11/22/2005

Spyware Bill passed by Senate Committee

Learn to Remove Spyware With Free and Available Programs! Click me
A U.S. Senate committee has approved a bill that would outlaw the practice of remotely installing software that collects a computer users’ personal information without consent.

The Software Principles Yielding Better Levels of Consumer Knowledge Act would also outlaw the installation of adware programs without a computer user’s permission. Spyblock, sponsored by Senator Conrad Burns, a Montana Republican, would prohibit hackers from remotely taking over a computer and prohibit programs that hijack Web browsers

In addition the U.S. Senate Judiciary Committee approved on Thursday a bill that would require companies with data breaches to notify affected customers and would set up rules for the U.S. government’s use of private databases.

The Personal Data Privacy and Security Act, sponsored by committee Chairman Arlen Specter, a Pennsylvania Republican, and Senator Patrick Leahy, a Vermont Democrat, would also require data brokers to allow U.S. residents to correct their personal data, and it would require businesses holding the personal data of more than 10,000 U.S. residents to conduct risk assessments and implement data-protection policies.

Businesses not implementing the security plans could be fined up to US$35,000 a day.

11/21/2005

Spyware: Its Hidden Agenda

Learn to Remove Spyware With Free and Available Programs! Click me

November 12, 2005 -- We have all heard about spyware. Spyware is regularly featured in various news media and is a topic of much discussion in computer circles. The reason for this is the constant bombardment of spyware related material, that infiltrates computer systems. Spyware has a hidden agenda.

The Internet is loaded with information on every conceivable subject. There are ebooks, software, photos, file sharing and a host of giveaways that are very enticing to computer users, especially those that have a hobby or special interest. The desire to take advantage of the vast internet resources and to download files or to share files, photos, software etc. is growing at a very fast pace. Advertisers and marketing specialists are aware of this trend and they focus their attention on providing online surfers with software, ebooks and other giveaways that cater to individual interests. These “Giveaways” are the “Passage way” used by promotional companies to get entry into the internet users computer.

Spyware “Piggybacks” on very innocent and legitimate looking file downloads. It can be likened to a passport that allows a person to enter a country, only in this case it is to enter an individuals computer, without the user fully understanding the implications of such file downloads.

Spyware introduced into a computer system loves the environment. It has gained entrance into the system and feeds on the information the system contains. Its prying eyes feasts on the “Goings on” and learns all of the habits, interests, chats, discussions and shares this information with its buddies on the other side of the internet line. Who are its buddies? You guessed right, it is the promotional companies. This approach enables promotional companies to become fully aware of peoples interests, needs and desires. In turn, they will direct their wares to the individuals whose system was infiltrated by spyware.

People treasure privacy, be it at home or on the internet. It is easy to enjoy privacy at home, it is not as easy to enjoy computer privacy. A Loss of privacy on the internet can bring about numerous hardships, financial losses and of course can lead to identity theft.

People linked to the internet need to install spyware removal software. Spyware software will enable a scan, of all the files on ones computer and allow for the removal, of unwanted files, that pose a risk to privacy.

Senate committee passes spyware bill

Learn to Remove Spyware With Free and Available Programs! Click me


Spyblock Act would also outlaw installation of adware without a user's permission

By Grant Gross, IDG News Service
November 18, 2005


WASHINGTON - A U.S. Senate committee has approved a bill that would outlaw the practice of remotely installing software that collects a computer users' personal information without consent.

In addition to prohibiting spyware, the Spyblock (Software Principles Yielding Better Levels of Consumer Knowledge) Act would also outlaw the installation of adware programs without a computer user's permission. The Senate Commerce, Science and Transportation Committee approved the bill Thursday.

Spyblock, sponsored by Senator Conrad Burns, a Montana Republican, would prohibit hackers from remotely taking over a computer and prohibit programs that hijack Web browsers. The bill would protect antispyware software vendors from being sued by companies whose software they block.

"I am pleased that a majority of the committee agrees with me that Congress must act to protect the right of consumers to know when potentially dangerous Spyware is being downloaded onto their computers," Burns said in a statement. "As the Spyblock Act moves forward to the Senate floor, I hope we can continue making it a stronger bill by making sure the private sector has all the right tools it needs to successfully slow the spread of malicious spyware."

The Spyblock Act now moves to the full Senate for consideration. The U.S. House of Representatives passed two antispyware bills in October 2004 and again in May, but the Senate has so far failed to act on spyware legislation.

The Spyblock Act would allow the U.S. Federal Trade Commission and state attorneys general to seek civil penalties against spyware and adware distributors.


McAfee unveils anti-spyware wares

Learn to Remove Spyware With Free and Available Programs! Click me

By Ellen Messmer, Network World, 11/21/05

McAfee last week unveiled anti-spyware software for business customers to block and eliminate adware, dialers, keyloggers, cookies and remote-control programs, such as bots.

McAfee AntiSpyware Enterprise can be managed via the same console used to manage McAfee's anti-virus products, the ePolicy Orchestrator for larger companies, or the Protection Pilot for small offices. McAfee also announced its managed online anti-virus scanning service has added spyware detection and will be offered under a new name, McAfee Managed VirusScan plus AntiSpyware.

The McAfee AntiSpyware Enterprise software and the online anti-virus service use the same spyware-detection signatures, says McAfee marketing manager Lillian Wu.

She says McAfee is charging 35% more for the additional spyware detection that's now part of the online anti-virus service, making the total cost $36 per user per year. However, the additional anti-spyware functionality will be provided without additional cost to existing VirusScan customers until their VirusScan contract expires and is set for renewal.

The only competitor offering the same type of combined anti-virus and anti-spyware scanning service is Panda Software. Many security software vendors, such as Computer Associates and Symantec, offer anti-spyware products.

McAfee AntiSpyware Enterprise software starts at $20 per seat for as many as 25 nodes but drops to $6 per seat for 10,000 or more.

All contents copyright 1995-2005 Network World, Inc. http://www.networkworld.com

11/18/2005

Web giants crack down on spyware

Learn to Remove Spyware With Free and Available Programs! Click me

A handful of internet firms have joined together to reduce the spread of adware and spyware which is distributed by 'piggybacking' on legitimate downloads.

The companies, including Yahoo, AOL and Verizon, have agreed to establish industry standards for monitoring and enforcing good behaviour on websites which offer downloadable software.

A new code of practice, maintained by independent online body TRUSTe, will ensure that sites offering downloads state clearly whether the software contains adware or trackware.

All co-operating sites will be required to inform the user of the types of advertising that will be displayed, and whether any personal information will be tracked and collected.

Sites will also have to warn users of any changes to PC settings, and users will need to opt in before the download can begin. Publishers must offer an easy uninstall procedure with clear instructions.

The participating companies are due to publish a 'white list' of certified applications. TRUSTe said that the programme will launch in beta form early next year.

Earlier anti-spyware bills have stalled in Congress


After several similar efforts in the last two years, Congress is taking another stab at countering the spyware that infests desktop computers around the country. Yesterday, the Senate Committee on Commerce, Science, and Transportation reported the Spy Block Act to the full Senate by unanimous consent.

The bipartisan bill would ban software that conceals its installation and operation, tricks users into installing it, can't be uninstalled through normal uninstall procedures, tracks behavior or collects information without the user's knowledge, or thwarts user control. Congress says the bill would target adware as well as spyware.

"I am pleased that the committee today supported efforts to address the growing problem of invasive spyware that is infecting millions of computers across the nation," said Sen. Ted Stevens, R-Alaska, in a statement.

In an effort to assuage fears that the bill would also target legitimate software, it limits liability for telecommunications companies, Internet service providers, and specific types of software suppliers. However, it could put the real offenders in jail for up to five years.

Passage of the legislation follows two similar efforts that died last year after the Senate received them from the House of Representatives and the Federal Trade Commission warned Congress that current fraud laws made spyware legislation unnecessary. The Senate also sat on a similar measure earlier this year.

Data shows spyware becoming 'global pandemic'

Learn to Remove Spyware With Free and Available Programs! Click me


By Eric B. Parizo, News Editor
16 Nov 2005 | SearchSecurity.com

No matter where you are or how big you are, if your organization hasn't been affected by spyware yet, it's only a matter of time.

That's the message from Boulder, Colo.-based Webroot Software Inc. According to the antispyware vendor's quarterly "State of Spyware" report released this week, the spread of secret nefarious and malicious programs has quickly become a "global pandemic."

Webroot CEO C. David Moll said spyware is no longer confined to a handful countries or a single continent. In fact, it's everywhere.

Moll said his customers have reported spyware problems in 223 countries. What's more, unlike spam, which he said took nearly two years to plague users around the world, spyware has become the scourge of Internet users everywhere in just a matter of months.

Whenever, wherever

As further illustration, Webroot's report finds the trio of countries with the highest spyware infection rates represent three different corners of the globe. This is based on an survey of 63 companies representing 351,149 PCs and laptops connected to the Internet, according to study details.

The U.S. was found to have the highest national spyware infection rate, with an average of 24.4 spyware programs per scanned PCs.

Ranking second was the U.K. with an average infection rate of 18.7 programs, with Thailand rounding out the top three with 18.1 programs.

What do those nations have in common? Moll said each has a vast broadband network, and a sizable portion of its population using it.

"A broadband user does more things like file sharing and spends more time online, and tends to be a more sophisticated user," Moll said, adding that it's those uses who are more likely to experiment with peer-to-peer programs, surf to new Web sites and download shareware, all of which drive spyware proliferation.

The more things change…

Webroot's survey was compiled using data from customers of its Web-based antispyware application, and from a poll of corporate IT professionals in charge of security compliance.

Of those who responded to the poll, more than two-thirds categorized spyware as a serious threat to their organizations, and 97% said they worry that spyware may access employee data, pilfer intellectual property or access company or customer information.

The vendor issued a similar report last quarter, and Moll said overall spyware awareness has increased from quarter to quarter, but tragically that hasn't equated to progress in combating its proliferation.

"So many states are taking action, and Federal bills are in consideration, so when you take all of that together, you might expect to see some [progress]," Moll said. "Frankly, we don't."

The 80% infection rate is roughly the same as when Webroot began its quarterly research effort, Moll said, and the most serious kinds of spyware programs -- Trojans and keystroke loggers -- continue to grow.

Key to the highway

Another significant finding of Webroot's report is that keystroke loggers -- programs that ((Content component not found.)) monitor and often transmit data on how a keyboard is used -- are posing a bigger threat than ever before.

Moll said keystroke loggers are becoming increasingly sophisticated. They are emerging as the biggest threats to consumer privacy and data security on the Internet, and may soon surpass phishing as the most widely exploited method of electronic identity theft.

"Phishing has served as the traditional model for getting somebody to a Web site to steal their information," Moll said. "It's been failing more often as people become more educated about it, but to get a piece of software on a user's machine gives the same opportunity [to steal] usernames, account numbers, etc."

It poses an even greater threat in the corporate environment, Moll added, because the stakes are much higher when comparing an individual's finances to those of billion-dollar enterprises.

"What happens when a keystroke logger is sitting on a payroll PC, or account payable, or on a trading desk?" Moll asked. "When huge amounts of money are being transferred, it represents a grave threat to corporations, as well as in regard to corporate espionage and intellectual property theft."

Lessons learned

Fortunately, Moll said, corporate spyware awareness continues to rise, and that may be the difference in preventing a major spyware-related security breach or data theft.

He also said the work of the Anti-Spyware Coalition, a coalition of more than two dozen technology vendors and interest groups, is helping to more clearly define spyware and aid antispyware vendors in searching for and removing it.

However, there is still work to be done. Moll said the industry must realize that antispyware software is now just as essential as antivirus software. Those that don't understand that, he said, are putting themselves at risk.

"Don't hope that you're going to browse to a new Web site and be OK," Moll said. "It only takes one mistyped URL to bring spyware down in spades."

11/17/2005

Major download sites get tough on spyware

Learn to Remove Spyware With Free and Available Programs! Click me


Some of the largest names on the Internet have come together to crack down on the spread of adware and spyware through piggybacking hidden software along with legitimate downloads.

The companies, which include Yahoo!, AOL, Verizon and CNet Networks - which operates the large downloads.com software library - have agreed to establish industry standards for monitoring and enforcing good behaviour on sites which offer downloadable software.

A new code of practice maintained by the Truste independent online trust body will mean that sites that offer downloads will have to state clearly if the download contains adware or trackware. In addition, the site must inform the user of the types of advertising that will be displayed, any personal information that will be tracked and collected. The site should also warn of any change in the user settings. Finally, the user must have to opt in with their permission before the download can begin.

