Feeds

Anti-spyware group defines detection guidelines

Who's bad

Internet Security Threat Report 2014

The Anti-Spyware Coalition (ASC), an alliance of software companies, security firms and consumer organisations, has agreed a set of guidelines on detecting invasive finalised spyware. The final draft of the ASC's "risk-modeling description" aims to give an objective criteria on whether a program is malign. A draft of this description was thrown open for public comment in October and the final version that's emerged is essentially an expanded and polished version of what we had back then.

The group defines spyware and other potentially unwanted technologies as deployed without appropriate user consent and/or implemented in ways that impair user control over: material changes that affect their user experience, privacy, or system security; use of their system resources, including what programs are installed on their computers; and/or collection, use, and distribution of their personal or other sensitive information.

The final "risk modeling" document, which explains the criteria anti-spyware vendors use to determine whether or not to label a piece of software as "spyware" can be found here.

In addition, ASC finalised the list of speakers for its first public meeting (snappily subtitled Defining the Problem, Creating Solutions) which is due to take place on 9 February at the Hyatt Capitol Hill in Washington DC. Federal Trade Commission (FTC) Chairman Deborah Platt Majoras will keynote at the single day event, which will also feature federal regulators, and top state technology and law enforcement officials. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.