FTC cracks down on spyware and PC hijacking, but not true lies

نویسنده

  • Richard H. Stern
چکیده

The US Federal Trade Commission (FTC) recently sued an Internet marketing organization to make it stop infecting consumers’ PCs with spyware. According to the FTC, Seismic Entertainment Productions developed a scheme that seized control of PCs nationwide, infected them with spyware and other malicious software, bombarded them with a barrage of pop-up advertising for Seismic’s clients, exposed the PCs to security risks, and caused them to malfunction, slow down, and, at times, crash. Seismic then offered to sell the victims an “antispyware” program to fix the computers, and stop the popups and other problems that Seismic had caused. Unauthorized downloads The FTC explained that Seismic bought banner advertising on other companies’ Web sites. The banners, on click or mouse over, redirected users’ browsers to one of Seismic’s own Web sites. At that point, Seismic used a security vulnerability in Internet Explorer (IE) to download spyware onto the users’ computers. IE’s default security setting configures browsers to generate a notification message whenever Web sites attempt to download software, giving the users the option to accept or reject the download. However, it is possible to circumvent this feature of IE. Seismic’s system permitted it to instruct IE to download the spyware directly, without notifying the user.That way, Seismic’s Web site automatically downloaded its spyware to users’ PCs without their consent or even knowledge.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spyware Resistant Web Authentication Using Virtual Machines

Password collection by keyloggers and related malware is increasing at an alarming rate. We investigate client-only defenses and methods that require server-side assistance. Password hashing and password injection, in which passwords are isolated from spyware, provide protection against phishing, commonpassword attacks, and spyware on the client platform. To protect against network sniffing and...

متن کامل

Methods and Effects of Spyware Response to FTC Call for Comments

3. I have served as an expert in multiple cases about adware and spyware. I prepared written and oral testimony on behalf of the plaintiffs in Wells Fargo & Co. and Quicken Loans, Inc. v. WhenU.com, Inc., 293 F.Supp.2d 734, E.D.Mich. 2003. I gave a deposition and was prepared to testify as an expert on behalf of the plaintiffs in Washingtonpost.Newsweek Interactive Co. LLC, et al. v. the Gator ...

متن کامل

Wonderful Thing

W ith the increased dependence on networks and the near ubiquitous availability of the Internet, there is a new paradigm in place for the proliferation of spyware, viruses, and other malware. In fact, much attention has been given to spyware in popular literature with reports from multiple sources indicating that spyware has perhaps reached 90% home user PCs [2]. There is reason to believe this...

متن کامل

Quercetin protects PC-12 cells against hypoxia injury by down-regulation of miR-122

Objective(s): Impairment of nerve cells of brain induced by hypoxia results in energy-deprivation and dysfunction, which accompanies with neurons apoptosis. Improving function of nerve cells is important for treating cerebral anoxia. This study aimed to investigate the role of Quercetin (Quer) in hypoxia-induced injury of pheochromocytoma (PC-12) cells. Materials and Methods: PC-12 cells were c...

متن کامل

Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management

Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensure the spyware will be instantiated when the system starts. Users may willingly install free versions of software containing spyware as an alternative to paying for it. Traditional anti-virus techniques are less effecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Micro

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2005