Feeds

Grisoft acquires LinkScanner

'Antivirus is dead'

Internet Security Threat Report 2014

Grisoft is to acquire Exploit Prevention Labs, a maker of software that gauges the safety of websites before end-users visit them. Grisoft will fold the technology into its AVG family of security software.

The acquisition, which is expected to close by the end of the month, will help Grisoft compete against its three bigger competitors, McAfee, Symantec and Trend Micro. By integrating EPL's LinkScanner technologies into its antivirus and internet security products, Grisoft can warn customers about risky sites before they click on them.

Over the past 18 months, it's become commonplace for even large, reputable websites to be vectors of malware. Last month, for instance, the IndiaTimes website was found to be serving up at least 434 malicious files, many of which are not detected by anti-virus software, according to researchers at ScanSafe, another company that provides real-time analysis of websites.

"It became pretty obvious that the old antivirus [model] is dead, to be honest," said JR Smith, who became CEO of Grisoft earlier this year. "We're moving away from just protecting your laptop after you've been infected."

LinkScanner sits on a user's computer and monitors the outside world for exploits. When it detects one, it drops the connection, which prevents the attack from succeeding. It then reports the incident back to a central database so it can warn users who try to visit the same destination. LinkScanner automatically analyzes results returned by Google and other search engines and places a check mark next to sites believed to be safe.

Grisoft plans to offer LinkScanner Pro as a standalone product and also as part of the professional versions of its antivirus program and internet security suite. The company will integrate LinkScanner Lite, which contains fewer features, with a free version of AVG.

The companies didn't disclose financial terms. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.