ApplicationsCalculatorsAbout UsRatesMembershipFAQ'sHomeEmployment
Site Search:       Friday, February 4, 2011
Savings Accounts
Regular Share
Silver Share Certificates
Holiday Savings
ATM Card
Youth Programs
Senior Programs
Star Program
Money Savvy Articles
Retirement Articles
Account Agreement Disclosure


How to Be "Spywary": It's More Software Than You Bargained For

Liz Brady



So you've downloaded the latest antivirus software, you filter your e-mail, and you browse the Internet responsibly. Your PC (personal computer) must be relatively secure, right? Think twice before you answer that question. Outsiders can access personal information from your own computer files�without your knowledge.

Dubbed "spyware," these stealthy programs covertly gather information about your personal browsing habits and online activities or harvest your personal files and then sell this data to advertisers for marketing purposes.

While spyware developers assert that tracking an individual's computing behavior is harmless and actually benefits the consumer by enabling targeted marketing, consumer advocates contend that spyware is an intrusive violation of privacy. "Anything that comes onto my computer without me asking for it or giving permission for it is a violation of my rights," argues Ken Dwight of Houston, who is widely recognized as "The Virus Doctor" for his expertise regarding "malware," short for malicious software.

Furthermore, consumer advocates, like Dwight, note that the crafty nature of this spying software makes it difficult to identify. "Spyware doesn't even want you to know it's there in the first place," Dwight says. "The big problem today is that you don't have any reliable way of knowing where it came from."

According to Consumer Reports, 850,000 people replaced their computers as a result of spyware infections from January to June 2007. That said, it's not always necessary to replace your PC. Answers to the following questions may help you understand spyware and secure your PC and your privacy.

How can I tell if my computer has been infected with spyware?

Spyware is a form of malware, but is not designed to harm the computer or the computer user. Spyware basically parks itself somewhere in your PC and collects information about your computing habits, such as the Web sites you visit, the time you spend online, and the types of programs you install on your computer. The infiltration is surreptitious, so you may not even recognize it exists.

Even so, spyware frequently causes PC performance issues that provide warning signs indicating its presence. For instance, if your computer behaves sluggishly (especially when connected to the Internet), if your browser's start-up page or other browser settings have been changed without your knowledge, or if random windows or ads continue to pop up, there is a good chance spyware or other variants have been installed in your system.

Those variants may include: Trojans: Malware that surreptitiously performs tasks�like allowing a remote user to control someone's PC over the Internet. Keyloggers: Types of trojans that track all keys a user types and sends those logged keystrokes to a remote user�used to capture personal information such as passwords, account numbers, and even your mother's maiden name for identity theft purposes. Browser hijacker: Malware that uses a feature in Microsoft Internet Explorer to install plug-ins that change the home page and other settings on a Web browser. Adware: Software that displays ads and is capable of reporting surfing behavior to advertisers. Parasiteware: Malware that is sneakily included with another program�usually hidden in the host software's End-User License Agreement (EULA).

Spyware has become a persistent problem because it is a profit-driven activity.

How did spyware enter my computer?

Spyware can enter your system through several methods:

Direct installation: This occurs when a consumer unsuspectingly installs a malicious program advertised as something useful�for instance, the software may claim to enhance your Web browser. Also, spyware can be directly installed when a consumer fails to carefully read the software's EULA before clicking, "I Agree."

Piggybacking: Some spyware is attached to benign (and often free) software programs installed by the computer user. The benign software installs on your system and�automatically�spyware from the third party vendor installs as well.

Security holes: Known security flaws in Internet Explorer have allowed spyware to infiltrate PCs that regularly use Internet Explorer as a search engine. Internet Explorer has built-in mechanisms, such as ActiveX, that allow mobile code to be downloaded to your machine. Once in your system, the mobile code can perform an endless number of functions from your PC.

How can I avoid spyware?

In testimony presented to the U.S. House Subcommittee on Commerce, Trade, and Consumer Protection, Jeffrey Friedberg, director of Microsoft Windows Privacy, stated: "Spyware and other deceptive software share a common theme: They use ambiguity, coercion, deceit, and outright trickery to lure or even force users to execute or install unwanted and often invasive programs." Considering this array of deceptive weaponry, is there any way to prevent spyware or other forms of malware from infecting one's PC? Most important, experts say, PC security is a matter of user education.

Experts offer these tips to avoid spyware and other deceptive software: Be sure your browser security level is set to at least medium (for Internet Explorer click on Tools, Options, and then Privacy). Keep in mind, however, that security settings higher than medium may make Web sites less usable. Try using a different Web browser. Browsers such as Opera (commercial software with free download) and Mozilla (open source and free) are immune to the automatic installation flaws in Microsoft Internet Explorer and always prompt the user before downloading and installing software. Never accept downloads from people or companies you don't know or trust, and don't wander into Web sites with questionable content. Sites offering free downloads of popular music and software or pornography often are loaded with deceptive software. Beware of peer-to-peer file sharing services. Many of the most popular applications include spyware. Thoroughly investigate any software you intend to install. Read all disclosures, EULAs, "Terms and Conditions," and privacy statements carefully before you click "Accept," "Agree," or "OK." Remove all unwanted, unnecessary, or suspicious-looking software from your computer. However, Dwight advises PC users to run a GoogleTM search on any unfamiliar software before you remove it to make sure you don't delete essential computer programs.

Spyware infiltration is surreptitious, so you may not even know it has been installed on your PC.
Keep Windows and any other regularly used software up-to-date, by running all the latest patches and fixes from Windows Update. Get a firewall. This software sits between your computer and the Internet and helps block unauthorized access to your computer. Download Zone Alarm's firewall for free.

I think my computer already is infected with spyware�what now?

Some spyware applications offer standard uninstallation programs�check in the add/remove program module in the Windows Control Panel. Other spyware software is more complicated to remove. Consequently, an entire industry of anti-spyware and spyware removal software has popped up in response to spyware's omnipresence.

Here's a list of popular spyware removal software (all are free except the final two, as indicated). Keep in mind, however, that none of these programs guarantees the removal of all spyware applications:

Spybot Search and Destroy: Leader in software removal, but slightly difficult to use. Ad-aware: Easy to use and very popular. Designed to remove spyware and browser cookies. Hijack This!: Restores browsers whose settings or home pages have been "hijacked." CW Shredder:Finds and removes browser hijackers like CoolWebSearch. Created by the company that designed Hijack This! SpywareBlaster and Microsoft's Windows Defender are free programs that can help combat spyware. Visit download.com to check ratings of spyware removal programs. Trend Micro Anti-Spyware:Recommended by Consumer Reports. Costs about $30. Pest Patrol: Software that searches your entire PC for hidden programs. Costs about $30.

Though the above programs can help, it's important to continually download the latest definition files for the anti-spyware programs and to run scans and properly remove threats.

What other solutions are being considered?

Spyware has become a persistent problem because it is a profit-driven activity. "There was never any real, positive intent other than to make money," says Dwight. Currently, anti-spyware programs are the only technical defense against spyware, so some spyware experts contend that stopping spyware proliferation will require legal action.

But recent legislative attempts to regulate spyware haven't been succesful. The U.S. House of Representatives passed the Internet Spyware (I-SPY) Prevention Act in May 2007, but the Senate has yet to vote on the bill. A similar bill, the Spy Act, also remains stalled in the Senate.

Spyware infections caused 850,000 people to replace their computers in the first six months of 2007.

However, some spyware experts doubt the effectiveness of legislative attempts to control deceptive software. "It won't do any good at all�it's absolutely worthless," Dwight says. He notes that the very nature of spyware makes it difficult for authorities to track who and where spyware comes from. Furthermore, Dwight attributes the futility of legislative measures to the fact that many spyware applications are created in foreign countries by writers who cannot even be penalized under U.S. law. In his opinion, legislative efforts to control spyware are "just a way of politicians getting their name in the paper."

Microsoft has publicized a strategy that involves public and private sectors in the fight against spyware and other misleading software. "This strategy," Friedberg announced in his testimony, "has four prongs: widespread customer education, innovative technology solutions, improved industry self-regulation, and aggressive enforcement under existing state and federal laws. Legislation could complement this strategy, but we believe it should be carefully crafted to target the bad behavior�not the underlying technology," he said.

Microsoft is also part of the Anti-Spyware Coalition, a group of companies, academics, and consumer groups dedicated to building consensus and establishing best practices in the debate surrounding spyware and other potentially unwanted technologies. Google, HP, and Dell are among over 40 members of the Coalition.

Whatever the future holds for spyware and its deceptive software counterparts, for the present, PC users will be forced to cope with and adapt to these undesirable intruders. Because the sponsors of spyware will undoubtedly continue to adapt their deceptions, the best advice to users is to maintain vigilance and keep informed about remedies.

Pay careful attention to what windows pop up on your screen. If you have the slightest doubt that's it's not legitimate, press "Alt-F4" or close the window through the task manager. To access this, right-click on the taskbar at the bottom of the screen and select "Task Manager" or press "Ctrl+Shift+Esc". Under the tab "Applications", select the title of the pop-up and press "End Task".

Avoid clicking on the "X" in the upper right-hand corner of the window�sometimes, the entire pop-up is infected, so clicking anywhere on the window will launch the spyware. Likewise, do not choose "OK" or "Close".

Useful resources

Microsoft's Spyware Web Site U.S. Computer Emergency Readiness Team (US-CERT) The Virus Doctor. Look for link to Ken Dwight's new book, "Bug Free Computing: Stop Viruses, Squash Worms, and Smash Trojan Horses" (ISBN 0975408542) Jeffrey Friedberg's written testimony, representing Microsoft, from Congressional hearing on spyware Anti-Spyware Coalition Web Site



Money Management

Articles

Economy Inspires Parting Couples to Get Creative

Financial Candor Makes Second Marriages Sweeter

December Financial Fitness Challenge�Use Simple Tools to Assess Your Finances

New Gift Card Rules Make for Happier Holidays

November Financial Fitness Challenge�Try a "Cash Only" Experiment

Help Young Adults Move Out of Your Checkbook

October Financial Fitness Challenge�Tune In to Spending Triggers

Raising Grandchildren Gives Rise to Financial Challenges

September Financial Fitness Challenge�Stay Off the Budget Trouble D List

Generations Live Together to Save Costs, Gain Quality of Life

August Financial Fitness Challenge�Three (More) Reasons to Use Direct Deposit

Preserve Your Family's Paper Trail: Replace and Safeguard Personal Records

Financing a Face-Lift May Have Wrinkles

Appliance Rebates: Save Now and Later

What Was Grandma's Password?

February Financial Fitness Challenge�Readers Share Recession Lessons

When to Wed With a Wedding Planner

January Financial Fitness Challenge�The Great Recession is a Teacher

December Financial Fitness Challenge�Get Ready to Change

Smart Spending Puts Holiday Shoppers in Control of Cart

November Financial Fitness Challenge�Be Bold, Think Small

Tough Times Series: Beating the Odds: Protect Assets From a Gambling Problem

October Financial Fitness Challenge�Money Secrets Corrode Trust in a Marriage

Debt Settlement Sets a Costly Trap

September Financial Fitness Challenge�Overdrafts Are Telling You Something

Tough Times Series: Is There a Gold Mine Hidden in Your Jewelry Box?

May Financial Fitness Challenge�Know a Windfall From a Downfall

Sounds: What You Need to Know About Digital Radio

Tough Times Series: You Can Avoid Wage Garnishment

April Financial Fitness Challenge�"Specialists" Share Financial Expertise With Spouses

March Financial Fitness Challenge—Make Room for Baby

Tough Times Series—Speaking of the Economy ... What Do You Tell Your Kids?

Loans Among Friends and Family: Win-Win, or Sure Loss?

December Challenge�Fresh Ideas From the Editors

February Challenge�Direct Deposit is a Mighty Tool

What's Your Financial Fitness Score?

Turning Points

Being a Personal Representative When a Loved One Dies

Cope Financially During a Serious Illness

Keep Your Single-Parent Family Financially Fit

Put Your Financial House in Order Before Tying the Knot

Understand All Your Options for Dealing With Debt

Make the Most of Unexpected Good Fortune

Rebuild Your Life After a Life Partner Dies

Get a Head Start With Financial Baby Talk

Calculators

Calculator: Should I Pay Off Debt or Save

Calculator: Budget Blueprint

Calculator: Keep Your Checkbook Up-to-Date

Calculator: Do I want a Fixed or Adjustable Rate Mortgage?

Calculator: What Is My Net Worth?

Calculator: What's It Worth to Cut Back My Spending

Calculator: How Does Inflation Affect Prices?

Calculator: What Will My Monthly Mortgage Payment Be?

Videos

Talk With Your Children About Family Finances

How to Balance Your Checkbook

Investing: Dollar-Cost Averaging

Debit vs. Credit

Use Direct Deposit and Automatic Transfers to Simplify Finances

Home & Family Finance Radio

Be Bold, Think Small: Small Moves That Add Up to Big Progress When Making Financial Changes

Develop a New Year's Spending Plan

Key Money Problems for College Students & Young Gen Y-ers: How Family Can Help

The "Step-Down Principle" of Reducing Expenses

Stopping Overspending

5 Holiday Shopping Tips for Tough Times

10 Ways to Save on Health Care

Is Fear Stopping You From Making Financial Decisions?

Are You Prepared to Survive a Disaster?

Stay Off the Budget Trouble D List

Groupon: What Is It And How Does It Work?

Cut Your Top Five Costs and Save Thousands (Part 1 of 2)

Cut Your Top Five Costs and Save Thousands! (Part 2 of 2)

Financial Tips for Young Adults (Part 1 of 2)

Financial Tips for Young Adults (Part 2 of 2)

Eat Locally, Save Money

Military OneSource

Keep Your Head When Facing Job Loss

Rebates: Harder to Get, Harder to Use

Build Your Emergency Savings Fund

Couples & Money: One of the Toughest Disagreements to Negotiate

Get Financially Naked: How to Talk Money With Your Honey

Where the Jobs Are Now

30-Minute Money Solutions

The Beginner's Guide to Boosting Your Financial IQ

Using Public Transit Saves Individuals $9,242 Annually

Are You Ready for Change?

Financial Resolutions for the New Decade

Red to Black College Peer-to-Peer Financial Planning Program

Free Holiday Planner Helps Budget, Track, and Adjust Spending

Financial Planning

I Will Teach You to Be Rich

Payday Lending and Usury Laws

Technology Trends at Your Credit Union

Military Financial Institutions Help Soldiers

The New GI Bill

An Insider's Guide to Spending, Saving, and Living Wisely

What to Do If You Need Financial Counseling

Go Green: Save Money, Save the Planet

Coping With Change When Your Spouse Dies

Social Cost of Financial Illiteracy

Estate Planning for Survivors

Military Couples and Personal Finance

Prenuptial Agreements

Put Low-Cost Fresh Veggies on Your Table

Home Sharing

Consumer News

Blowin' in the windfall

H&FF Radio presents investing, financial checkup tips

Find the right fitness equipment

H&FF Radio: Save on holiday shopping, gift-giving

Women and money: Ditch the jargon, chuck the charts

H&FF Radio: Holiday tips from 'Good Morning America' contributor

Fresh saving ideas as holiday season approaches

H&FF Radio: Financial topics for military servicemembers

H&FF Radio: Financial topics for military servicemembers

Survey        Privacy Policy/Disclosures        Site Map         Contact Us       Home

© 2004 HEW Federal Credit Union. All rights reserved.
HEW Federal Credit Union is federally insured by the National Credit Union Administration.

Designed & Powered by Cambium Group, LLC