Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    Fighting Spyware Is Never-Ending Battle

    Written by

    Andrew Garcia
    Published January 9, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Early adopters of anti-spyware products may focus primarily on a products ability to identify and clean spyware on the desktop, but eWEEK Labs recommends that administrators be proactive—emphasizing new practices or technologies that thwart malware threats before installation while being aware of the potential for complications that could arise in doing so.

      Anti-spyware vendors are in a constant tug of war with malware writers, trying to cope with and compensate for new technologies that make malware harder to identify and eradicate. For example, the latest malware instances may use rootkits to hide their presence, self-healing mechanisms to spontaneously regenerate when threatened and active processes that try to disable resident security programs.

      Because signature-based scanning and cleaning is, in essence, a reactive process, any anti-spyware program under test is unlikely to be able to identify and clean each malware instance in an enterprise network. In fact, its commonly accepted wisdom in the field that administrators may need to use a combination of products to eradicate every threat.

      Administrators would be wise to examine methods of keeping spyware off the desktop in the first place. Last month, eWEEK Labs spoke with several organizations that are successfully avoiding malware by restricting users privileges on the local system—in short, they are effectively avoiding spyware by denying users the right to install it. Another tack, implementation of gateway-based detection technology, will help protect users connected to the corporate network. (eWEEK Labs will examine gateway-based anti-spyware in a forthcoming issue.)

      /zimages/2/28571.gifIs system lockdown the secret weapon? Read more here.

      Desktop anti-spyware vendors also are making dramatic leaps in their products ability to block spyware installation. Early blocking technologies using real-time scans that instigate scanning and cleaning as files are written to disk have proved insufficient against the latest hardened threats, but newer technologies seen from vendors including Aluria Software, Tenebril Inc. and Webroot Software Inc. are increasingly using kernel-level drivers to identify threats before they are installed.

      By hooking into the kernel, these products are more effective at blocking threats because they monitor read and write commands from the operating system to the file system, identifying and eliminating threats before they are written to disk.

      Unfortunately, this penetration deep into the operating system provides more opportunities for conflict with existing security solutions, such as anti-virus software, that also use kernel-hooking techniques. As more programs interact at the kernel level, there is a greater chance that the programs will conflict with one another, which could cause the system to become unstable.

      /zimages/2/28571.gifClick here to read more about anti-spyware with kernel-mode features.

      In past reviews, weve praised integrated solutions from McAfee Inc. and Panda Software International S.L. for their advanced ability to block spyware before installation. Combining this anti-spyware capability into a single-agent architecture on the desktop, these products and others like them are in a position to provide a more stable computing environment (even as we await further improved scanning and cleaning capabilities from these integrated systems).

      By increasing the emphasis on blocking spyware before it can gain a foothold on the desktop, enterprises can also use regular scans for auditing purposes rather than as a front line of defense. To achieve compliance with regulatory mandates including the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, HIPAA (Health Insurance Portability and Accountability Act), and Payment Card Industry regulations, organizations will need to ensure—and demonstrate—that desktop systems are not compromised. Reports from regularly scheduled scans can provide the necessary proof, while also offering cleaning services for the occasional threat that may slip through the front line of defense.

      Of course, this new role for anti-spyware defenses will require across-the-board improvements in reporting capabilities. Anti-virus and anti-spyware vendors would do well to create new report templates that are tailored to each particular set of regulations.

      We predicted in anti-spyware reviews early last year that the shelf life of the stand-alone anti-spyware system is coming to an end. Customers will demand and will be better served by an integrated security solution that provides anti-virus, anti-spyware, intrusion prevention and desktop firewall capabilities, while reducing management complexity and opportunities for system conflicts.

      We remain confident that this prediction will come to pass. As Trend Micro Inc., EarthLink Inc. and CA have gobbled up various anti-spyware companies during the last year and a half, the number of relevant independent anti-spyware-only vendors has dwindled. And Sunbelt Software Inc.s recent acquisition of Kerio firewall technology indicates that this anti-spyware pure play will soon produce its own integrated suite as well.

      Technical Analyst Andrew Garcia can be reached at andrew_garcia@ziffdavis.com.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Andrew Garcia
      Andrew Garcia
      Andrew cut his teeth as a systems administrator at the University of California, learning the ins and outs of server migration, Windows desktop management, Unix and Novell administration. After a tour of duty as a team leader for PC Magazine's Labs, Andrew turned to system integration - providing network, server, and desktop consulting services for small businesses throughout the Bay Area. With eWEEK Labs since 2003, Andrew concentrates on wireless networking technologies while moonlighting with Microsoft Windows, mobile devices and management, and unified communications. He produces product reviews, technology analysis and opinion pieces for eWEEK.com, eWEEK magazine, and the Labs' Release Notes blog. Follow Andrew on Twitter at andrewrgarcia, or reach him by email at agarcia@eweek.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×