Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Browser Hijacker

The Browser Hijacker

There are numerous threats roaming the internet, all of which can be very harmful to anyone with an online connection.  One parasite that has caused a lot of trouble is the browser hijacker, a member of the spyware family.  A browser hijacker is a malicious program that modifies the settings of a user's browser without consent.  Similar to a Trojan, it appears relatively harmless on first site yet can inflict damage comparable to a virus.  It often changes the default homepage and search page to that of another site or may redirect a user to a site hosting malware.  A browser hijacker may decrease privacy levels and disable security settings while implementing unwanted advertisements and bookmarks.  

Cool Search Controversy

There have been many such infections that intend to violate the privacy of internet users.  One of the most controversial issues in regard to hijacking involved a company by the name of Cool Web Search.  Cool Web Search or CWS is the family name applied to several different hijackers, which all attempt to redirect a victim's web browser to coolwebsearch.com or relative sites.  As reports of network abuse were made, CoolWebSearch.com claimed they were not involved in any of the hijacking incidents.  It was later found that these claims were true, proving that the company used an affiliate program that paid its clients for every user redirected to the site. 

Shortly thereafter, well over 40 CWS variants were discovered, most operating with malicious intent.  About 15 of these programs were able to be easily removed from an infected system while others required in-depth work in the registry such as deleting numerous files and making alterations.  Some were nearly impossible to remove and more complex than the most dangerous of computer viruses.  Over the years, browser hijackers have proven to be so devastating that the most advanced anti-spyware software has a difficult time fully destroying them.  Experts on spyware state that the best way to fight such an infection is to restore the Windows registry from a clean copy.  The worst case scenario involves erasing all data from the hard drive and reinstalling the operating system. 

You can learn more about this controversial issue by viewing the following links:

http://www.coolwebsearch.com/security and http://www.coolwebsearch.com/hijacking.html

How to Recognize it

It's fairly easy to know when your browser has been hijacked by an intruder.  Your homepage may be altered to reflect a pornographic theme or filled with advertisements.  You may also be distracted with numerous pop-ups and find new web shortcuts on your toolbar.  The browser hijacker often includes spyware and adware features that monitor your internet behavior and use it to build a profile of your habits to proposition you with more advertisements.  

While browser hijacking has become a huge problem on the internet, not all browser helper objects are bad.  For instance, a BHO is included with the Google Toolbar as part of it's installation.  Although certain features of the toolbar may transmit data back to Google, this activity is clearly stated prior to installation and can be disabled without negatively impacting search capabilities. 

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
In 2003, more than 10 million Americans fell victim to identity theft.

Identity theft costs business and individuals $53 billion dollars annually

In 2003, Americans spent 300 million hours resolving issues related to identity theft.

70% of all identity theft cases are perpetrated by a co-worker or employee of an affiliated business.