On Fri, 28 Oct 2005 17:56:32 +0300, Valdis Shkesters said: (Hmm.. usually when I reply to Valdis I'm talking to myself... ;) > As today I was preparing news for a portal on IT security, > I am informed that Anti-Spyware Coalition is finalizing spyware > definition. It is last moment to finalize with spyware, because > at the horizon already has appeared ?crimeware?. Take a look > at http://www.antiphishing.org/. I?m quoting: ?Technical subterfuge > schemes plant crimeware onto PCs to steal credentials directly, > often using Trojan keylogger spyware.? > Maybe it would be better to call Trojan horses Trojan horses? No, because they're different. Trojan horses (a) get installed under pretense of being something wanted or beneficial ("Hey, I'm a neat fun codec that lets you view these movies...") and (b) once there, gives the attacker a "back door" into the system, to do unspecified things (run commands, launch DDoS attacks, send spam, scan for other vulnerable software, upload plugins to extend the Trojan's functionality, or whatever). Spyware, on the other hand (a) *may* be installed via Trojan Horse means, but may also be forcibly inserted on a system via a software vulnerability, or added in via the above-mentioned plugin method by an already-present Trojan, and (b) is software that monitors system activity (keystrokes, screen pixmaps, etc) in an effort to acquire credentials or other sensitive information.
Attachment:
pgpQIE5u6Tj9t.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/