Language Selection

English French German Italian Portuguese Spanish

Fear of spyware changing online habits

Filed under
Security

Internet users worried about spyware and adware are shunning specific Web sites, avoiding file-sharing networks, even switching browsers.

Many have also stopped opening e-mail attachments without first making sure they are safe, the Pew Internet and American Life Project said in a study issued Wednesday.

"People are scaling back on some Internet activities," said Susannah Fox, the study's main author. "People are feeling less adventurous, less free to do whatever they want to do online."

Like no other Internet threat before it, spyware is getting people's attention, she said. "It maybe will bring more awareness of all kinds of security issues."

Linda Parra, a technology usability consultant at an insurance firm in Madison, Wis., is typical of the once-burned, now-vigilant crowd.

Hit twice by spyware, after which all her Internet searches went to a rogue search engine rather than Google, she bought the safer Mac computer, installed two layers of firewalls and began switching off her broadband-connected machine when she's out.

"I've become a lot more security conscious," she said, adding that she had to learn much more about how computers and the Internet work.

Parra also banned her daughters, ages 12 and 14, from game sites.

"All it takes is one click ... and you can end up going somewhere you don't want to go and getting a little bonus pack (spyware) with your freebie," she said. "I believe that's what happened."

Spyware generally refers to unwanted programs that often sneak onto computers without their owners' full knowledge. A subset called adware covers software designed to display targeted ads to subsidize another program's development.

While some computer users knowingly install spyware and adware, they often hitch rides with games, screensavers and other freebies, or exploit security flaws in Microsoft Corp.'s Windows operating systems and Internet Explorer browsers.

According to Pew, 48 percent of adult Internet users in the United States have stopped visiting specific Web sites that they fear might be harboring unwanted programs.

Twenty-five percent stopped using file-sharing software, which often comes bundled with adware. Rogue programs can also disguise themselves as songs or movie files awaiting download on file-sharing networks.

Eighteen percent of U.S. adult Internet users have started using Mozilla Firefox or another alternative to Internet Explorer.

In addition, 81 percent have become more cautious about e-mail attachments, a common way for spreading viruses, though rare for spyware or adware.

All told, 91 percent have made at least one behavioral change.

Users hit by spyware or adware were more likely than others to change their habits.

Avi Naider, president of adware company WhenU.com Inc., said he's not surprised.

Although in theory, adware is about exchanging value for value -- free software for ads -- in practice, some in the industry engage in deceptive practices and alienate consumers such that they "just stop visiting Web sites," Naider said.

Although many users have changed their online habits, they haven't necessarily fixed their machines, even as infected computers slow, often to a crawl.

Twenty percent of users who had computer problems did not attempt a fix. Among those who did, 29 percent waited a month or longer.

Two in five who tried to fix their machines did so on their own while others needed help from a friend, family member or a professional repair shop. In 20 percent of cases, the problem couldn't be fixed.

The survey also found that 43 percent of Internet users say they've been hit with spyware, adware or both. Those who report spyware were more likely to have previously engaged in "risky" behavior such as playing online games and visiting adult sites. Broadband users tend to be at greater risk.

Pew also found that three-quarters of Internet users do not always read user agreements and other disclaimers where spyware and adware are sometimes disclosed. The study was based on random telephone-based interviews with 2,001 adult Americans conducted May 4 to June 7. It has a margin of sampling error of plus or minus 2 percentage points.

By Anick Jesdanun
Associated Press

More in Tux Machines

Raspberry Pi based computer offers Real-Time Ethernet

Hilscher is prepping a rugged “netPI” computer that combines a Raspberry Pi 3 with its “netHAT 52-RTE” RPi add-on featuring dual Real-Time Ethernet ports. German Real-Time Ethernet experts Hilscher will soon launch a Raspberry Pi 3-based industrial computer with Real-Time Ethernet support. Hilscher has yet to formally announce the ruggedized netPI computer, but the board was demonstrated at the recent Embedded World show, and was revealed in a Mar. 27 Element14 Community blog by Shabaz. The system can be used as a Real-Time Ethernet gateway or controller, and it supports add-ons such as sensors or actuators to enable additional applications, writes Shabaz. Read more

GNOME Migration and Slideshow

  • The Linux Migration: Corporate Collaboration, Part 2
    Note that a number of folks have suggested alternative calendar applications. I’ve rejected these so far because I don’t think they’ll fit into my workflow or my environment, but they may work for others. Some of the applications I’ve seen suggested include Rainlendar, Calcurse, or KOrganizer. Some of these applications address some of the shortcomings of GNOME Calendar, but none of them address all the major issues I’ve outlined here (based on my testing thus far).
  • GNOME 3.24 Provides Users With More Pleasing Linux Desktop Experience

Dowry to Linux Foundation From NSA Ally

  • AT&T takes up membership in the Linux Foundation, furthers open source efforts
    AT&T has become a Platinum member in the Linux Foundation, a move that reflects the telco’s ongoing effort to implement open source and open networks not only in its own networks but also to drive broader industry collaboration. One example of this is AT&T's Enhanced Control, Orchestration, Management and Policy (ECOMP) architecture. In February, AT&T contributed several million lines of ECOMP code to The Linux Foundation, as well as the new Open Network Automation Platform (ONAP) Project based on production-ready code from AT&T and OPEN-O contributors.
  • AT&T Joins The Linux Foundation as a Platinum Member
  • AT&T Joins The Linux Foundation as a Platinum Member
    The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announced that AT&T has become a Platinum member. This follows news of the company’s contribution of several million lines of ECOMP code to The Linux Foundation, as well as the new Open Network Automation Platform (ONAP) Project based on production-ready code from AT&T and OPEN-O contributors.

GNU/Linux on Servers: VisionMobile Report, Cilium, Microservices, and Kubernetes

  • VisionMobile Report Lays Out Developer Salaries by Skill, Software Sector, and Location
    In 2017, that means skilled cloud and backend developers, as well as those who work in emerging technologies including Internet of Things (IoT), machine learning and augmented/virtual reality (AR/VR) can make more money -- tens or sometimes hundreds of times more -- than frontend web and mobile developers whose skills have become more commoditized. “In Western Europe, for example, the median backend developer earns 12% more than the median web developer; a machine learning developer makes 28% more,” according to the report.
  • Cilium leverages Linux kernel for advanced container networking
    Networking has always been one of the most persistent headaches when working with containers. Even Kubernetes—fast becoming the technology of choice for container orchestration—has limitations in how it implements networking. Tricky stuff like network security is, well, even trickier. Now an open source project named Cilium, which is partly sponsored by Google, is attempting to provide a new networking methodology for containers based on technology used in the Linux kernel. Its goal is to give containers better network security and a simpler model for networking.
  • Modules vs. microservices
    Much has been said about moving from monoliths to microservices. Besides rolling off the tongue nicely, it also seems like a no-brainer to chop up a monolith into microservices. But is this approach really the best choice for your organization? It’s true that there are many drawbacks to maintaining a messy monolithic application. But there is a compelling alternative which is often overlooked: modular application development. In this article, we'll explore what this alternative entails and show how it relates to building microservices.
  • What Is Kubernetes?
    Kubernetes is open source software for automating deployment, scaling, and management of containerized applications. The project is governed by the Cloud Native Computing Foundation, which is hosted by The Linux Foundation. And it’s quickly becoming the Linux of the cloud, says Jim Zemlin, executive director of The Linux Foundation. Running a container on a laptop is relatively simple. But connecting containers across multiple hosts, scaling them when needed, deploying applications without downtime, and service discovery among several aspects, are really hard challenges. Kubernetes addresses those challenges with a set of primitives and a powerful API.