برامج تجسس

برامج التجسس Spyware، هي نوع من البرمجيات الخبيثة التي تحمل على أجهزة الحاسوب لتجمع بعض المعلومات عن المستخدمين بدون علمهم. وتكون برامج التجسس مخفية عن المستخدم، حيث يتم تثبيتها سرا على الحاسوب الشخصي، وقد يجد صعوبة في حذفها. في بعض الأحيان، بعض أنواع برامج التجسس مثل راصد لوحة المفاتيح Keylogger يقوم بتحمليها بواسطة مالك الحاسوب العام في بعض المؤسسات والشركات بغرض مراقبة المستخدمين الآخرين.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

التاريخ والتطوير

مقارنة

برامج التجسس، البرمجيات الخبيثة، وبرامج التتبع

برامج التجسس، الفيروسات والدودة

طرق الإصابة

Malicious websites attempt to install spyware on readers' computers.


تأثيراتها وسلوكها

الإعلانات

"Stealware" and affiliate fraud

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

سرقة الهوية والاحتيال

إدارة الحقوق الرقمية

العلاقات الشخصية

Browser cookies

أمثلة على برامج التجسس

These common spyware programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as "Gator". Likewise, programs which are frequently installed together may be described as parts of the same spyware package, even if they function separately.

  • CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites.[1]
  • Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.[2]
  • HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.[3][4]

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Programs formerly distributed with spyware

انظر أيضا

الهوامش

  1. ^ ""CoolWebSearch". Parasite information database. Archived from the original on 2006-01-06. Retrieved 2008-09-04.
  2. ^ ""InternetOptimizer". Parasite information database. Archived from the original on 2006-01-06. Retrieved 2008-09-04.
  3. ^ CA Spyware Information Center - HuntBar
  4. ^ What is Huntbar or Search Toolbar?
  5. ^ "FTC, Washington Attorney General Sue to Halt Unfair Movieland Downloads". Federal Trade Commission. 2006-08-15.
  6. ^ Edelman, Ben (2005). "Claria's Misleading Installation Methods - Dope Wars". Retrieved July 27, 2005.
  7. ^ أ ب Edelman, Ben (2005). "Comparison of Unwanted Software Installed by P2P Programs". Retrieved July 27, 2005.
  8. ^ Edelman, Ben (2004). "Grokster and Claria Take Licenses to New Lows, and Congress Lets Them Do It". Retrieved July 27, 2005.
  9. ^ Edelman, Ben (2004). "Claria License Agreement Is Fifty Six Pages Long". Retrieved July 27, 2005.
  10. ^ "eTrust Spyware Encyclopedia - Radlight 3 PRO". Computer Associates. Retrieved July 27, 2005.
  11. ^ ""WeatherBug". Parasite information database. Archived from the original on 2005-02-06. Retrieved 2008-09-04.
  12. ^ أ ب "Adware.WildTangent". Sunbelt Malware Research Labs. 2008-06-12. Retrieved 2008-09-04.
  13. ^ "Winpipe". Sunbelt Malware Research Labs. 2008-06-12. Retrieved 2008-09-04.
  14. ^ "How Did I Get Gator?". PC Pitstop. Retrieved July 27, 2005.
  15. ^ "eTrust Spyware Encyclopedia - FlashGet". Computer Associates. Retrieved July 27, 2005.
  16. ^ Jotti's malware scan of FlashGet 3.
  17. ^ VirusTotal scan of FlashGet 3.
  18. ^ Jotti's malware scan of FlashGet 1.96.
  19. ^ VirusTotal scan of FlashGet 1.96.
  20. ^ Some caution is required since FlashGet 3 EULA makes mention of Third Party Software, but does not name any third party producer of software. However, a scan with SpyBot Search & Destroy, performed on November 20, 2009 after installing FlashGet 3 did not show any malware on an already anti-spyware immunized system (by SpyBot and SpywareBlaster).
  21. ^ Gadgets boingboing.net, MagicJack's EULA says it will spy on you and force you into arbitration

وصلات خارجية