Delivery Methods of Spyware and its Counter Measures: A Review
Keywords:
Spyware, Trojan horse, Ransomware, Ad-ware, Virus, Rootkit, Worm, Crypter, Active XAbstract
Malware became the major issue for the industry and everyday new samples come ups with different method and technology. Each day the anti-virus industries collects the new malware and the job of security expert becomes more challenging. This paper will briefly introduce malware types and emphasis on the spyware which is not so harmful but performing crucial part as loader for other malwares for getting into system to perform malicious and dangerous activities.
References
- https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
- http://www.pctools.com/security-news/what-is-a-rootkit-virus/
- https://usa.kaspersky.com/resource-center/threats/trojans
- https://www.avast.com/c-ransomware
- https://www.avg.com/en/signal/what-is-adware
- https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html
- https://www.kaspersky.co.in/resource-center/threats/viruses-worms
- https://blog.malwarebytes.com/threat-analysis/2015/12/malware-crypters-the-deceptive-first-layer/
- https://www.kaspersky.co.in/resource-center/threats/spyware
- https://www.cyber.nj.gov/threat-profiles/trojan-variants/pony
- http://www.spywareguide.com/spydet_599_coolwebsearch.html
- http://www.computerweekly.com/news/1280093514/Zeus-v3-Trojan-draining-more-than-675000-from-UK-bank
- https://look2me-remover.en.softonic.com/
- https://www.symantec.com/avcenter/reference/techniques.of.adware.and.spyware.pdf
- http://how-does-things-work.blogspot.in/2010/01/working-of-spyware.html
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.