About OIT About the OIT
Directories Directories
Connect to Network Connect to Network
Network Services Network Services
Security IT Security
Voice Services Voice Services
Cable TV Cable Television
Computing Computing
Information Resources Information Resources
Committees IT Committees
Jobs IT Jobs at UCSB
 
spacer spacer
spacer Office of Information Technology  
spacer
spacer
           
spacer
spacer
spacer view site index contact OIT staff
spacer
spacer
  OIT Home > Security > Guide > Recognizing and Avoiding Spyware
spacer spacer
 

Recognizing and Avoiding Spyware

 

How toTell If Spyware Is on Your Computer

The following symptoms may indicate that spyware is installed on your computer.
  • You are subjected to endless pop-up windows.
  • You are redirected to websites other than the one you typed into your browser.
  • New, unexpected toolbars appear in your web browser.
  • New, unexpected icons appear in the task tray at the bottom of your screen.
  • Your browser's home page has suddenly changed.
  • The search engine your browser opens when you click "search" has been changed.
  • Certain keys fail to work in your browser (e.g., the tab key doesn't work when you are moving to the next field within a form).
  • Random Windows error messages begin to appear.
  • Your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.).

How to Keep Spyware from Getting Installed on Your Computer

To avoid unintentionally installing it yourself, follow these good security practices.
  • Don't click on links within pop-up windows. Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the "X" icon in the titlebar instead of a "close" link within the window.


  • Choose "no" when asked unexpected questions. Be wary of unexpected dialog boxes asking whether you want to run a particular program or perform another type of task. Always select "no" or "cancel," or close the dialog box by clicking the "X" icon in the titlebar.


  • Be wary of free downloadable software. There are many sites that offer customized toolbars or other features that appeal to users. Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.


  • Don't follow email links claiming to offer anti-spyware software. Like email viruses, these links may serve the opposite purpose and actually install the spyware they claim to be eliminating.

As an additional good security practice, especially if you are concerned that you might have spyware on your machine and want to minimize the impact, consider taking the following action.

  • Adjust your browser preferences to limit pop-up windows and cookies. Pop-up windows are often generated by some kind of scripting or active content. Adjusting the settings within your browser to reduce or prevent scripting or active content may reduce the number of pop-up windows that appear. Some browsers offer a specific option to block or limit pop-up windows. Certain types of cookies are sometimes considered spyware because they reveal what web pages you have visited. You can adjust your privacy settings to only allow cookies for the website you are visiting (see Browsing Safely: Understanding Active Content and Cookies for more information).

How to Remove Spyware

  • Run a full scan on your computer with your anti-virus software. Some anti-virus software will find and remove spyware, but it may not find the spyware when it is monitoring your computer in real time. Set your anti-virus software to prompt you to run a full scan periodically (see Understanding Anti-Virus Software for more information).


  • Run a legitimate product specifically designed to remove spyware. -Many vendors offer products that will scan your computer for spyware and remove any spyware software. Popular products include LavaSoft's Adaware, Webroot's SpySweeper, PestPatrol, and Spybot Search and Destroy.

Note: The content above was adapted from US-CERT Cyber Security Tip ST04-16 (Copyright 2004 Carnegie Mellon University).

Related Links

Back to Guide Index

ETA

  spacer
spacer University of California Santa Barbara Home Page
  Copyright 2003-2017 The Regents of the University of California, All Rights Reserved
Web contactTerms of UseAccessibility
Last modified: 1/3/2011
  spacer