Special Report: Readers Take The Offensive Against Spyware - InformationWeek
04:39 PM

Special Report: Readers Take The Offensive Against Spyware

Chances are, your users' machines are swarming with spyware and adware. Learn about the most-effective strategies that InformationWeek.com readers are using to combat spyware.

Special Report Table Of Contents:
What Is Spyware And Why Should IT Care?
Readers Share Their Spyware Strategies
Strategy 1: Tools, Tools, And More Tools
Strategy 2: Developing Enterprisewide Strategies
Download Software Recommended By Our Readers

What Is Spyware And Why Should IT Care?

For starters, let's be clear: Spyware is a widespread problem. A recent report from EarthLink and Webroot found nearly one in three computers infected with spyware of some sort. An earlier survey from the same companies found the average computer touched by spyware typically is crammed with nearly 28 separate instances of it.

One of the challenges of tracking spyware and adware is that, as relatively new problems to deal with, there's little agreement on how to define the problem or the software responsible for it. It even goes by different names: spyware, adware, or malware. So let's try to bring a little clarity to the situation.

What all of these types of software have in common is that, through various means, they become installed on a user's system and perform some sort of background process. That's where things get tricky.

One type of software, so-called adware, is delivered by legitimate companies and in most cases with the express agreement of the user. Here's a typical scenario: A user downloads a piece of software such as a peer-to-peer file-trading application. The user has the option of paying for the software or, alternatively, agreeing to view pop-up ads in exchange for a free version of the software. A couple of clicks and two pieces of software--the P-to-P software AND the adware--get installed on the system.

From that point on, the adware software observes a user's Web surfing and pops up relevant ads based on those habits. The user gets free software, and advertisers get access to highly targeted ad recipients.

So everyone's happy, right? Wrong. In too many cases, users fail to read the fine print or understand precisely what they're agreeing to have downloaded to their systems. In addition, users often end up with multiple adware apps on their systems, the combination of which can cause conflicts or system slowdown.

Makers of adware--including Claria, DoubleClick, Tacoda, and WhenU--strongly contend that they're running legitimate, opt-in businesses and enabling users to get something valuable (typically a software application) in exchange for viewing a few ads. According to Jupiter Research, nearly 12% of companies that advertise online make use of some type of adware software. Whether such ad networks will ultimately survive in their current form remains to be seen (though Claria, for one, recently filed to go public).

Regardless, less-legitimate forms of spyware are likely to continue to proliferate. And they can do significant damage: Malware can change system or registry settings; "hijackers" redirect users or reset home pages to specific Web sites; "dialers" make for-fee calls to online services; Trojan horses sneak unwanted software onto your PC; "collect-ware" keeps tabs on your keystrokes and surfing habits.

The impact on IT should be obvious. While some spyware is harmless, at a minimum it can slow the performance of individual machines or frustrate users by altering the way their browsers work. Badly infected computers can cease working altogether. Most important--and problematic--managing spyware can become a full-time task for IT departments, tapping manpower and requiring the development of enterprisewide policies for reining in its spread and impact.

2 of 6
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll