Friday, May 8, 2015

Software : 5 million internet users infected by adware

Software : 5 million internet users infected by adware


5 million internet users infected by adware

Posted:

5 million internet users infected by adware

More than five million Google users may be surfing the web with a computer infected by ad-injecting malware, according to joint research by Google, the University of California, Berkeley and the University of California, Santa Barbara.

Conducted over a five-month span between June and October 2014, the study found 5.5% of unique IPs accessing Google sites contained some form of injected ads, known as adware. The goal of the paper is to raise awareness. Google says that it will work with the online advertising community to tackle the problem.

Keep your browsing safe

Google has already removed more than 192 deceptive Chrome extensions that infected the browser with ad injectors, affecting 14 million users.

"Injected ads arrive on a client's machine through multiple vectors: our measurements identify 50,870 Chrome extensions and 34,407 Windows binaries, 38% and 17% of which are explicitly malicious," Google said in its report.

The search giant also provided a tool to clean up Chrome and remove ad injectors if you've been previously affected. There is also the Safe Browsing tool that protects the billion internet surfers using Chrome, Safari and Firefox browsers.

"Today, Safe Browsing shows people more than five million warnings per day for all sorts of malicious sites and unwanted software, and discovers more than 50,000 malware sites and more than 90,000 phishing sites every month," Google said.

Are you infected?

If you've noticed irregular signs with the browser, chances are you're infected. If your browser doesn't block pop-up ads, your homepage has been changed, you've noticed unfamiliar extensions or toolbars added, or you're seeing a different search engine that looks similar to Google, you're likely affected by malware.

For Windows users, you can manually uninstall any unwanted programs. Additionally, you can also use Google's free Software removal tool.

You should also remove any suspicious browser extensions and reset your browser settings as well. Google cautions that safe extensions that you install could later be purchased by hackers. When the extension updates, malware could enter your browser that way.

How ad injectors work

"Ad injectors' businesses are built on a tangled web of different players in the online advertising economy," Kurt Thomas, Google's spam and abuse researcher, said in a blog post, noting the complexity of the problem.

Ad injectors start with software that infect a user's computer. The software could be in the form of standalone programs and apps, or browser extensions. Browsers like Chrome support extensions, and Google even has a web store that hosts extensions for its Chrome browsers.

"We discovered more than 50,000 browser extensions and more than 34,000 software applications that took control of users' browsers and injected ads," Google's research discovered. "Upwards of 30% of these packages were outright malicious and simultaneously stole account credentials, hijacked search queries, and reported a user's activity to third parties for tracking."

Google found 5.1% of page views on Windows and 3.4% of page views on Mac revealed obvious signs of infection with ad injection software.

The software is distributed through a network of affiliates and could get onto your computer in any number of ways, including being bundled with other popular software downloads.

The ads are sourced from injection libraries, and companies like Superfish, which became a household name after it was discovered pre-installed on select Lenovo systems out of the box, and Jollywallets make their profit whenever a user clicks on an ad.

Risks to advertisers and users

Referring to the Superfish attack, Google says that adware can also compromise your data and security. "Komodia SSL hijacker did not properly verify secure connections and it was not using keys in a secure way, Google explained in a separate blog post. "This type of software puts users at additional risk by making it possible for remote attackers to impersonate web sites and expose users' private data."

"The ad injection ecosystem profits from more than 3,000 victimized advertisers - including major retailers like Sears, Walmart, Target, Ebay - who unwittingly pay for traffic to their sites," Google said. "Because advertisers are generally only able to measure the final click that drives traffic to their sites, they're often unaware of many preceding twists and turns, and don't know they are receiving traffic via unwanted software and malware."

Spotify's next big hit may be original videos

Posted:

Spotify's next big hit may be original videos

Music streaming powerhouse Spotify may be making a move into the video world.

The Wall Street Journal reports Spotify "has been reaching out to companies that specialize in making content for YouTube." It's possible that Spotify is attempting to outdo its pricier competitor, Tidal, which offers music videos and will eventually stream live events.

According to the report, Spotify has been in talks with companies that create content for YouTube about acquiring existing material and possibly joining forces to test the waters of original video content. The specifics of Spotify's new venture into video could be divulged as early as this month.

The WSJ reported last month that Spotify's worth is about to rise to $8.4 billion, making it a stronghold in the streaming industry. The addition of video, and possibly taking pointers from Google's Music Key and Tidal looks like it could help strengthen the company's foothold as the top-dog.

1 comment:

  1. Want To Boost Your ClickBank Banner Commissions And Traffic?

    Bannerizer made it easy for you to promote ClickBank products using banners, simply go to Bannerizer, and get the banner codes for your chosen ClickBank products or use the Universal ClickBank Banner Rotator Tool to promote all of the available ClickBank products.

    ReplyDelete