Feeds

MS virus clean-up tool sparks controversy

False sense of security?

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Microsoft debuts a malicious software removal tool today. It represents the first tangible fruits of Microsoft's June 2003 acquisition of Romanian anti-virus firm GeCAD Software.

The Microsoft Windows malicious software removal tool consolidates utilities released by Microsoft to remove viruses such as Blaster from infected systems. This clean up tool will be made available through Windows Update or as a separate download and updated on the second Tuesday of each month under Microsoft's monthly software security update process. Microsoft hopes the tool will be widely used and is releasing it free of charge.

With monthly updates and limited functionality, Microsoft's tool is best used to clean up infection from PCs; it isn't much help in preventing virus infection in the first place. Microsoft advises users to use third party anti-virus scanners and advocates Windows XP SP2 as a defence against viral infection. The company is also taking a more active role in the fight against spyware with the release last week of the first beta version of Microsoft Windows AntiSpyware.

Beats, as it sweeps, as it cleans

Despite the limited scope of the clean-up tool, some anti-virus firms annoyed that Microsoft is treading on their turf. John Cheney, CEO of email filtering firm BlackSpider Technologies, said consumers might wrongly come to believe Microsoft's tool protected them from virus infection.

"The signature-based AV solutions, such as the GeCAD solution purchased by Microsoft performs poorly against fast-moving virus outbreaks. It will be interesting to watch how well Microsoft performs in the update / patch management process, where speed is essential to minimise damage from a virus outbreak, compared with the big AV vendors who have years of experience in producing and testing virus signatures quickly," he said.

"Microsoft should spend more time, energy and money addressing its own security weaknesses inherent in its products, which are exploited by virus writers and hackers, and less time trying to erode the businesses of existing security vendors."


BlackSpider neglects to mention that conventional anti-virus scanning software is far from foolproof either, even when signatures are kept up to date (which often doesn't happen). That's part of the reason Microsoft released a Blaster clean-up tool, the widespread use of which eventually led to today's more comprehensive clean-up tool. This may be no great shakes but could help reduce the number of Windows PCs infected with mass mailing worms. Months-old worms like NetSky-P continue to top virus charts, so something must be done. ®

Related stories

Microsoft buys anti-spyware firm Giant
Microsoft Anti-Spyware?
Mystery of MS's missing AV software
MS bigs up Windows XP SP2
Microsoft's high-risk security strategy
Vendors wary of MS Windows Firewall
Microsoft enters AV market
Blaster clean-up tool was stellar success - MS

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.