Anti-Spyware Software Sucks

from the so-much-for-that-plan dept

As spyware becomes a bigger and bigger issue for users, it’s becoming clear that the current crop of anti-spyware tools is, in no way, keeping up with the spyware writers. A test of a variety of different anti-spyware tools shows that none of them work particularly well, and most do an awful job protecting your computer. In fact, it appears that some of the fee-based anti-spyware tools do even worse than the free ones. Still, even the best tool missed quite a bit. Considering the amount of spyware out there, and the overwhelming nuisance it causes, it’s about time someone tried to take a much more holistic approach to stopping spyware, rather than simply trying to solve each case on a one-by-one basis.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Anti-Spyware Software Sucks”

Subscribe: RSS Leave a comment
11 Comments
Anonymous Coward says:

Shoot the messenger

Thats right.
Lets bitch & piss & moan about the anti-spyware guys that are TRYING to fix something that they never fucked up to begin with.
Thats so fashionable nowdays. Don’t bitch & piss & moan about the spyware companies … nope, complain that the free tools don’t work well enough.

Whaaa …

In fact, I think we should have a class action lawsuit started against all these evil anti-spyware companies.

Mike (profile) says:

Re: Shoot the messenger

Uh… it wasn’t shooting the messenger. It wasn’t blaming the companies. The point was just to show that the tools aren’t that effective which *is* important for people who think they’re protecting themsevles, when they may not be.

If you read this site, you know that we constantly write about the companies distributing spyware, but that doesn’t mean weak tools should get a free pass.

Bryan says:

Re: Shoot the messenger

WTF are you talking about? That was not a stab at the tools, you ignorant turd, it was simply a (correct) statement that the current selection of tools and their abilities is inadequate. Everyone knows the spyware writers/companies are to blame. Got any other painfully obvious views to share?

jeremiah (user link) says:

How-TO

As an aside, I received a smart tip from a tech-saavy friend regarding the removal of mal/spyware.

He uses two products: Spybot S&D and AdAware. The “trick” is to disable System Restore (on XP systems), and run the spyware removal stuff in Safe Mode (with network support for updates). Four passes and two reboots later, clean as a whistle.

Oh, and tell your friends: DON’T INSTALL KAZAA.

Steve Mueller (user link) says:

Holistic?

Considering the amount of spyware out there, and the overwhelming nuisance it causes, it’s about time someone tried to take a much more holistic approach to stopping spyware, rather than simply trying to solve each case on a one-by-one basis.

That’s easy to say, but how do you actually do it? At least some people are trying to do something, even if they don’t work perfectly. Some protection is better than none, as long as users realize that it’s not perfect.

Any holistic approach probably has to start with Microsoft, and SP2 may be a good start (preventing Browser Helper Objects from being installed, for example).

Fortunately, I use Mozilla and don’t have to worry as much about this.

True Orient says:

Disgusting Anti-spyware Methods!

Disgusting Spyware Methods! Disgusting Anti-spyware Methods!

DiamondCS is a reputable software firm that developed one of the best Anti-tojan applications I have seen, TDS-3. Unfortunately, DCS employs a hardcode technique that redirects the user to its site with numeric IP 64.91.255.87 upon pressing the F5 function key. Of course there is nothing wrong with this process. This fact could have remained unnoticed had it not been for a spate of really nasty IGN/CWS infections that showed the DCS redirects along with the nasties in hijacked Host files and shown below:
O1 – Hosts: 69.20.16.183 auto.search.msn.com
O1 – Hosts: 69.20.16.183 search.netscape.com
O1 – Hosts: 69.20.16.183 ieautosearch
O1 – Hosts: 69.20.16.183 ieautosearch
O1 – Hosts: 69.20.16.183 ieautosearch
O1 – Hosts: 69.20.16.183 ieautosearch
O1 – Hosts: 64.91.255.87 http://www.dcsresearch.com
O1 – Hosts: 69.20.16.183 ieautosearch
O1 – Hosts: 69.20.16.183 ieautosearch

A quick google search of “O1 – Hosts: 64.91.255.87 http://www.dcsresearch.com” will provide at least 1,500 links (Yup! that many!). It should be noted that an HJT 01 entry will only appear if a Hostfile hijack is involved. Redirecting to the local host to will not appear in the HJT log. When asked about this, representatives of DCS at Wilders Security Forum replied that this is perfectly normal since it simply redirects from an alleged “bad site” to the legitimate DCS IP.

If such were the intention, a simple redirect to the local host would have sufficed as this blocking technique is acceptable. However, redirecting to a preferred website is in any laguage, a hijack. This type of redirect is the method used by hijackers with the same objectives: redirecting to the chosen website. DCS cannot claim that since they are reputable, a redirect to their site is acceptable. No one has nor can given them that status. A hijack is a hijack is a hijack…. The method is absolutely wrong!

Now comes an interesting scenario.

Quote:
“It?s becoming such a sizeable problem in the US that the Government voted unanimously in Spring 2004 to approve the first-ever anti-spyware bill. The Securely Protect Yourself Against Cyber Trespass (Spy Act), approved by the US House of Representatives, would levy fines up to $3 million for those who illegally collect personal information, change a browser’s default home page or bookmarks, log keystrokes, or steal identities “

Quoted from http://www.net-security.org/article.php?id=746

Do you realize that if I invested in TDS3, bookmarked http://www.dcsresearch.com or set my homepage to http://www.dcsresearch.com, the chances are I will be redirected to DiamondCS? This can be documented and I can then sue DCS for illegally redirecting my browser, right? And all because DiamondCS has chosen to adopt a Trojan method instead of a Hostfile block or Help update? Think about it.

Too, what are the chances of a crazy picking up this post and doing exactly the above? This is a possibility they brought upon themselves for insisting that what they were doing was simply protecting their interests. They chose the expedient/easier route now they are susceptible to para-legal issues…. Sooner or later, this will happen….

Your thoughts?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...