Feeds

Anti-Spyware definitions finalised

Cover blown

New hybrid storage solutions

The Anti-Spyware Coalition (ASC), an alliance of software companies, security firms and consumer groups, finalised its definitions of spyware on Thursday.

The group defined spyware and other potentially unwanted technologies as those deployed without appropriate user consent and/or implemented in ways that impair user control over: material changes that affect their user experience, privacy, or system security; use of their system resources, including what programs are installed on their computers; and/or collection, use, and distribution of their personal or other sensitive information.

ASC also published a "risk modeling" document that explains the criteria anti-spyware vendors use to determine whether or not to label a piece of software as "spyware." The document, which contains a fair amount of technical detail, is designed to help consumers to better understand how security products work, as well as offering anti-spyware companies guidelines for their own proprietary rating processes. The risk modeling language will be open for public comment until 27 November on the ASC Web site.

"The spyware definitions give those of us united in the battle against spyware a common language, while the risk-modeling document clearly lays out the behaviors that make certain software dangerous. These developments move us closer to a world in which consumers have the upper hand over those who create malicious, unwanted technology," said Ari Schwartz, Associate Director of the Center for Democracy and Technology, which has led the work of the group.

In addition, ASC announced that its first public meeting will take place on 9 February at the Hyatt Capitol Hill in Washington DC. A second public meeting will take place in Ottawa, Canada on 16 May. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Leak of '5 MEELLLION Gmail passwords' creates security flap
You should be OK if you're not using ANCIENT password
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Enigmail PGP plugin forgets to encrypt mail sent as blind copies
User now 'waiting for the bad guys come and get me with their water-boards'
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.