anytime of malware has infected your system it can cause your system to act in an upredicatable manner, such as an extreme slowdown, excessive pop-ups, or even a computer crash.
Now, related to spyware is something that's called Adware. Well, this is not really spyware, but a free version of software that has advertisements built into the software, and when the software is run, the ads are displayed on a screen. In order to remove the ads, you generally need to purchase the software or subscribe. Your choice in browsers will also influence a possible spyware attack. Chrome is generally regarded as a safe browser, followed by Mozilla Firefox.
Microsoft Internet Explorer is more susceptible to malware, but modern Windows operating systems have replaced Internet Explorer with Edge. However, whatever browser you use, you should always use good security habits. Let's talk about cookies. Now, cookies are used by many major websites, which are small text files put on end devices to store state information, and make browsing easier by preserving information about preferences and sign-in information.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks