Monday, May 18, 2009

Transcend/Trend Micro to release antivirus USB drive

In order to combat malware and other viruses that travel from computer to computer via flash drives, Transcend will be putting Trend Micro security software on their Jetflash 15 flash drives.

The drives were created specifically to prevent the autorun malware that spreads across corporate systems. Now, this isn’t the full Trend Micro Internet Protection and Anti-Virus software that people have, instead, it runs Trend Micro USB Security which was developed specifically to protect against malicious content in files transferred to a USB flash drive. If threats are discovered, users will be alerted and all infected files will be quarantined. When the JetFlash V15 is plugged into a computer with Internet access, Trend Micro USB Security will automatically download and install the latest security updates directly onto the drive.

No word on how big the drives are, prices, or availability. Transcend doesn’t even list the product yet on their website. You can view the Press Release here.

Chris’s Opinion

Transcend could really be onto something here if they price it correctly. One IT security problem that is often talked about on college campuses is to be careful of which computers you plug your thumb drives into. The reason for this is because everyone uses their computers is different ways–some more safe than others. Plugging your drive in from one computer to the other can spread viruses, malware, adware, etc.

I’ve seen these put onto external hard drives before, but most people use flash drives as opposed to hard drives for ease of portability. It could catch on with users.

Thursday, May 14, 2009

Ways to Save on Anti virus software?

Your computer is a big investment and your documents in it could be priceless, so it's wise to install software to protect it. Getting a virus out on your computer can be frustrating and expensive. 

If you've been the victim of a computer virus, it's something you'll never forget. "I'm a storywriter so I lose like all the stories that I've written from years ago and it's...it's really frustrating," said Jessica Rodriguez of Springfield. 

Aristeo Torres of Post Computer Systems in Wilbraham told 22News "We strongly recommend that you only get an anti-virus and anti-spy ware program and not the suites." The suites are the deluxe versions. If you stick with the basics, you'll save money. Experts recommend "Panda" or "Norton Anti-Virus". Both are around forty dollars each. 

You can also get free anti-virus downloads online. "AVG" and "AntiVIR" are the two most reputable according to Torres. But free downloads do not provide you with support if you have questions. 

The best way to save money on protecting your computer is to simply use common sense. For example, don't use sharing websites like "Limewire." They're not only illegal, but they can also expose your computer to viruses and spy ware. 

Remember to update your protection every year. It will cost you about forty dollars annually, but it will save you money by extending the life of your computer.

Panda lofts its antivirus protection into the cloud

f the prospect of keeping important data out in the cloud still makes you slightly uneasy, you might get positively lightheaded at the thought of keeping your anti-malware protection up there. But Panda Cloud Antivirus, which entered beta recently, did a decent job of protecting a test system from the bad stuff -- without shoveling our data into the ether, and without slowing our system down.

Panda Security's an old hand at viruses, and under its old name (Panda Software) the Spanish firm has been toiling in the anti-malware trenches since the '90s. Around the turn of the century, the company began to shift away from the once ubiquitous signature-based model and to a combination of behavioral analysis and blocking, heuristics, and hardcore auditing. Still, the malware writers have gotten much smarter in the last decade too -- and they've gotten faster at getting their wares out to the public.

The latest iteration of Panda uses a crowdsourcing-style concept it's calling "Collective Intelligence" to speed up the process of identifying new threats. The user installs a thin Panda client on the system. Panda scans executables as they attempt to run -- no data files and nothing at rest, unless you specifically run a scan -- and notes the software's behavioral patterns, file traces, and the like. It creates what the company calls a "reverse signature" for each executable -- a partial cryptographic hash, in fact -- and sends it up to the cloud to confirm that the executable is clean.

The analysis and classification happens in the cloud, thus combining behavioral data from all the users (while anonymizing that of individuals) and automatically figures out whether it's seeing some heretofore unknown piece of malware. The "reverse signature" is checked, and the executable is flagged as known-good, known-bad, or not known. Panda reps estimate that the system can nail down a new breed of infection within about six minutes of its first appearance.

Our tests found Panda to be a tidy, well-behaved application that on its initial scan presented us with evidence of a nasty little keylogger that our previous antivirus somehow didn't notice. That initial scan took hours and hours on our Vista machine (with its 2/3-full 160 GB drive and 3 GB RAM). We had to jettison our previous antivirus package, which somehow hurt our feelings less after that festering iteration of TPE Civil War IV turned up, to load Panda. Connecting via proxy server was uneventful, requiring only that we provide the IP address and port in use. (If we'd been running Internet Explorer, Panda says the software could have retrieved that information automatically.)

After loading and that initial scan, though, Panda was utterly unobtrusive, only tapping us on the shoulder when something actually turned up. The software sees viruses, worms, trojans, spyware, adware, dialers, "jokes" (which the company defines as unwanted bits of code that don't seem to have a malicious payload but could confuse your machine into thinking it's infected), and cookies. The reports it provided were easy to parse (and save) and linked back to good information pages on Panda's site.

Sunday, May 10, 2009

Zimbabwe to Receive Anti-flu Drugs

he World Health Organisation began to ship 2.4 million treatments of anti-flu drugs to 72 needy countries Tuesday, and its flu chief said the swine flu epidemic was still spreading.

WHO flu chief Keiji Fukuda said new infections were among the 405 confirmed swine-flu cases reported to WHO in the last 24 hours. “We are seeing testing of specimens that were collected from previous infections and then the laboratory work is catching up to it,” Fukuda said. “But we’re also seeing new infections occurring. So, there’s both of these things going on simultaneously,” he said.


The countries getting Tamiflu included Mexico, Afghanistan, Angola, Bhutan, Bolivia, Eritrea, Haiti, Moldova, Pakistan, Sri Lanka, Uganda and Zimbabwe, among others. The drugs are from a stock of 5 million treatments of Tamiflu that manufacturer Roche Holding AG donated in 2005 and 2006, WHO spokeswoman Fadela Chaib said.


The global body says there are now 1 490 cases and 30 confirmed deaths from the swine flu epidemic. Of those, 822 cases and 29 deaths were in Mexico; the United States had 403 cases and 1 death; Canada had 140 cases, Spain 57, Britain 27, Germany nine, New Zealand six and Italy five. Israel and France had four cases each, Korea and El Salvador had two each, and Austria, Hong Kong, Costa Rica, Colombia, Denmark, Ireland, the Netherlands, Portugal and Switzerland had one case each.


Most of the people infected with the so-called A/H1N1 virus were young people in their mid-20s, Fukuda said, and most had been travelling to Mexico, the hardest-hit country. “With influenza, oftentimes we see the infections go to younger people first and then go to older people later,” Fukuda said.


Another reason could be that older people already have some kind of protection against the virus from previous infections, he added. Fukuda said patients who recover from the new swine flu virus would likely gain some immunity to future outbreaks, if only for a few years. “With influenza viruses, when you are infected it provides some protection against future influenza viruses similar to the one which infected you,” he said.

The protection lasts “a couple of years and then the viruses themselves change enough so that it’s kind of a new virus for your body, so you are susceptible again.”

Friday, May 8, 2009

Shavlik bolsters suite with anti-virus protection


Network security firm Shavlik Technologies today expanded its Security Suite to include anti-malware capabilities alongside its own patch management and configuration management products.
NetChk Protect 7 features a fully integrated anti-virus engine from specialist Sunbelt Software to offer customers a product with very low CPU and memory usage, according to the firm's vice president of worldwide sales, Chris Schwartzbauer.
Advertisement


"The competition is very agent-centric, putting a lot of code down at the end point, making it very resource intensive," he added.
"We try to put as little or no code on the machine… and we're now adding to the suite enhanced anti-malware capabilities – everything from rootkit discovery and remediation to the latest and greatest anti-virus capabilities."
By adding the Sunbelt technology, Shavlik is aiming to provide customers with a comprehensive suite of tools to accurately scan and remediate all of their machines, including those agentless virtual and portable machines, in a non-resource intensive manner, he explained

Wednesday, May 6, 2009

Let Big Brother Hawk Anti-Virus Software


This requires a discussion of "positive externalities," which may seem pedantic to you if you remember the concept from econ class, in which case you can skim the next five paragraphs. When you buy anti-virus software, some of the benefits accrue to you — less risk of your data being lost to a virus, or of annoying spyware infecting your computer with pop-up ads — but some of the benefits also accrue to other people. Prior to anti-virus software being installed on your computer, your machine might have been infected and taken over by criminals who used it to send spam. Or it might have helped to propagate the virus to other people. (Note: I am using "virus" to incorporate related things like "worms" and not worrying about the distinction.) Or you might have thought there was a problem with your computer, not realizing the problem was caused by a virus, and wasted time calling the tech support line for your computer manufacturer or for some other product on your computer. (If the company charges for tech support, then you're paying the cost of your call rather than passing those costs on to others, but if the call is free, then the costs have to be passed on to the company and hence indirectly to their other customers.) When you install anti-virus software, the chances of all these things happening are reduced, and those are the benefits that accrue to others — positive externalities, in economics jargon.
The key assumption is that you can put a price on all of the positive externalities generated by a given person installing the anti-virus software. It's different for every person, but it always adds up to some value, something that is not microscopic, but also not fantastically larger than the purchase price of the anti-virus program. It's on the order of adding 1/100,000th of a penny's worth of value to the lives of 100 million other people, for a total positive externality of $10.
To see that this is a reasonable assumption, suppose that if I had a choice between living in a world where all 100 million other Internet users in the US had no anti-virus software installed (using round numbers to make things simpler), and living in a world where all of the other users in the US had anti-virus software installed, I would pay $10 more per year to live in the latter, counting only the benefits to me and not factoring in any altruistic desire to help protect fellow citizens. (I personally would pay a lot more than $10 because I use the Internet so much, but the average might be closer to $10. Also, what I'd really like is for more people in certain other countries to install anti-virus software — China comes to mind — but I'm leaving them out of this discussion because it would be harder for the US government to encourage that.) When everyone else in the US is using anti-virus software, the benefits are returned to me in various ways, such as it being easier for me to send and receive e-mail because there aren't so many botnet-infected machines sending spam. (This is independent of my decision as to whether to buy anti-virus software for myself or not.)
Now, once I've decided I'd pay $10 more to have all my fellow Americans install anti-virus software, I could draw a graph (while my friends are out snowboarding with their girlfriends) with "how many other US users have hypothetically installed anti-virus software" on the x-axis, and "how much would I pay to live in that world" on the y-axis. At the point on the graph where no other people have anti-virus software, I'm willing to pay $0 to live in that world. (Well, of course I'd pay a lot more than $0 to be alive in any world, but I'm comparing other worlds to that one, so I'm just using $0 as my baseline.) At the point on the x-axis where all 100 million other users have installed anti-virus software, I'm willing to pay $10 to live in that world instead. What does the graph look like in between those points? Well, I can assume it's upward-sloping — the more other people install anti-virus software, the better it is for me. I could also adopt the simplifying assumption that it's a straight line — so I would pay $3 to live in a world where 30 million other people have anti-virus software installed, $6 to live in a world where 60 million other people have it installed, etc. It's not really a straight line, because when the first 50 million Americans install anti-virus software, that still leaves 50 million others to get infected and do damage, but when the next 50 million install it, that has eliminated all the unguarded computers in the US, and made it a lot harder for viruses to spread, at least within our borders. In other words, the line representing the quality of life to me as a function of how many other people installed anti-virus software, would rise more slowly in the range 0-50 million than it would rise in the range 50-100 million. But as long as the curve doesn't make any sudden jumps — for example, I know that the 30-millionth person installing anti-virus software isn't suddenly going to make my quality of life go up by $1 — I know the curve generally has to rise smoothly. So for a really rough approximation I'll treat it as a straight line.
If the graph is a straight line with the value $0 when nobody else installs anti-virus software, and $10 when everybody else installs anti-virus software, then each additional user installing anti-virus software creates an additional benefit to me of 1/100,000th of a penny (so 1/100,000th of a penny, times 100 million, comes out to $10).
You may think it's ridiculous or meaningless to say that someone else installing anti-virus software can benefit me to the tune of 1/100,000th of a penny. I myself can't wrap my head around it. But I can use the necessary properties of the graph — that it starts at $0, ends at $10, must curve upward, and doesn't make any sudden jumps — to reason that it should be approximately true.
And then, if each other US Internet user derives an average of 1/100,000th of a penny's worth of benefit when you install anti-virus software, then the total benefit that you confer on other people by installing the software, comes out to 1/100,000th of a penny times 100 million, or $10. And that's not even counting all the spillover benefits to users in other countries each time an American installs anti-virus software, something that we could consider a kind of off-the-books foreign aid. (Even if we would really like for it to be reciprocated by all users in countries like China installing anti-virus software as well.)
This is actually not hard to reconcile with people's attitudes toward installing anti-virus software. It's recommended as something you should do not only for your own protection, but also as something you should do to be a "good Netizen" so as not to impose inconveniences on other people. If your installing anti-virus software only conferred about 1 penny's worth of total benefit on the rest of the world, nobody would bother exhorting you to do it as a kind of civic duty. On the other hand, if your installing anti-virus software conferred thousands of dollars' worth of good on the world (or, equivalently, not installing anti-virus software exposed the rest of the world to thousands of dollars' worth of risk or damage), then people would not only be exhorted to install it, it would probably be required by law, like functioning car brakes. The kind of pressure that we see today to install anti-virus software — gentle prodding but not outright compulsion — feels commensurate with a value between $1 and $100 of the benefits that a person confers on the rest of the world by installing it.
But this logic also means is that we are missing an opportunity to make everybody better off on average, by actually subsidizing the purchase of anti-virus software for some people who otherwise would not have bought it. Suppose each user confers $10 worth of positive externalities on other American Internet users when they install anti-virus software. Now first consider the case of an a program like Norton Anti-Virus which costs $40.
For anybody who personally values their own anti-virus protection at $40 or more, great — they'll buy the software, they get the value they want from it, and everybody else gets the positive externalities of that person's virus protection, for free. But consider the people who value the anti-virus software at somewhere between $35 and $40. With no government rebate, they won't buy the software.
But now suppose the government offers a $5 rebate (funded by a tax on all 100 million Internet users) to anyone who buys anti-virus software. Everybody who would have bought the software before, will obviously still buy it now that the government rebate has effectively lowered the price to $35, and now, all the people who value the software between $35 and $40 will buy it as well. For each person who purchases the software at the new price of $35, the following is true:
The person who bought the anti-virus software is better off — they valued the software at at least $35, and they got it for $35. (Otherwise, they wouldn't have bought it.)
The taxpayers who subsidized the purchase are better off. Each rebate cost the taxpayer one-hundred-millionth of $5. But when that user installed the anti-virus software, they conferred $10 worth of total benefit on all other Internet users in the US, so that benefits each Internet-using taxpayer one-hundred-millionth of $10. So they're ahead.
If this seems fanciful, we're still in the domain of standard economics textbook stuff. When positive externalities are involved, the free market by itself will usually not reach the optimal outcome; by adding in some government subsidies, you can achieve an outcome that leaves everyone better off than they were before (even after subtracting the cost of the taxes to fund the subsidies). Call them "subsidies even a libertarian could love." Steven Landsburg's books The Armchair Economist and More Sex Is Safer Sex, and Tim Harford's books The Undercover Economist and The Logic Of Life, explain the logic of externalities probably better than I can, and give other interesting examples. When I say "subsidies even a libertarian could love," consider that Landsburg once wrote that George W. Bush's tax plan was unfairly burdensome to the rich, because "it seems patently unfair to ask anyone to pay over 30 times as much as his neighbors." That's pretty, uh, libertarian. But even Landsburg has argued, in More Sex Is Safer Sex, that LoJack anti-car-theft devices should be heavily subsidized by the government, because they create positive externalities — when more people buy LoJacks, thieves are deterred from stealing everyone's cars, because there's no way to tell whether a particular car has a LoJack installed or not. To the extent that anti-virus software creates positive externalities, it should be subsidized as well.
A modified version of this logic applies even to free anti-virus programs like AVG Anti-Virus. AVG is only "free" if you don't count the costs of finding out about it in the first place, then downloading it, installing it, and leaving it running. All of these add up to costs that, for whatever reason, have led to many people choosing to run nothing at all, rather than to run AVG even though it's free. If the government ran a campaign announcing the rebates for purchasers of anti-virus software, they could also use the campaign to recommend certain free programs -- thus effectively offsetting the "costs" by providing a "subsidy" for those programs in the form of free advertising.
When I ran this past some people for comment, two respondents, Steven Landsburg and Esther Dyson, independently recommended versions of a popular alternative idea, which was to penalize people directly for spreading computer virus infections. Landsburg commented:
I certainly think there are huge externalities here, and they derive from the fact that idiots who don't know what they're doing insist on administering their own mail clients. I don't have a mail client on my machine precisely because I am one of those idiots and I don't want to be responsible for a virus grabbing my address book and running with it. So I have long thought that mail clients should be taxed and/or (if it were technologically feasible) that individual users should be fined heavily if viruses spread from their machines (or send spam from their machines).
Esther Dyson suggested something similar:
One method to consider is — rather than subsidy — requiring the ISPs to post a bond for their customers and assume responsibility for their actions. They can ask their customers in turn either to buy an antivirus package, to sell one that the ISP will offer for free, or to post a bond guaranteeing that they know what they're doing and will do no harm. The ISP is then liable for the misbehavior of its customers and may forfeit the bond if some specified level of disruption is caused by its customers.
In theory, this works better than my idea because it precisely targets the undesirable behavior: We don't really want to penalize people for not running anti-virus software, we want to penalize people for not running anti-virus software and imposing costs on others as a result. It's not possible for 100 million people to charge one person 1/100,000th of a penny each for the inconvenience and risk that person creates by not installing anti-virus software, but it might be possible for one recipient of the virus to seek to punish the person who gave it to them.
However, I think this scheme would have more practical problems:
You can only penalize the virus spreader if you know exactly who was responsible for passing it on to you. This works for old-school viruses that spread as e-mail attachments, but not for worms like Code Red that probe the network looking for other machines to infect — if you're infected as a result of a remote IP address probing your machine, it's unlikely that you would ever find out exactly when or how it happened, much less the owner of the IP address that infected you.
If you found out that a friend spread a computer virus to your machine, you'd probably be under a lot of pressure from your friend not to turn them in.
For people who did get taken to court for spreading viruses, there would be overhead costs associated with processing the case, over and above the actual fine that may be levied against the individual. (If the penalty happens outside the court system — for example by ISPs keeping the bond posted to them by a customer — at least some of those customers will probably feel wronged and sue the ISP, generating court costs either way.)
If someone accidentally spread a virus to a large number of other machines, that could make their total liability far greater than what they could actually pay.
The idea of fining or otherwise punishing people for accidentally spreading viruses is something I've thought about too, but usually in a moment of venting. As Steven Landsburg dryly says, "Your solution (subsidized antivirus software) might be more effective, but mine would be more satisfying (to me)." I think the option of punishing people for propagating viruses is something that should be explored in more detail, but I can't offhand think of any solutions that would avoid the problems listed above. The fact is that anybody with an Internet connection has the potential to do enormous damage if their machine gets infected, and in most cases it would be too hard to track the harm back too them, and too harsh to make them pay the real cost of the damage.
On the other hand, the option of a government publicity campaign to get people to install anti-virus software — at least the free ones, which should be a no-brainer — is something that seems like it should start bringing benefits right away. Government advertisements for free programs would require the least amount of paperwork to set up, because all the government would have to do would be to produce the TV ads and buy the airtime. (Other proposals, such as subsidies for non-free anti-virus software, or paying people outright to install anti-virus software, would require more overhead to implement. That doesn't mean they shouldn't be tried, but go for the low-hanging fruit first.) Now, what the ads should look like would be a question for advertising experts, but I would really hammer home the point: "Go to this government website and we have a list of recommended FREE anti-virus programs. These are not 'free trials' for something you have to pay for later. They are FREE. If you're not using anything at all, at least go get one of these." Along a list of the non-free programs for people who want even more protection, and links to third-party reviews of those.
More generally, I think that government-funded action to encourage better computer security is something that has not been given enough consideration. I think this is partly due to hostility to anything that smacks of government intervention (because of, among other things, numerous times the US government has attempted to censor the Internet), and partly because of an assumption that the free market will provide the best solution by itself. But if the government is actually on the right side of an issue — the side of promoting better computer security — then there's no reason to be petty and foul up their campaign just because we're still resentful that they once tried to make the Internet into a no-cussing zone. Hey, if the government thugs start to care more about computer viruses than about Internet porn, then they're learning! Give them a pat on the head and help them get the word out! And meanwhile, economic theory predicts that because of the externalities problem, the free market by itself won't lead to the optimal number of people using anti-virus software or keeping their computers secure. That's precisely the situation where a government-funded push toward more computer security can bring everyone more benefits than it costs. If you wear a Ron Paul t-shirt, but you found out about free anti-virus software software from a state-sponsored TV ad, nobody has to know.

Monday, May 4, 2009

Dr. Mac:' Anti-Virus’ isn’t what you’ve heard it is

I was listening to one of my favorite radio shows, the weekly news quiz program Wait Wait … Don’t Tell Me, on National Public Radio last week when I heard something quite disturbing. The question was: “Computer security experts reported that a new virus that specifically targets has been discovered.” And, according to host Peter Sagal, the answer was, “Mac computers.”
I’m sorry Peter, but much as I love your show , I believe your answer is both incorrect and misleading. Unfortunately, other sources including CNN and Fox News have carried similar misinformation. Let me try to set the record straight.
Flame on.
• First: The so-called virus that raised a ruckus in the news in late April isn’t a virus at all. Rather, it’s a Trojan horse known as OSX.Trojan.iServices.A (sometimes referred to as iBotNet). While this may be splitting hairs, a Trojan horse is not a virus. The Wikipedia definition of a Trojan horse is: A class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine. In the case of OSX.Trojan.iServices. A, the malicious content has only been found in bootleg copies of Apple’s iWork ’09 productivity suite and Adobe Photoshop CS4 found on BitTorrent trackers and other sites containing links to pirated software.
• Second: OSX.Trojan.iServices.A isn’t new. In fact, Intego, a popular vendor of security software products for Macs and PCs, first reported it on Jan.22. Why it took until late April to hit the mainstream media is anyone’s guess, but it’s nothing new to savvy Mac users who have been hearing about it for months.
• Third: Only a tiny number of Mac users were affected. If you were among them, and you provided the bogus iWork ’09 or Photoshop CS4 installer with your Admin password, your Mac may have been infected and could now be part of a bot network controlled by the malware’s creator.
• So: If you think your Mac is infected with this Trojan horse, SecureMac has posted a free removal tool at http://macscan.securemac.com. If, on the other hand, you’re among the millions of Mac users who are not software thieves and don’t install pirated software, you have little to worry about.
If all this has you wondering whether you should be running anti-virus software on your Mac, I urge you to read, “Should Mac Users Run Antivirus Software,” an excellent article by security expert Rich Mogull that you’ll find here: http://db.tidbits.com/article/9511.