go to home page mail to us search this site bookmark PhysOrg.com
science news  
HOME FORUM WEBLOG SEARCH ARCHIVE NEWSLETTER VIDEO

» Electronic Devices
» General Science
» Nanotechnology
» Physics
» Space and Earth science
» Technology
» News Videos
» Books directory
» Free Magazines
» South Pole Neutrino Detector Could Yield Evidences of String Theory
» Physicists Discover an Atomic Oddity
» Sonofusion Experiment Produces Results Without External Neutron Source
» Scientists develop bird flu vaccine
» Study: King Tut slain by sword in the knee
» Science news videos
» Space news videos
» Science&Nature news videos
» Science&Tech news videos
» Your Health news videos
» World Headlines news videos
Delay in Google"s courtroom duel with US government
last post by KMC
Plane on conveyor... Will it ever take off?
last post by egnorant
Interesting puzzle...
last post by nautilus
911 WTC - Evidence of an Nuclear explosion?
last post by MMC
Basic Physics
last post by adoucette
Many Worlds interpretation of QM
last post by Zephir
help
last post by seekXL
Physics Project
last post by limon
St. Elmo's fire
last post by Speedy
Billion Dollar Blunder
last post by Guest
All today's posts
» News archive
» Search
Help us make our site better!
Take PhysOrg.com Survey
The survey takes less than two minutes, there's nothing to identify you personally, and you won't receive any email or other sales pitches by participating.


GlobalSpec - The Engineering Search Engine

Spyware poses a significant threat on the Net

Spyware poses identity-theft risk (Update)
September 15, 2005

Study says spyware still stealing data
September 14, 2005

Security firms team up on spyware research
January 31, 2006

Zone Labs debuts anti-spyware firewall
October 19, 2005

The growing threat of spyware
July 27, 2005

Web co offering 'Xtreme Web Makeover' (Update)
December 19, 2005

Report: Newspaper Web sites see readership rise
November 16, 2005

Google offers free Web analytics
November 14, 2005

Space and Earth science
Expedition 12 Jets SuitSat-1, Completes Second Spacewalk
10 hours ago

Technology
US shuts down Australian-based computer piracy ring
7 hours ago

Nanotechnology
Nano World: Carbon nanotube capacitors
February 03, 2006

Physics
New design for transistors powered by single electrons
February 02, 2006

Technology
Microsoft founder too rich for tax computer to handle
February 02, 2006

Space and Earth science
The Mysterious Smell of Moondust
February 03, 2006

Nanotechnology
Study of 'Solitons' Adds Insight into Nanomagnet Behavior
February 02, 2006

Space and Earth science
NASA inspector accused of ignoring safety violations: report
February 03, 2006


    Newsletter   Print   Email   Blog It   Font size: - N +

Spyware is alive and well on the Internet. That's the overall message of a new study by University of Washington computer scientists who sampled more than 20 million Internet addresses, looking for the programs that covertly enter the computers of unwitting Web surfers to perform tasks ranging from advertising products to gathering personal information, redirecting Web browsers, or even using a victim's modem to call expensive toll numbers.


They examined sites in a set of popular Web categories, such as game sites, news sites and celebrity-oriented sites. Within these, they found that:

-- More than one in 20 executable files contained piggybacked spyware.
-- On average, one in 62 Internet domains performed drive-by download attacks – a method for forcing spyware on users who simply visit a Web site.
-- Game and celebrity Web sites appeared to pose the greatest risk for piggybacked spyware, while sites that offer pirated software topped the list for drive-by attacks.
-- The density of spyware seemed to drop from spring to fall of last year, but remained "substantial."

The research is being presented today as the opening paper for the 13th Annual Network and Distributed System Security Symposium in San Diego, Calif.

"For unsuspecting users, spyware has become the most 'popular' download on the Internet," said Hank Levy, professor and holder of the Wissner/Slivka Chair in the UW's Department of Computer Science & Engineering and one of the study's authors. "We wanted to look at it from an Internet-wide perspective – what proportion of Web sites out there are trying to infect people? If our numbers are even close to representative for Web areas frequented by users, then the spyware threat is extensive."

The consequences of a spyware infection run the gamut from annoying to catastrophic.

On the annoying end, where most spyware falls, the stealthy programs can inundate a victim with pop-up advertisements. More malicious programs steal passwords and financial information. Some types of spyware, called Trojan downloaders, can download and install other programs chosen by the attacker. In a worst-case scenario, spyware could render a victim's computer useless.

In conducting the study, the UW researchers – Levy, associate professor Steven Gribble and graduate students Alexander Moshchuk and Tanya Bragin – used a computer program called a Web crawler to scour the Internet, visiting sites to look for executable files with piggybacked spyware. The team conducted two searches, one in May and the other in October, examining more than 20 million Web address. They also did additional "crawls" of 45,000 Web addresses in eight subject categories, looking for drive-by download attacks.

In the first two crawls, the researchers found that approximately one in 20 executable files contained piggybacked spyware. While most of those were relatively benign "adware" programs, about 14 percent of the spyware contained potentially malicious functions.

In terms of drive-by download attacks, the researchers found a 93 percent reduction between May and October – a finding they say may in part be attributed to the wider adoption of anti-spyware tools, automated patch programs such as Windows Update and the recent spate of civil lawsuits brought against spyware distributors.

Despite that drop, the public should still be vigilant, they said.

"Plenty of software on the Web contains spyware, and many Web sites are infectious," Gribble said. "If your computer is unprotected, you're quite likely to encounter it."

There are a few steps that people should take to protect themselves, according to Gribble.

"First, everybody should install one or more anti-spyware programs," he said. "There are several high-quality free or commercial software packages available."

It's also important to keep those tools up-to-date so new threats can't get around one's cyber defenses.

Finally, Gribble said, people need to use common sense.

"You should download software only from reputable sources," he said. "And it's a good idea to avoid the more shady areas of the Web."

Source: University of Washington


Rate the story:
User rating: 4.1 out of 5 after 9 total votes
Would you recommend this story?
Not at all - 1 2 3 4 5 - Highly



FindWhat search:

PhysOrgForum discussions:

This is a place for us to exchange thought and is public so we can communicate. Your post will be added to PhysOrgForum.

You need to be registered at PhysOrgForum to add your comments.
If you do not have a username / password please register here !
We require registration to prevent spam at PhysOrgForum. Registration is very simple and will not take much time!

Username:
Password:
Topic Title:
Your comments:

NO HTML TAGS (they will be removed)!



Other news discussion topics:
Billion Dollar Blunder
Bill Gates
Essentiality of knowledge outsourcing through UNU
need advice about Liveoffice
Cell regeneration stimulation drugs
 
  Home Search PDA version Links Contact us Add headlines to your site
©PhysOrg.com 2003-2006   Privacy Policy