Imperva uncovers Google Chrome vulnerability https://t.co/2rN7Sqgqes
News & Vacancies
Welcome to the Microtechs information portal. Here you can see the latest news and read through our current vacancies.
Is spyware spying on you? What can you do about it?
Spyware refers to any software that can be used to track or spy on your activity on a computer, mobile, tablet, or any other digital device.
Often, the term applies to malware that is installed on a computer with a malicious intent to watch a user's actions and replicate them in order to steal data or other information referring to a user. Whether it's the original hacker's intent or not, once a criminal has gained access via spyware, they are able to track anyone's actions on the computer - not just the owner's.
It's normally installed on a device without the user knowing and once it's running, it's often unlikely they'll be able to see anything different happening to their machine or mobile.
The types of information hackers are able to track include keystrokes, the websites someone has visited and their usernames and passwords for those websites, plus other sensitive data that can be used to hack into accounts and carry out other fraudulent activities.
One of the reasons spyware can be such a problem is not only can it give criminals a way into your computer and the opportunity to steal data, but it can also significantly slow down a user's computer as it tracks everything you do.
Spyware can also be used to redirect web searches to questionable websites (used for phishing, fr example), and change the settings of your computer, throttling bandwidth, memory and other processor tasks in the meantime.
There are times when software that acts like spyware is installed for reasons that are not just criminal. Organisations may install tracking software on corporate-owned hardware to track an employee’s browsing habits. Parents may also use similar software to spy on their kids’ online activity.
Different types of spyware
Spyware can take many different forms, each having their own functions and purpose. The four main types are:
Adware – this spyware tracks information about a user, sucking up data such as web searches, frequently visited websites and downloads. This information is then used to display window ads or pop-up ads.
Trojans – this is malware that appears to be legitimate but can fool users into installing it onto their computers and mobile devices. These Trojans are used to access sensitive data and files and can affect system performance.
Cookie trackers – third-party tracking cookies monitor a user’s internet activities such as web searches, history, downloads, etc for business, marketing or other reasons, depending on the motives of the hacker.
System monitors and keyloggers – this type of spyware is designed to monitor activity on a computer and record data such as keystrokes, sites visited, emails and more, often for nefarious purposes.
Dealing with spyware
If you suspect your computer has spyware on it, you can do the following.
Disconnect the computer from the internet. This may seem like an extreme move but can help prevent the spread of malware and leaking of sensitive data.
If you boot into Safe Mode on a Windows PC, this will only load the minimum number of programs and processes. It may also prevent spyware from loading. When in Safe Mode, delete temporary files. This will speed up spyware scanning. Use can also use the Disk Cleanup utility in Windows; just type Disk Cleanup into the search bar and click on this to start the process.
You can then run an anti-spyware application to remove any spyware or malware from the computer (if you have disconnected the PC from the internet, you may have to either reconnect it to download the anti-spyware app or download this app to a USB drive on another computer).
After this you can then scan the computer to find and remove any spyware or malware you suspect is on your computer, hopefully purging it and the opportunities for cyber criminals to steal your data from your computer.
Written by Clare Hopping & Rene Millman
Microtechs white label help desk and NOC
Most of our customers approach us as they are looking for a fully UK based extension of their support team. This is normally to help with covering support overnight and weekends, because they want to free up their senior staff to work on project or development duties, because of issues with staff retention or because they have already outsourced overseas and have experienced a high number of complaints.
We have a mixture of clients which use our helpdesk and monitoring services which include;
- · 1st /2nd line remote support calls
- · 24/7/365 or office hours
- · Incident management services with third party escalation
- · Proactive monitoring NOC services
- · Catch and dispatch only monitoring services
- · Fully inclusive services with an average 80% resolution rate
- · 15-minute response times
- · Fully GDPR compliant
- · Completely white labelled to your brand
- · Desktop / Network / O365 / Mac / Telecoms / Bespoke software
- · Pricing from £500 per month
We are all based from one office in Surrey and tailor our service to dovetail to your requirement.
I guess that’s why we are different to other companies. We spend time to learn, develop, sculpt and continually improve our service to your customers.
If you need overflow during the day or a whole support desk from scratch or just some monitoring services overnight, please drop us an email or give us a call.
Please contact us for further information on 01483 407417