1 00:00:01,110 --> 00:00:08,610 Continued with types of malware you also have spyware as the name suggests its main purpose is to gather 2 00:00:08,610 --> 00:00:11,250 information and send it back to the attacker. 3 00:00:11,290 --> 00:00:18,330 Well to spy the attackers don't generally want to cause damage directly but want to compromise your 4 00:00:18,330 --> 00:00:25,830 privacy and anonymity based on some agenda that they've got spyware is intelligence gathering malware 5 00:00:26,310 --> 00:00:31,260 corporations and hacker groups create these as well as governments. 6 00:00:31,380 --> 00:00:38,070 You can see the article here of alleged U.S. government spyware from the Telegraph worth mentioning 7 00:00:38,070 --> 00:00:38,760 actually. 8 00:00:38,940 --> 00:00:42,530 Don't get too hung upon the names and classifications of the malware. 9 00:00:42,530 --> 00:00:49,170 By the way that we've gone through these are not strict taxonomies for example a rootkit can also be 10 00:00:49,170 --> 00:00:53,460 a Trojan Horse someone could call spyware virus. 11 00:00:53,460 --> 00:01:00,200 The point is just to understand the variants that exist and the possible purpose of the malware and 12 00:01:00,200 --> 00:01:07,890 other one is and where which some people consider to be a form of spyware is undesirable software. 13 00:01:07,890 --> 00:01:10,410 The forces advertise on you. 14 00:01:10,410 --> 00:01:13,950 There are millions of different variants of this. 15 00:01:14,040 --> 00:01:21,300 One of the most annoying and destructive form of adware is called Kou web search. 16 00:01:21,330 --> 00:01:27,570 You may even encounter it yourself but there's nothing cool about it at all it hijacks your default 17 00:01:27,570 --> 00:01:31,170 search engine it displays ads in the browser. 18 00:01:31,350 --> 00:01:37,770 When you click on links it sometimes takes you to places that it want you to go to instead of where 19 00:01:37,770 --> 00:01:45,450 you want to actually go to and it actively defends itself from being removed and getting rid of it. 20 00:01:45,480 --> 00:01:48,240 So it's particularly hard to shift. 21 00:01:48,240 --> 00:01:54,600 And there are many many variants of it that were affected millions of people when an ad where all malware 22 00:01:54,600 --> 00:01:59,290 takes over your browser in this way is known as browser hijacking. 23 00:01:59,490 --> 00:02:05,130 And you might hear that term more throughout the course you should always pay particular attention when 24 00:02:05,130 --> 00:02:14,580 installing software because often a software install includes optional installs such as this browser 25 00:02:14,580 --> 00:02:16,770 highjacker that we've just mentioned. 26 00:02:16,830 --> 00:02:17,950 So you can see here. 27 00:02:17,970 --> 00:02:25,250 Optional installs and what you've got here is installs that are going to be potential Ad-Aware. 28 00:02:25,650 --> 00:02:28,470 So be very careful what you agree to install. 29 00:02:28,470 --> 00:02:31,500 Always opt for the custom installation and de-select. 30 00:02:31,500 --> 00:02:38,520 Anything that is not familiar especially optional software that you never wanted to download and install 31 00:02:38,520 --> 00:02:39,830 in the first place. 32 00:02:39,900 --> 00:02:44,220 It goes without saying that you should not install software that you don't trust. 33 00:02:44,310 --> 00:02:48,680 Sometimes your device might come with and where pre-installed. 34 00:02:48,690 --> 00:02:56,400 If you're particularly on Lucky One of the worst cases was Lenovo pre-install ING's superficies adware 35 00:02:56,880 --> 00:03:03,250 that only served you add that based on what it knew about you from spying on you. 36 00:03:03,270 --> 00:03:10,970 It also included a self-signed certificate allowing your browser TLR and SSL encryption to be bypassed. 37 00:03:10,980 --> 00:03:17,580 So not very good over and over by our Never bile and over laptop again after that and all the rest of 38 00:03:17,580 --> 00:03:20,770 the things that were never done scare away. 39 00:03:20,890 --> 00:03:27,360 Skyway is a type of social engineering attack to trick a person into believing in a threat that isn't 40 00:03:27,360 --> 00:03:28,520 really real. 41 00:03:28,800 --> 00:03:36,600 So a common example is fake security software claiming that you have malware infections or something 42 00:03:36,600 --> 00:03:37,430 like that. 43 00:03:37,470 --> 00:03:42,810 Often they want you to pay something in order to fix the fake problem. 44 00:03:42,810 --> 00:03:46,050 These scams have been extremely successful. 45 00:03:46,050 --> 00:03:53,840 You can see here personal anti-virus software identifying all these fake their abilities and then is 46 00:03:53,850 --> 00:03:55,070 going to keep popping up. 47 00:03:55,080 --> 00:04:02,160 It's going to keep causing problems on the machine and then people are fooled into paying for something 48 00:04:02,160 --> 00:04:05,390 to remove the fake viruses. 49 00:04:05,520 --> 00:04:08,400 And finally we have this catch all term. 50 00:04:08,520 --> 00:04:12,330 If it's something that you might not have wanted. 51 00:04:12,450 --> 00:04:19,710 These are called potentially wanted programs or pull ups that could potentially be monitored because 52 00:04:19,770 --> 00:04:24,660 the antivirus companies and people the attempt to remove these things aren't quite sure whether you 53 00:04:24,660 --> 00:04:25,880 want them or not. 54 00:04:26,010 --> 00:04:31,350 Most often you don't want them and they're annoying the things bundled them with software. 55 00:04:31,350 --> 00:04:36,090 So again they are often bundling with the software when you install. 56 00:04:36,090 --> 00:04:42,720 So you must make sure when you install software you go to the custom install and make sure you remove 57 00:04:42,750 --> 00:04:44,370 any of these pops.