Spyware replaces virus in enterprise computers
Spyware is becoming more dangerous and sophisticated but users still cannot take the most basic measures to protect themselves. Recent statistics show that nearly 30% of US employees have become victims of these programs.
Businesses face the fact that the company's vital documents are leaking out every day.However, there are still too many organizations showing indifference or failure to practice discipline for employees.
According to Eric Chien, a researcher with Symantec security firm, cybercrime no longer likes viruses.Screen capture, key detection, behavioral analysis and character recognition are common tricks that spyware programs are applying to build detailed victim records.
"At the most basic level, they are able to find names, ages, genders, online time numbers, what information you look for, what to buy and what sites you have open," Chien said.He proved his point by listing the number of data that the most common spyware has collected.
More sophisticated, many spyware programs have been programmed to only interfere with some of the hundreds of websites that are open, for example, they can take screenshots of online retail sites that appear from "confirm"."When you click on the 'confirm' button, recently entered information such as credit card numbers, names, expiration dates, payment units, delivery addresses will immediately fall into the hands of hackers," Chien said. .The software is even pre-installed with certain bank website addresses, and spyware will only send information to cybercrime when the victim enters the site.
Chien also recommends that people should not put too much faith in the security of "https" links because some spyware can still read all information transmitted through https, even if the risk only occurs when the computer has been infected.
In fact, the only way to protect the safety of users is to ensure that spyware does not exist in the computer.Besides installing anti-spyware tools on the intranet, people should also remove unnecessary programs and don't click on pop-ups from untrusted sources.
You should read it
- The most effective antispyware tool?
- The standard of spyware is adopted
- 5 basic steps to eradicate Spyware
- Spy tricks for 2005
- How to remove Desk 365 software?
- New Alliance against spyware
- Review Three Kingdoms War Chien - General card game that 'hot' no less immersive
- Viruses transmitted from smartphones to computers appear in Vietnam
- How to check for spyware on Android devices
- Igexin advertising API brings spyware to steal user information
- Tips to detect spyware stealing information on the phone
- Completely remove Adware and Spyware on your system
Maybe you are interested
What should Iphone users do when they are attacked by spyware before warning information from Apple?
How to check for spyware on Android devices
what is spyware how can it affect mobile phone
Apple sues the maker of Pegasus spyware that specializes in stealing data on iPhones
Detect spyware that infects iMessage even if the user has not read the message
Tips to detect spyware stealing information on the phone