Once the software is installed, the publisher must offer an easy uninstall procedure with clear instructions. Any ads have to be labelled with the name of the adware program. Any publisher who wants to take part in the programme will have to maintain separate advertising inventory for users of certified applications.

It is thought unlikely that the spyware companies are going to be leaping for joy at these new guidelines. To enforce compliance, the major portals involved in the Trusted Download Program will publish a 'whitelist' of certified applications. Any application that is not on the whitelist risks being ..errr..blacklisted by the portals that will severely restrict their reach.

However, many spyware applications will not go through legitimate high profile sources as they propagate p2p networks, warez and pornography sites. The portals can claim they have banished spyware from their own servers even if it continues to flourish elsewhere.

Truste says the programme is expected to launch in beta form early in the New Year.

Songs came with spyware: Sony BMG recalls Trojan horse CDs

Learn to Remove Spyware With Free and Available Programs! Click me

By Heather V. Eng
Thursday, November 17, 2005 - Updated: 12:18 PM EST

Hey Neil Diamond fans – Sony BMG wants his new CD back.
The music giant has announced plans to recall an estimated 5 million CDs outfitted with controversial copy-protection software that could expose computers to harm.
The suspect CDs employ XCP copy-protection software, developed for Sony BMG by British vendor First4Internet. The software installs a “rootkit,” which acts like a Trojan horse virus by hiding its existence from users and making computers vulnerable to hacker activity and system crashes.
Approximately 50 Sony BMG titles by 20 artists including Celine Dion, Sarah McLachlan and Ricky Martin contain XCP software. Last week the company suspended the manufacture of these CDs. Yesterday Sony BMG announced it will institute a mail-in program to allow consumers to exchange CDs with XCP software for CDs without copy-protection. Sony BMG also asked retailers to remove the CDs from their shelves.
“We deeply regret any inconvenience this may cause our consumers and we are committed to making this situation right,” Sony BMG said in a statement.
The rootkit installs itself when a user loads a CD with XCP software onto a computer and merely agrees to the terms of use. The software, which limits how many times the CD can be copied, also works as spyware, which has the ability to let Sony BMG track a computer’s use. Far worse, it could allow malicious program writers to infect a computer with viruses. Only computers running Windows operating systems are affected. Apple computers are immune. Consumers who listen to the CD only on stereos or portable CD players are also safe.
“The one (copy protection method) Sony BMG chose turned out to be particularly invasive,” said Ted Schadler, an analyst for Forrester Research. “It’s going to be very, very challenging for any label to recover from this. Sony has kind of poisoned the well for other music labels trying to copy protect their CDs.”
Sony BMG continues to leave consumers looking to rid their computer of the rootkit in limbo. Monday the company suspended the online distribution of an uninstalling tool to remove the rootkit. According to the Sony BMG Web site, a new uninstall tool will be made available soon. It may arrive in time to prevent damage to your computer, but not to Sony BMG’s reputation.
Pop goes the spyware
CD buyer beware!
To identify a Sony BMG CD with First4Internet XCP copy-protection, check the back of the CD packaging. If the customer support Web site is “http://cp.sonybmg.com/xcp” then the CD has it. Do not put it in your PC.
Though Sony BMG was unable to provide a comprehensive list of CDs with the XCP protection, these CDs have been identified as having the software:
  • Neil Diamond, “12 Songs”
  • Celine Dion, “On Ne Change Pas”
  • Ricky Martin, “Life”
  • Van Zant, “Get Right with the Man”
  • Sarah McLachlan, “Bloom Remix Album”
  • Natasha Bedingfield, “Unwritten”
  • Burt Bacharach, “At This Time”
  • Chris Botti, “To Love Again”
  • Cyndi Lauper, “The Body Acoustic”
  • Pete Seeger, “The Essential Pete Seeger”
  • All Star-Tribute to Luther Vandross, “So Amazing”
  • Trey Anastasio, “Shine”
  • The Bad Plus, “Suspicious Activity”
  • Spying on Spyware

    Learn to Remove Spyware With Free and Available Programs! Click me

    Analysts say spyware writers are gaining the upper hand over computer security experts.

    By Lamont Wood

    With an estimated 72 percent of PCs in homes now bogged down by an average 24 spyware infections each, and with the number of websites disseminating spyware skyrocketing, the question arises: who's winning the war on spyware?

    Indeed, the latest "State of Spyware" quarterly report released by Webroot Software, a security software firm in Boulder, CO (from which the figures above were taken) contains chilling news: the bad guys are now bringing up their big guns, so-called "rootkit" technology and "polymorphic" code. Both are being used more and more extensively in spyware, and most old-line anti-virus programs are helpless against them, claims Richard Stiennon, Webroot's vice president of threat research.

    Spyware programs often exploit browser security holes to download themselves onto a user's hard drive, where they surreptitiously send back information about the user's Web-browsing habits. With rootkit technology, these files can make themselves invisible to the host computer's operating system, allowing spyware or virus files to take up residence deep within the machine and operate undetected.

    Anti-virus programs that scan hard drives for malicious code aren't much help. Rootkit files "know when they are being scanned and stop doing anything," says industry analyst Rob Enderle, head of the Enderle Group in San Jose, CA. "They are incredibly dangerous, and operate at a level where the current generation of anti-malware products cannot operate."

    The danger posed by rootkit technology was brought to the fore this month when a security expert discovered that Sony BMG Music Entertainment had placed rootkit files on as many as 20 popular music CDs, to keep them from being pirated by PC users. Sony has apologized and offered a fix -- but three examples of malicious software have already been found that took advantage of the rootkit files left on PCs by the Sony CDs, and several class action lawsuits are in the works.

    Another virulent spyware tool, polymorphic software, uses multiple files with random names, so that each infection is unique, requiring a unique disinfectant. Your computer's operating system might spot one, but removing it manually won't solve the problem, since the infecting files monitor each other, and if one is removed the others summon a replacement from the Web.

    "You have to understand which file to get rid of first -- it's like grabbing the tail of a snake," Stiennon says. But the main problem is that scanning for the dozen or so infection routes used by most older viruses no longer works, he says.

    The war is still a long way from over, though, says Craig Schmugar, a virus research manager at McAfee Inc., the noted security software vendor in Santa Clara, CA. Both rootkits and polymorphic code have been around for several years, he says, and there are counter-measures that can be marshaled against them.

    "Do the bad guys have an A-bomb? There has been speculation about that for years," Schmugar says. "There have been flare-ups, and there have been zero-day attacks [that is, malicious code using a trick unknown to the software vendors until the day of the attack], but most have been mitigated by good security policies and procedures. Then it becomes a race to implement the anti-technology."

    But today there's a new factor changing the way viruses are created and delivered: money.

    "Several years ago one of the ways we received sample viruses was directly from the authors, who wanted their five minutes of fame," says Schmugar. "It might come from an anonymous address, or from someone who says they had 'found' it. There are still some of those, but now money is the driving factor. They get advertising money from affiliate programs, so it behooves them to conceal their installation as long as they can."

    In other words, lone, anti-social hackers have turned into an underground of socially aware advertisers, according to Schmugar, seeking to turn the world's PCs into little zombie billboards that can spring to life at the spyware writer's request. "Botmasters" have also arisen, he says, who control multiple infected computers by passing commands to them through Internet Relay Chat channels. They can test their "bot" spyware against multiple anti-virus programs until it proves it can survive, and then download it to the other machines they control.

    In fact, last week federal agents arrested a man in California for allegedly controlling a vast network of 400,000 infected PCs. He supposedly rented them out to spammers or people who wanted to launch denial-of-service attacks (which flood a website with traffic and make is unusable), asking as little as 20 cents per infected machine. Now he faces federal prison, because some of those machines belonged to the U.S. Navy.

    While viruses used to be circulated as e-mail attachments, today they are disseminated from websites that users are tricked into visiting. The sites cannot be traced because they're set up by infected bots, at arms-length from the botmaster, Schmugar explains.

    Although increasingly many advertisers don't want to be associated with spyware, that backlash won't put an end to these electronic invasions. There are always other advertisers, typically pornographers, who don't care, says Schmugar.

    But there is also hope. For instance, viruses based on Microsoft Word macro files and Visual Basic scripts are essentially extinct, Schmugar adds.

    Enderle, however, believes that the situation is already unmanageable. "With the Internet a virus can spread in hours, and it takes 24 hours to make a patch," says Enderle. "What we need is a new architecture."

    Indeed, Enderle says he is looking forward to the release of Vista, the next upgrade of Microsoft Windows, expected around August 2006. According to him, it eliminates the most commonly exploited vulnerabilities of Windows.

    Until then, the only sure remedy for an infected PC is to erase the hard drive and reload it with its original, pristine operating system and software. "Probably, within the next year, every family in the country will have to do that at least once," Enderle says.

    Opera goes the AJAX way

    Learn to Remove Spyware With Free and Available Programs! Click me

    By Sam Varghese
    November 17, 2005 - 3:16PM

    Web browser maker Opera has released a beta version of a software development kit for developing and running web applications on mobile phones.

    The Opera Platform allows developers to create applications based on web technologies such as HTML, Cascading Style Sheets and JavScript.

    Along with the XMLHttpRequest function, these technologies are popularly known as AJAX.

    The XMLHttpRequest can permit dynamic updates of a page without reloading the whole page or using software plugins. Many websites use it for responsive and dynamic web applications.

    Services such as Google's Map search and Amazon's A9 search use AJAX.

    The development kit also helps developers to adapt existing applications for mobile paltforms.

    Opera has browser versions for all mobile phones. It also makes a browser for use on PCs and Macs.

    Anti-spyware products

    Anti-virus software maker McAfee has announced two new anti-spyware products for businesses - AntiSpyware Enterprise and Managed VirusScan plus AntiSpyware.

    The former is a stand-alone anti-spyware solution for medium to large businesses while the latter is a subscription-based service for small businesses, the company said in a statement today.

    AntiSpyware Enterprise can identify and eliminate spyware, adware, diallers, keyloggers, cookies and remote-control programs before they actually install and fully compromise systems.

    Managed VirusScan plus AntiSpyware can detect and blocks unwanted spyware and protect users from compromised data or loss of network bandwidth.

    11/16/2005

    Web Firms Take Stand Against Spyware

    Learn to Remove Spyware With Free and Available Programs! Click me

    A coalition of major Internet companies today will announce a plan to weed out advertisers who infect computers with unwanted code that spies on users' activities or generates nuisance advertising. The five companies -- America Online Inc., Yahoo Inc., Cnet Networks Inc., Verizon Communications Inc. and Computer Associates International Inc. -- said they are responding to escalating frustration among consumers about stealth computer code that can generate endless pop-up ads, monitor which Web sites people view or even capture personal data and impair computer performance.

    FTC Shuts Down Spyware Operation

    Learn to Remove Spyware With Free and Available Programs! Click me

    An operation that uses the lure of free lyric files, browser upgrades, and ring tones to download spyware and adware on consumers’ computers has been ordered to halt its illegal downloads by a U.S. District Court at the request of the Federal Trade Commission. The court also halted the deceptive downloads of an affiliate who helped spread the malicious software by offering blogs free background music. The music code downloaded by the blogs was bundled with a program that flashed warnings to consumers who visited the blog sites about the security of their computer systems. Consumers who opted to upgrade by clicking, downloaded the spyware onto their computers.

    The court has frozen the organization’s assets pending a further hearing. The FTC will seek to bar the deceptive and unfair practices permanently and require the operators to give up their ill-gotten gains.

    The FTC complaint alleges that the Web sites of the defendants and their affiliates cause “installation boxes” to pop up on consumers’ computer screens. In one variation of the scheme, the installation boxes offer a variety of “freeware,” including music files, cell phone ring tones, photographs, wallpaper, and song lyrics. In another, the boxes warn that consumers’ Internet browsers are defective, and claim to offer free browser upgrades or security patches. Consumers who download the supposed freeware or security upgrades do not receive what they are promised; instead, their computers are infected with spyware.

    The agency’s complaint alleges that the defendants’ software code tracks consumers’ Internet comings and goings; changes consumers’ preferred home page settings; inserts new toolbars onto consumers’ browsers; inserts a large side “frame”or “window” onto consumers’ browser windows that in turn displays ads; and displays pop-up ads on consumers’ computer screens, even when consumers’ Internet browsers are not activated. In addition, the agency alleges that once the spyware is loaded on consumers’ computers, it interferes with the functioning of the computer and is difficult for consumers to uninstall or remove.

    The FTC alleges the practices are unfair and deceptive and violate the FTC Act. The agency will seek a permanent ban on the practices, and redress for consumers.

    This case was brought with the invaluable assistance of the Microsoft Corporation, Webroot Software, Inc., and Google Incorporated.

    Defendants named in the FTC complaint are Enternet Media, Inc.; Conspy & Co., Inc., Lida Rohbani, also known as Linda Rohhani and Lida Hakimi; Nima Hakimi; Baback (Babak) Hakimi, also known as Bobby Rohbani and Bobby Hakimi, individually and doing business as Networld One, all based in California which used exploitative code called: “Search Miracle,” “Miracle Search,” “EM Toolbar,” “EliteBar,” and “Elite Toolbar.” The defendants do business as “Enternet Media, Inc.,” “Enternet,” “www.searchmiracle.com,” “www.c4tdownload.com,” and “www.cash4toolbar.com”. The affiliate, also charged in the complaint, is Nicholas C. Albert, doing business as Iwebtunes and www.iwebtunes.com, based in Ohio.

    The FTC has set up two ways for consumers who have had experience with these defendants to contact the FTC with any information that may be relevant to the FTC’s action. Consumers can send email to enternetmedia@ftc.gov or call 202-326-2992 to leave messages.

    The Commission vote to file the complaint was 4-0. It was filed in U.S. District Court for the Central District of California, in Los Angeles.

    Steps consumers can take to reduce their risk of spyware infection include:

    • Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads.
    • Use anti-virus software and a firewall, and keep them up-to-date.
    • Download free software only from sites you know and trust. Enticing free software downloads frequently bundle other software, including spyware.
    • Don’t click on links inside pop-up windows.
    • Don’t click on links in spam that claim to offer anti-spyware software; you may unintentionally be installing spyware.
    • Consider using anti-spyware software.

    Anti-Spyware Coalition Formed

    Learn to Remove Spyware With Free and Available Programs! Click me

    Five major Internet companies; Yahoo, America Online (AOL), Cnet Networks, Verizon Communications and Computer Associates International, have announced a program to weed out advertisers who infect computers with stealth computer code, that generates endless pop-up ads, monitors personal data and generally impairs computer performance.

    The stealth code, known as spyware, adware or trackware, is generally delivered to people's computers via e-mail, through programs that consumers download, or simply by visiting a Web site.

    The program dubbed "Trusted Download Program", aims at setting tougher criteria for makers of spyware and adware.

    The 5-member coalition plans to focus on consumer downloads of programs such as screen savers, games, file-sharing services, etc., which tend to contain spyware or adware from advertisers, who pay software providers to be included in the product downloads.

    According to the "Trusted Download Program", providers of downloadable programs will have to ensure that there is prominent notification about the spyware or adware being included, plus an explanation regarding what the code can do. Further, there must be an easy method of deleting the code, and the origin of advertising must be clearly displayed.

    Those downloadable applications that meet the necessary criteria will feature on a "white list" of certified 'safe' programs. Members of the coalition will not advertise on, or distribute programs, which do not feature on this list.

    This new system was developed in conjunction with the Federal Trade Commission (FTC), and the Center for Democracy and Technology - a digital advocacy group. The system will be overseen by Truste, a non-profit company, which provides security and privacy seals of approval to Web sites that adhere to its guidelines.

    Interestingly, Microsoft and Google are not participating in this program, though they have said that they support its goals.

    The program will not go live until the first quarter of 2006.

    If the new system proves successful, adware purveyors such as Claria, WhenU, and 180solutions are sure to suffer a big hit. On the other hand, this industry effort is far from being a surefire success, since according to reports there are many loop-holes.

    11/01/2005

    eSoft Complete Anti-Spyware Solution Launched


    eSoft, Inc., a vendor of integrated Internet security and content management solutions, today announced the availability of its newest content security service, eSoft Complete Anti-Spyware, a Spyware solution to include both multi-protocol Desktop and Gateway elements working in unison for thorough Spyware eradication.

    eSoft Complete Anti-Spyware solution consists of both Desktop and Gateway elements, which are crucial for providing effective protection against complicated Spyware threats coming from the web and via email, FTP, IM and Peer-to-Peer applications.

    "Spyware is new generation of critical threat, the likes of which we have never seen before," said Jeff Finn, eSoft's CEO. "Organizations need sophisticated technologies such as intrusion prevention, anti-virus and even URL and web content filtering to detect and stop Spyware. eSoft Complete Anti-Spyware and its multi-faceted approach for detection and mitigation fulfills those requirements."


