Pests Flying Under IT's RadarPests Flying Under IT's Radar

Annoying, intrusive, and sometimes destructive, tiny programs known as pests can clandestinely squirm past defenses.

information Staff, Contributor

February 5, 2003

1 Min Read
information logo in a gray background | information

In the aftermath of the Slammer Internet attack, companies are taking yet another look at their vulnerabilities, but many are overlooking more-common threats. Annoying, intrusive, and sometimes destructive, tiny programs known appropriately enough as pests can clandestinely squirm past defenses.

Pests can be spyware, which record keystrokes and steal passwords, and adware, which report on Web-surfing activity. These programs can be introduced when people install contaminated apps or even when they simply scout around the Internet. And, worse, they are adept at sneaking past anti-virus, intrusion detection, and firewall applications when people surf the Web or install certain apps.

According to the security firm PestPatrol, pests hand to hackers E-mail addresses and passwords, intrude on remote computers logged into VPNs, corrupt files, and even use a person's desktop video camera to secretly snap and collect pictures.

PestPatrol says it has collected Trojan horses, spies, and other hacking tools culled from the pests found on the systems of its 200,000 customers. The results can be found here.

Pete Lindstrom, research director with Spire Security says network administrators need to take pests seriously. "They can cause significant problems that result in data theft, drained resources, increased help-desk calls, wasted bandwidth, and invasion of privacy."

Read more about:

20032003
Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights