Language Selection

English French German Italian Portuguese Spanish

Fear of spyware changing online habits

Filed under
Security

Internet users worried about spyware and adware are shunning specific Web sites, avoiding file-sharing networks, even switching browsers.

Many have also stopped opening e-mail attachments without first making sure they are safe, the Pew Internet and American Life Project said in a study issued Wednesday.

"People are scaling back on some Internet activities," said Susannah Fox, the study's main author. "People are feeling less adventurous, less free to do whatever they want to do online."

Like no other Internet threat before it, spyware is getting people's attention, she said. "It maybe will bring more awareness of all kinds of security issues."

Linda Parra, a technology usability consultant at an insurance firm in Madison, Wis., is typical of the once-burned, now-vigilant crowd.

Hit twice by spyware, after which all her Internet searches went to a rogue search engine rather than Google, she bought the safer Mac computer, installed two layers of firewalls and began switching off her broadband-connected machine when she's out.

"I've become a lot more security conscious," she said, adding that she had to learn much more about how computers and the Internet work.

Parra also banned her daughters, ages 12 and 14, from game sites.

"All it takes is one click ... and you can end up going somewhere you don't want to go and getting a little bonus pack (spyware) with your freebie," she said. "I believe that's what happened."

Spyware generally refers to unwanted programs that often sneak onto computers without their owners' full knowledge. A subset called adware covers software designed to display targeted ads to subsidize another program's development.

While some computer users knowingly install spyware and adware, they often hitch rides with games, screensavers and other freebies, or exploit security flaws in Microsoft Corp.'s Windows operating systems and Internet Explorer browsers.

According to Pew, 48 percent of adult Internet users in the United States have stopped visiting specific Web sites that they fear might be harboring unwanted programs.

Twenty-five percent stopped using file-sharing software, which often comes bundled with adware. Rogue programs can also disguise themselves as songs or movie files awaiting download on file-sharing networks.

Eighteen percent of U.S. adult Internet users have started using Mozilla Firefox or another alternative to Internet Explorer.

In addition, 81 percent have become more cautious about e-mail attachments, a common way for spreading viruses, though rare for spyware or adware.

All told, 91 percent have made at least one behavioral change.

Users hit by spyware or adware were more likely than others to change their habits.

Avi Naider, president of adware company WhenU.com Inc., said he's not surprised.

Although in theory, adware is about exchanging value for value -- free software for ads -- in practice, some in the industry engage in deceptive practices and alienate consumers such that they "just stop visiting Web sites," Naider said.

Although many users have changed their online habits, they haven't necessarily fixed their machines, even as infected computers slow, often to a crawl.

Twenty percent of users who had computer problems did not attempt a fix. Among those who did, 29 percent waited a month or longer.

Two in five who tried to fix their machines did so on their own while others needed help from a friend, family member or a professional repair shop. In 20 percent of cases, the problem couldn't be fixed.

The survey also found that 43 percent of Internet users say they've been hit with spyware, adware or both. Those who report spyware were more likely to have previously engaged in "risky" behavior such as playing online games and visiting adult sites. Broadband users tend to be at greater risk.

Pew also found that three-quarters of Internet users do not always read user agreements and other disclaimers where spyware and adware are sometimes disclosed. The study was based on random telephone-based interviews with 2,001 adult Americans conducted May 4 to June 7. It has a margin of sampling error of plus or minus 2 percentage points.

By Anick Jesdanun
Associated Press

More in Tux Machines

Leftovers: Gaming

Leftovers: Software

  • Hyper Is a Terminal Emulator Built Using Web Technologies
    A lot of us use the terminal on Ubuntu, typically from an app like GNOME Terminal, Xterm or an app like Guake. But did you know that there’s an JS/HTML/CSS Terminal? It’s called Hyper (formerly/also known as HyperTerm, though it has no relation to the Windows terminal of the same/similar name) and, usefulness aside, it’s certainl a novel proof-of-concept. “The goal of the project,” according to the official website, “is to create a beautiful and extensible experience for command-line interface users, built on open web standards.”
  • Little Kids Having Fun With “Terminal Train” In Ubuntu Linux
    Linux is often stereotyped as the operating system for tech savvy users and developers. However, there are some fun Linux commands that one can use in spare time. A small utility named sl can be installed in Linux to play with the Terminal Train.
  • This Cool 8-Bit Desktop Wallpaper Changes Throughout The Day
    Do you want a dynamic desktop wallpaper that changes throughout the day and looks like the sort of environment you’d be able to catchPokemon in? If so, check out Bit Day wallpapers. Created by Redditor user ~BloodyMarvelous, Bit Day is a collection of 12 high-resolution pixel art wallpapers.
  • This Script Sets Wallpapers from Imgur As Your Desktop Background
    Pyckground is a simple python script that can fetch a new desktop background on the Cinnamon desktop from any Imgur gallery you want. I came across it while doing a bit of background on the Bit Day wallpaper pack, and though it was nifty enough to be of use to some of you. So how does it work?
  • Productivity++
    In keeping with tradition of LTS aftermaths, the upcoming Plasma 5.9 release – the next feature release after our first Long Term Support Edition – will be packed with lots of goodies to help you get even more productive with Plasma!
  • Core Apps Hackfest 2016: report
    I spent last weekend at the Core Apps Hackfest in Berlin. The agenda was to work on GNOME’s core applications: Documents, Files, Music, Photos, Videos, Usage, etc.; to raise their overall standard and to make them push beyond the limits of the framework. There were 19 of us and among us we covered a wide range of modules and areas of expertise. I spent most of my time on the plumbing necessary for Documents and Photos to use GtkFlowBox and GtkListBox. The innards of Photos had already been overhauled to reduce its dependency on GtkTreeModel. Going into the hackfest we were sorely lacking a widget that had all the bells and whistles we need — the idiomatic GNOME 3 selection mode, and seamlessly switching between a list and grid view. So, this is where I decided to focus my energy. As a result, we now have a work-in-progress GdMainBox widget in libgd to replace the old GtkIconView/GtkTreeView-based GdMainView.

Leftovers: OSS and Sharing

  • Did Amazon Just Kill Open Source?
    Back in the days, we used to focus on creating modular architectures. We had standard wire protocols like NFS, RPC, etc. and standard API layers like BSD, POSIX, etc. Those were fun days. You could buy products from different vendors, they actually worked well together and were interchangeable. There were always open source implementations of the standard, but people could also build commercial variations to extend functionality or durability. The most successful open source project is Linux. We tend to forget it has very strict APIs and layers. New kernel implementations must often be backed by official standards (USB, SCSI…). Open source and commercial implementations live happily side by side in Linux. If we contrast Linux with the state of open source today, we see so many implementations which overlap. Take the big data eco-systems as an example: in most cases there are no standard APIs, or layers, not to mention standard wire protocols. Projects are not interchangeable, causing a much worse lock-in than when using commercial products which conform to a common standard.
  • Firebird 3 by default in LibreOffice 5.4 (Base)
    Lots of missing features & big bugs were fixed recently . All of the blockers that were initially mentioned on tracking bug are now fixed.
  • Linux & Open Source News Of The Week — Comma.ai, Patches For Firefox and Tor, And OSS-Fuzz
  • Open Source Malaria helps students with proof of concept toxoplasmosis pill
    A team of Australian student researchers at Sydney Grammar School has managed to recreate the formula for Daraprim, the drug made (in)famous by the actions of Turing Pharmaceuticals last year when it increased the price substantially per pill. According to Futurism, the undertaking was helped along by an, “online research-sharing platform called Open Source Malaria [OSM], which aims to use publicly available drugs and medical techniques to treat malaria.” The students’ pill passed a battery of tests for purity, and ultimately cost $2 using different, more readily available components. It shows the potential of the platform, which has said elsewhere there is, “enormous potential to crowdsource new potential medicines efficiently.” Although Daraprim is already around, that it could be synthesized relatively easily without the same materials as usual is a good sign for OSM.
  • Growing the Duke University eNable chapter
    We started the Duke University eNable chapter with the simple mission of providing amputees in the Durham area of North Carolina with alternative prostheses, free of cost. Our chapter is a completely student-run organization that aims to connect amputees with 3D printed prosthetic devices. We are partnered with the Enable Community Foundation (ECF), a non-profit prosthetics organization that works with prosthetists to design and fit 3D printed prosthetic devices on amputees who are in underserved communities. As an official ECF University Chapter, we represent the organization in recipient outreach, and utilize their open sourced designs for prosthetic devices.

today's howtos