    Spy Sweeper 4.5


    Webroot's Spy Sweeper 4.5 is the most powerful antispyware tool we've seen yet. Its Comprehensive Removal Technology attempts to remove spyware completely in a single pass, and its behavior-based Active Shields prevent the installation of new threats on the cleaned system. Fancy names aside, our testing shows that the utility really works.

    When we had Spy Sweeper attempt to clean systems infested with eleven known spyware programs and four commercial key loggers, it detected every single item, although it couldn't completely remove three items—one key logger and two spyware threats. Installed on a clean system, the utility prevented installation of all the test spyware, identifying most by name. It kept out two key loggers and partially disabled another, though it missed the fourth. Some antivirus products, notably McAfee VirusScan, have come close to this level of protection, but Spy Sweeper cleans up the traces more thoroughly.

    Rootkit techniques can hide malware from the file system; Spy Sweeper disables rootkit exploits even when they're not associated with known threats. It also cuts off communication to known spyware sites, preventing installation of malware updates. It also blocks attempts to change Internet Explorer security settings and to install ActiveX controls or Browser Helper Objects. Additionally, it prevents a wide variety of hijack attacks such as those that try to change IE's home page and other essential URLs. You can choose whether the program alerts you by opening its large main window or by displaying a small system-tray pop-up.

    After a scan, Spy Sweeper presents a clear list of found threats, with a threat-level indicator and the specific file and Registry traces of each malicious program. The utility displays a description of the selected item with an option letting you get more details online. All of this information remains available after threats are quarantined. You can restore quarantined items, protect them from future scans, or completely delete them.

    Because rootkits co-opt the file system to hide themselves, Spy Sweeper scans directly from the disk. If necessary, it can run in Windows's Safe Mode using a subset of its features. A different subset is available when running under a Limited user account. The product's Early File Remover runs before Microsoft Windows boots, to delete stubborn files. It can examine and repair infestations in all user accounts, not just the logged-in user. Yet even with all features enabled, a scan of our standard test system took just over 6 minutes. Although Spyware Doctor scanned the same system in 4 minutes, it didn't score quite as well at removing spyware.

    While not perfect, Spy Sweeper is the best antispyware tool we've tested. It effectively removes and blocks spyware, digging deep into the system to root out traces. It offers clear information about found threats and blocked attacks, and the revised user interface with its new Home tab is easy to manage. Spy Sweeper is our new Editors' Choice for antispyware.


    WEB SAFETY: Group outlines spyware risks


    Tuesday, November 1, 2005


    A coalition of anti-spyware vendors and consumer groups has published guidelines to help consumers assess products designed to combat unwanted programs that sneak onto computers.


    The Anti-Spyware Coalition released the guidelines for public comment and also updated a separate document that attempted to craft uniform definitions for "spyware" and "adware" in hopes of giving computer users more control over their machines.


    The new guidelines from the coalition assign risk levels to various practices common with spyware and adware.


    Sony rights manager implants spyware, bog claims


    Malware to defeat pirates, claim

    By Nick Farrell: Tuesday 01 November 2005, 07:48

    THE ENTERTAINMENT industry's battle against pirates is forcing its customers to install badly designed malware into their computer that is impossible to uninstall, a software has claimed.

    Mark Russinovich, Chief Software Architect and co-founder of Winternals Software, was penning a piece for his bog on Rootkits, which are hidden bits of code, when he found a bit of such code by using RootkitRevealer.

    He said that he was stunned when the software located a bit of hidden code that should not be there. After a bit of digging in his machine he found that the code was installed after he ran a Sony CD using some new Digital Rights Management software.

    The CD Get Right with the Man by the Van Zant brothers installed some Malware which prompty cloaked itself and started to use a chunk of the computer's resources. Whoever wrote it called it a Plug and Play Device Manager so that most people would think it was part of the Windows operating system. When Russinovich deleted the driver files and the Registry key references, he found the software had disabled his CD drive which took some serious programming to restore.

    "The entire experience was frustrating and irritating. Not only had Sony put software on my system that uses techniques commonly used by malware to mask its presence, the software is poorly written and provides no means for uninstall. Worse, most users that stumble across the cloaked files with a RKR scan will cripple their computer if they attempt the obvious step of deleting the cloaked files," Russinovich said. Now this is quite some allegation. As far as we know, Sony has not yet responded.