![]() | |
![]() | |
![]() |
Software Information |
|
![]() |
Anti-Spyware Protection - Holes in the Shining Armor
Looking at all the ads which promise to get rid of all spy programs, one may wonder why there is still plenty of them everywhere and the situation is by no means getting better. So let me spoil the advertisers' mood and show some of the "holes" in the majority of software products we expect to protect our data. Speaking about drawbacks of anti-spyware, let's take the word "spyware" in the narrow sense for a change and call "spyware" only software products that really spy, i.e. steal valuable information you want to keep private. Let's leave aside adware -- this motley crew of advertising stuff; information that some of them "steal" isn't valuable enough. It is keylogging programs that we should associate with the term "spyware" first of all. This breed is exceptionally dangerous -- such threats as flourishing online bank fraud and the recent outbreak of keylogger-containing Trojans prove this. Generally speaking, most anti-spyware works like that? Don't stop reading, please. Don't skip over the paragraph. Do you think that if you are not a tech person, it is none of your business? You don't write this software, you just use it -- so what? You haven't made the car you are driving, either (well, there may be some exceptions?). But you do know (at least in general) what makes it move -- and you won't forget to fill up its tank or have it serviced from time to time. You know what will happen if you don't. For the same reason you'd better know a bit about anti-spy software installed on any PC you use. We all should know it to realize what exactly to expect from all these anti-spy products with cool names. Their creators and sellers promise you that these software products will "kill all spyware on your PC" (or something like that). First, is absolute protection possible? Second, what should we expect from a typical anti-spy program and what it is simply unable to do? To answer these questions, we should understand how it works. Generally speaking, most anti-spyware works like that: it scans the operating system in search for suspicious bits of code. Should the program find any, it compares these suspicious pieces with bits of code (they are called signatures), which belong to already detected and "caught" spy programs. Signatures are kept in so-called signature base -- the inseparable part of any anti-spy program. The more signatures it contains, the more spyware such program will detect, so your PC will be protected more effectively. As long as you update your anti-spy software regularly and the system doesn't come across some unknown spyware product, everything is going to be all right. As for me, this pattern looks pretty like police records and works like them, too. But?the problem is just like the one with police records - the fact that all included there are criminals doesn't at all mean that all the criminals are included into the records. Well, what about the criminals (spy programs) that are not included into the records (signature bases)? There are lots of such programs -- more than that -- some of them will never be in any signature base. Just like with criminals -- some of them haven't been caught yet, and some will never be caught - because of their "right of inviolability". Anti- spy products based on signature base analysis will never be able to protect against these spies. Don't expect them to. Let's take a quick look on these elusive spy programs. Group 1. Those which hasn't been caught yet, because they are: 1. brand-new ones. They are being constantly written, released, used (for a very short time), detected and, finally, included into signature bases. Anti-spyware developers are now in the vicious circle of endless "spy hunt", trying to include as many spyware signatures (pieces of code) into the bases as possible - and fast! Faster, to outrun the competitors; faster, for new spyware - which is being written and released all the time - not to spread like a wildfire. That's the way a signature base grows. 2. written to be used only once. These "tailor-made", or should we say, "custom-made", keyloggers are extremely unlikely to be ever detected. As soon as they have done their jobs (stealing data, of course -often from the particular computer) they simply disappear, never to be seen again. Here belong keyloggers made mostly for such tasks as espionage. The main problem: keylogging software is relatively simple and not too difficult to compile. Even an average computer programmer can write a simple keylogger in a couple of days. More sophisticated one will take longer to make, of course, but not too long. Hackers often compile source code of several keyloggers (it's easy to find them in the Web--for those who know where to look for) -- and get a brand-new one with an unknown signature even faster. If a keylogger can be installed remotely without the victim's knowledge, it gives the hacker great possibility to steal any information he pleases. If there is an opportunity, there always will be one to use it. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when hackers make their biggest profits. Trying to catch them all is a hopeless idea; it looks too similar to catching fleas one by one. Group 2. "Sacred cows". No signature base will ever have their signatures. Here belong mostly monitoring programs, which can be used for spying as well. First, the ones created by (or for) government agencies - such as the famous Magic Lantern (the brainchild of the Cyber Knight project). No product which uses a signature base will protect against it; an ordinary anti-spy will never detect such a program. The same situation with other monitoring software, which certain agencies utilize. These monitoring products simply "don't exist" for signature-base-using anti-spyware (though they can well exist on any PC--yours included) If you think I'm painting it too black let's recall what happened when code of D.I.R.T. (a covert spying tool developed by Codex Data Systems) leaked out couple of years ago and was found in the Web (merely by accident, by the way). Once a top-secret project, it did become an open secret -- but the signature of this powerful monitoring software hasn't been included in any signature bases. That's what worries me the most; after this information leak nobody knows for sure WHO can be using it --and WHAT FOR. What if some other government monitoring program trickles into the Internet, too? Monitoring programs for parental control or workplace surveillance are very common and easily available from the Web. However, they can be used not only for those absolutely legitimate purposes. Any monitoring program is actually a double-edged sword because it almost always contains a keylogging module. It is up to an end user to utilize them--perhaps for spying. Legitimate monitoring programs are sometimes not included into signature bases, so one can use an anti-spy program and be spied on anyway. Now the last (but not the least) threat -- spy modules incorporated into viruses and Trojan horse programs. Unfortunately, all malware, including viruses, Trojan horses, worms and other fauna, "evolves" (due to their malicious creators). There already are so many hybrids between one another that it's hard to find, say, a "pure" virus like ones used only several years ago. Lots of this fauna can contain a keylogger -- like MyDoom (sure you remember this virus). They multiply and evolve, becoming more and more malicious. So, what conclusions could we draw out of this entire story (sorry if it turned to be too pessimistic)? Is absolute anti-spy protection possible? With existing anti-spy software which uses signature bases - no. However, there is a relatively new trend in software development -- not to use signature base analysis at all. This approach is rather promising; it means that such software--it already exists--can counteract even brand-new and custom-made spies. You may read more about it if you follow the link in my signature. What should we expect from an average anti-monitoring or anti-spy program? It does protect from spy software which it "knows". If it has the particular signature in its base, it protects your PC from this particular program. If anti-spyware uses a signature base, it will never "kill all spies on your PC--"whatever the salesperson promises you. Don't expect complete security-- there is no such thing anymore. The only hope is for entirely new technologies. If developers can't succeed in fighting spyware, they should try something else. Alexandra Gamanenko currently works at the Raytown Corporation, LLC -- an independent software developing company.Visit its website http://www.anti-keyloggers.com
MORE RESOURCES: Siemens acquires Dotmatics Siemens Digital Industries Software Newsroom Software Engineer Dassault Systèmes Devin 2.0 is here: Cognition slashes price of AI software engineer to $20 per month from $500 VentureBeat The software engineers willing to pay $10,000 to anyone who helps them land a 6-figure coding job Business Insider Portland hears polarizing testimony on policy to ban rent pricing software Oregon Public Broadcasting - OPB Software company helped Washington landlords fix prices, artificially raising rent for thousands KING5.com Washington AG takes software company to court over rental price-fixing allegations Oregon Capital Chronicle City of South Lake Tahoe unveils new development permit processing software TahoeDailyTribune.com 5 Best Accounts Receivable Software of 2024 TechRepublic Atlassian: A High-Quality Software Company With AI Tailwinds The Motley Fool City agrees to purchase software to simplify permitting process News Radio KMAN Hexagon acquires Geomagic software business from 3D Systems Engineering.com Washington AG sues rental software firm over alleged price fixing Nonstop Local News Vertosoft Named Illumio's Newest Software Distributor for the Public Sector, Enhancing Cybersecurity Capabilities Yahoo Finance Data Center Cooling: PFCC and ENEOS Collaborate on Materials R&D with NVIDIA ALCHEMI Software insideAI News Programmers are Reportedly 3x’ing their Workloads Using SoftMine’s AI Software Developer HackerNoon RealPage software allegedly conspired with landlords to inflate rent prices, WA AG claims MyNorthwest.com Simerics, Tech Soft 3D announce Simerics-CAD software Engineering.com Design Firms Leveraging Software in Key Areas: Survey Kitchen & Bath Design News Microsoft CTO breaks down how he sees software developer jobs evolving in the next 5 years Business Insider Emerson's Asset Management Software Unifies Equipment Reliability Data From: Emerson Manufacturing Business Technology Intersolar Europe 2025: Valentin Software with new program versions of PV*SOL premium and GeoT*SOL AltEnergyMag Details Flowers Software Celebrates 10 Years of Business Perishable News CyberArk Software (NasdaqGS:CYBR) Gains SOC 2 Compliance For Secure Browser Innovation simplywall.st From Software Unveils Multiplayer-Focused Switch 2 Exclusive Soulslike 'The Duskbloods' [Trailer] Bloody Disgusting Lucid Software Expands Visual Collaboration with First Work Acceleration Platform for Business Transformation Longview News-Journal Crow Canyon Software Hosts Free Webinar on Forms & Workflow Automation Software in Microsoft 365 & Teams The Victoria Advocate Hexagon finalizes acquisition of Geomagic software Canadian Metalworking Critical vulnerability in CrushFTP file transfer software under attack Cybersecurity Dive As EdTech growth continues, this enterprise is doubling down on tailored software solutions for teachers StartUp Beat Hexagon Supercharges Design, Manufacturing Productivity with Geomagic Software Acquisition Quality Magazine Reap the Rewards of Open-Source Software Electronic Design Enterprise software stocks sink, led by Atlassian, as new tariffs could prompt spending slowdown (PLTR:NASDAQ) Seeking Alpha Insight Partners seals $5.1bn exit from Dotmatics in Siemens software acquisition Private Equity Insights State seeks vendor to update decades-old financial software Hawaii News Now Procede Software Introduces the Next Release of Its Industry-Leading Intelligent DMS Platform, Excede v10.5 PR Newswire Remembering Microsoft’s other co-founder: How Paul Allen’s vision sparked a software revolution GeekWire 3 Leading Computer Monitoring Software for Schools Security Boulevard Durst announces acquisition of callas software Label and Narrow Web 3D Systems completes sale of Geomagic software portfolio to Hexagon for $123 million Metal Additive Manufacturing magazine O-RAN Software Community Advances Open RAN Innovation with J and K Releases, Fostering Better Alignment with Industry Groups and Standards to Further Open RAN Adoption The Globe and Mail Website Monitoring Software Market Is Booming Worldwide with SolarWinds, Datadog, UptimeRobot openPR.com |
![]() |
![]() |
![]() |
RELATED ARTICLES
Passwords Used In Microsoft Word Documents You would like to protect your documents, wouldn't you? Reasons may vary but the problem is the same - you need to protect your Microsoft Word documents from unauthorized editing or viewing. What document protection features does Microsoft® Office Word 2003, a part of Microsoft Office Professional Edition 2003 provide?Microsoft Word features for document protection. How to Get The Best Accounting Software For Your Small Business Buying accounting software is a major investment. It's an important decision and you need to be sure of all the facts before you buy. Groupware and Version History: Collaboration Series #1 This article is the first of a series of articles exploring specific aspects of groupware. The brief informational articles in this series discuss some of the technologies associated with groupware, as well as some of the characteristics of groupware. Microsoft Great Plains: Data Conversion & Migration Scenarios - Overview for Consultant Microsoft Business Solutions Great Plains serves multiple industries in the US, plus it has strong presence in Latin America, U.K. IT Strategy for Midsize Business: Microsoft vs. Java, Great Plains & CRM Midsize business or non-profit organization should decide if one-vendor solution would be appropriate and the associated risk acceptable. In our opinion, balancing the risk of one-vendor-approach is not economically feasible and should be avoided. Microsoft Great Plains, Navision, Axapta - Selection Considerations During the years of our consulting practice, which comes back to East Europe in mid 1990th and then continues in the USA, Brazil, New Zealand, Australia, Oceania, Germany, Canada - we would like to orient you - business owner, IT director or software programmer. Selection process can take several months and you may end up with non-Microsoft solution. Manufacturing Outsourcing: Microsoft Great Plains Implementation, Customization & Reporting Manufacturing in the USA is far away down from mid 20th century top of the hill or its golden time. However we are in very competitive business environment and we have to do what market tends us to do. DVD Burning Tips CD and DVD replication is a process that works by creating discs from scratch. Not to be confused with duplication (the act of burning information onto readymade, commercially-available blank CD-Rs and DVD-Rs), replication relies on the use of molds to produce actual discs that already contain digital data. Enterprise Resource Planning Overview ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief history of ERP, Why is it necessary, Market Leaders and the future of ERP.What is ERP?Enterprise Resource Planning or ERP is an industry term for integrated, multi-module application software packages that are designed to serve and support multiple business functions. Microsoft Great Plains IV: Inventory Management Great Plains Inventory Management (IV) module gives your business a competitive edge. By achieving accurate visibility and effective control over inventory, and setting prices on a customer-by-customer basis, you can reduce operating costs and achieve the fast, efficient fulfillment that keeps customers coming back. Artificial Intelligence And Intuition The intuitive algorithm.Roger Penrose considered it impossible. Getting Technical Support Help Online Sometimes your PC will start acting strange for no apparent reason or a programwhich you use regularly will all of a sudden stop working as it should. Thiscan be a frustrating experience especially if you have no idea where to go forhelp. Alien Intruders! You probably didn't casually invite, or extend a formal attendance requestto, these undesirables known as viruses.Regardless of your opinions, such cyber-nomads may call on you, complete andactive, with their destructive payloads. Microsoft Moves to Small Business Accounting/Retail Market - Stakes and Thoughts In this small article we will be looking at the new opportunities for Microsoft Small Business Server specialists, but rather look at the global business strategy and possible ways of future ERP modules standardizing and interoperability. This is important to get into consideration for midsize and large corporate business IT decision makers. Microsoft Great Plains & CRM in Transportation & Logistics - Overview Microsoft Business Solutions Great Plains and MS CRM (client relation management system) are very popular in various industries and market niches. In previous article we described Microsoft Great Plains implementation for transportation & logistics company. FreeDOS Before September 1995, Microsoft Windows was an MS-DOS program. DOS was an easy to use command line operating system that provided you with complete ability to control and troubleshoot your computer. Choose your Java Wisely Java has come along a long way. Many would agree with this. Your Computer May Be Infected, Heres How To Check (NOT about virus) NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference. Do You Want Your Own Fully Programmable ERP? - Part 1 We are in a transition phase in the Managerial Administration models of any company or Government, because three factors are summing for that:The new powerful business Information Technologies and its more and more smaller costs, like ERP, CRM, BI, etc.,The creativity of the new MBA to generate value and its corresponding engineering - for example, Feedback Control System - in the administrative and managerial fields,Several different layers in the companies in what refers to its managerial and administrative automation levels. Great Plains Custom Development: Dexterity, VBA, SQL, Crystal, eConnect - Overview For Programmer Microsoft Great Plains is main Microsoft Business Solutions accounting package for the US market. It has multiple customization/modification/reporting tools. ![]() |
home | site map |
© 2006 |