Hackers of India

Adware/Spyware

By  Saumil Shah  , Dave Cole  on 18 Oct 2005 @ Blackhat

Abstract

The Business

Timeline—how did we get into this mess? The players How their business works Legislative environment The Technology

Technical overview of different types of programs (taxonomy) Describe how the programs function How adware/spyware is installed Hijacking the system How it updates itself Proven techniques to prevent & remove Looking ahead

Market polarization, bad get worse, good get better (more white, less grey) Order from chaos Installations: Beyond the website Growing sophistication Exploiting Adware