Consumer Search: Anti-Spyware: Reviews
TOP 4 Best Reviewed
* Best anti-spyware software
* Budget anti-spyware software
* Security suite with the best spyware prevention
* Free adware/spyware removal tool
* Anti-Spyware Runners Up

What To Look For

Avoiding spyware in the first place

Experts say that there's a lot you can do to avoid spyware in the first place, including using alternative browsers and practicing defensive computing.

Currently, most spyware and adware is written to exploit Internet Explorer. Because of that, experts say, you can avoid the majority of spyware if you avoid Internet Explorer entirely and switch to an alternative web browser such as Firefox. But while switching might protect you for a while, as other browsers gain market share, spyware and adware writers will target them as well. See our report on web browsers for alternatives to Internet Explorer. If you prefer to stick with IE, make sure you are using the latest version with all current security patches installed.

Many anti-spyware programs don't work with Firefox. Although you can still scan your system, these spyware removers can't provide any real-time protection if you use an alternative browser.

Defensive computing can keep you safe from some spyware. Don't click inside pop-up windows, and always close them by using the "X" in the corner. If this does not work, close your browser and then reopen your browser. Deleting unsolicited email messages without opening them will protect against most malware spread through email. Read the end-user license agreement before you install software. When you click "I agree," you may be agreeing to install spyware with the software. Cookies can hold personal profiles and Internet browsing tracks. You can clear the cache (downloaded cookies) in Internet Explorer, but before you do, make sure you have your passwords handy, as you'll need to reenter them. Only download executable (*.exe) files from known and trustworthy websites.

Keep your operating system updated with the latest security patches and service packs. Use Microsoft's automatic updates for greater security. In Internet Explorer, make sure your security level is set to medium or higher. Lower settings allow spyware to enter your system's memory. Set your browser to deny installing Active X controls without asking permission.

Regularly back up your system, so you can reinstall your files in case a spyware invasion or crashes force you to reinstall your operating system. Be prepared with emergency disks or other system-restoration tools. See our report on online backup systems for options.

Beware of fake anti-spyware programs

Some spyware masquerades as legitimate spyware-removal tools. Experts say you should never click on a pop-up or email link that offers to scan your computer for viruses or spyware. While some of these are time-wasting marketing tools that will identify -- but not remove -- malware, others are spyware installers. A notable exception is Trend Micro, which offers a free web-based scan-and-removal program at housecall.trendmicro.com. It scans for viruses and spyware. The program is slow, however. Experts recommend verifying any anti-spyware product at sites like SpywareWarrior.com or 2-Spyware.com, which maintain a list of legitimate anti-spyware software.

Experts say that there are more than 200 spyware programs masquerading as anti-spyware, and more are appearing all of the time. Many of them have names that are similar to top-rated spyware removers, aiming to confuse potential victims. Some examples of these anti-anti-spyware programs (according to SpywareWarrior.com) are SpyKiller and InternetShield, both of which have already been subject to prosecution. Others include SpyEliminator, Ad-Eliminator, Doctor Adware Pro and Elimiware.

Spyware detection and removal are the most important considerations when selecting an anti-spyware program. Compatibility with other security programs is also critical. Finally, anti-spyware software should include the following:

* Real-time blocking and background monitoring that occurs before spyware is downloaded or installed. It is far easier to prevent spyware from installing in the first place than to clean out an affected system after the fact.

* Automatic spyware definition updates. Some free tools require manual updates.

* Restoration/rollback capability is a good feature if legitimate application components are inadvertently deleted. With this feature, components can be restored from quarantine so that the application will work again. Some applications may not work without their (non-threatening) spyware components.

* Automatic scan scheduling allows you to set the day and time for automatic scans. Alternatively, you can instruct the software to run scans at startup or shutdown.

* Threat-level description and severity analysis in the user interface allow you to make good decisions about what components to ignore, quarantine or delete.

* Support features including online help, forums, email support and free telephone support. Given the reported difficulties some users have in getting anti-spyware utilities to upgrade cleanly or play nicely with other applications -- particularly security applications -- good product support can be crucial.

Types of spyware and adware

"Malware" is an encompassing term that includes viruses, spyware, adware, worms, Trojan horses and other computer afflictions. According to a ConsumerReports.org survey, spyware infection rates are decreasing, but they still caused 566,000 people to replace their computers in the first half of 2008.

Clicking links in pop-ups or viewing email messages with graphics or HTML can invite spyware into your system. Spyware is often bundled with useful or entertaining software, such as games, and social networking sites like Facebook are increasingly being targeted. Most spyware comes from the Internet, but removable media is another source.

There are several signs that spyware is on your computer system. Pop-up ads may appear whether or not you are browsing the Internet, your browser's home page may be reset to a page you have not chosen, your Internet connection may be markedly slower, or you may notice new items in your startup menu. Some spyware and adware are browser plug-ins in the form of toolbars, which enable advertisers to redirect your home page. Many add unwanted bookmarks. More rarely, spyware can include a remote administration tool that can allow an attacker to control your computer. Spyware in the form of a key logger can record your keyboard strokes for later retrieval, but these are rare.

Full Report
- Introduction
- Top Spyware Removers
- Security Suites
- Free Anti-Spyware
- Mac, Linux Programs
- Useful Links
- Our Sources

Click the URL above to read the full article
Comments: 0
Votes:17