When the fiction is based on reality
Since the Matrix movie conquered the box office, no one could imagine that a fictional movie could recreate what happens in real life inside computers, when a virus or malicious program penetrates a computer to conquer it.
Much of the plot of this film is based on viruses, which since 1959, in the form of games like Corewar, have tried to conquer virtual spaces, or wrap themselves in their structures like “creepers”, with the aim of damaging the memory of the devices.
Now viruses can be executable files that enter our computers as true “Trojan horses”, or as worms attached to programs, thus circumventing the defenses of the computers, in order to multiply exponentially, and obtain information of interest.
The first of them and whose purpose was to obtain information on the behavior of users was the innocent educational game for children called “Reader Rabbit” that in addition to inadvertently entering the computers through the installation of the game, it sent information to Mattel at real time.
But as viruses evolve, they continue to find powerful antibodies that stop their advance by eliminating them, these are known as antivirus. Today, the war continues with multiple attacks and defensive combats in the cyber-world. Let’s know what the purposes for each of them are, and how to apply the best vaccines to neutralize them.
What is spyware?
Among the malicious programs that swarm the www, that our defense systems have surely faced at some point, is the “spyware” or better known as “spybot”.
Its ability lies in hiding and making itself invisible against antivirus. After evading your defensive warriors, it hides in the depths of the computer to search, identify and extract all the data from your computer and especially the most susceptible to fraud, that is, your personal data, bank account numbers, credit cards, and the keys or passwords to use them.
Not satisfied with it, the “spyware” will snoop on your browsing habits. The work that this spy program seeks to know is not just a little, but among them, the browsing routine of the cybernaut, such as the sites that he frequents the most, surfing time, types of consumption, and habitual online shopping sites.
In short, this “spyware” seeks to get to know you and expose your data and personal documents to a third party with two purposes: the first, is to assume your identity before the financial and commercial apparatus, making it easier for them to access your accounts and commit embezzlements.
And secondly, they seek to determine your customs, tastes, as well as the way in which you prioritize consumption, an information that will be used, along with many others, as an input to create immense data reservoirs that will be used to mine and predict future forms of consumption or to find some “streak” related to possible unmet needs.
But, not everything ends there, your data can be used to establish political campaigns to define the organoleptic conditions and the arguments to present you with a candidate as the answer to your concerns.
Spyware, penetrating company walls
The theft of information to mine data is not the only objective for the spybot, but the perfect target is trying to circumvent business defenses, to enter and access the brain of the institution, stealing information such as accounts, processes, projects, products, or service improvements.
This is where the real battle for information is. Later, they annihilate the memory, leaving the company useless. Therefore, within the annual budgets, the subject of defense and digital security is a priority.
The Smartphone, another territory that spyware seeks to penetrate
Malicious programs have outdone themselves and not just settle for conquering the memory of computers. Now, they are looking to break into your mobile phones, a territory that, until now, had been impassable.
Thanks to advances in technology, cell phones evolve faster and faster, incorporating functions that allow them to become computer extensions. They even become your coach telling you what, when and how to do things. Augmented reality and home automation (known as domotica), the latter allowing you to use your mobile so you can program your home, shop your groceries, among many other functions. Cell phones have become an extension of our lifestyle.
Mobile phones are the magic key to access social networks. This virtual world where you can be part of a tribe or create a community where you set the tone. There, the computer exposure is greater, not only to know your data, but to access others, taking into account your tastes and preferences, however, it is the perfect opportunity for malicious programs to infiltrate it to steal your data.
Viruses circulate on the global computer network or the World Wide Web (www.), including spybots that, targeting a type of population or business segment, enter your system with seemingly innocent camouflages.
In most cases, we give permission when pop-up windows appear with advertisements or when they indicate that your computer has a virus, when you browse unsafe sites, or when you use contaminated USB devices. Among the best known spybot we can mention:
Adware enters your system attached to advertisements. It is clandestinely installed either on your mobile or PC and extracts all your browsing history. The infection by this spybot manifests itself with the indiscreet appearance of advertisements. Infostealers are made to compile specific information from your system, widely used to enter companies or businesses.
You will also find Ransomware and Rootkits, a Trojan-like malware that searches for sensitive information. The former seeks information to kidnap it, requesting a ransom in exchange for not spreading it or destroying it, or for the cyber-criminal to stop entering your system. The latter passes as an administrator, entering your system to extract information.
The most common are the so-called malicious cookies, the kind of spybot most used by companies to obtain information from users, you can find them when you enter a website and it asks you to install them for a better experience on the web page where you enter. It is advisable to delete them at the end of your internet browsing session.
And for those people who like games, surely you are going to run into certain programs called _Red Shell_ that are in charge of penetrating your computer to know the ways in which you play the game, with the purpose of making improvements to it.
In this article we have mentioned the most common _spybots_, but there are others that are more sophisticated and high-tech that seek to overcome the security of business networks, so we recommend that you continue on our page, delving into technological content because, at Péndulo Software, we take care of strengthening your business and personal defense systems.
For your business and personal protection, install an Antispyware
As technology advances and companies specialized in cyber-defense detect a virus, they study it and achieve accurate programs to detect and eliminate them. These programs are called antispyware, which are intended to guarantee trust and security on users’ computers.
However, in terms of cyber-security, it is necessary to consult with experts who, in addition to installing robust protection systems, provide advice and support to your company. At Péndulo Software we have the experience and knowledge for this type of technology, offering our clients the security and support of professionals trained in cybersecurity.
At Péndulo Software we are trained in the development of exclusive and innovative solutions that each of our clients requires in terms of security. We are Tech Artisans. Contact us through our phone number +1-206-741-1041, by email: email@example.com, on Instagram: @pendulosoftware or at Twitter:@pendulosoft and we will gladly give you the best advice.