Feeds

Anti-virus protection gets worse

What is this thing you call heuristics?

Using blade systems to cut costs and sharpen efficiencies

Antivirus software is getting worse at protecting users from new threats, according to two reports which found malware authors are getting better at disguising their creations.

German computer magazine c't studied 17 antivirus programs and exposed them to completely new samples of malware. What they found wasn't encouraging. Detection rates sank to 20-30 per cent, from 40-50 per cent in a similar test last year.

The c't researchers also created variants of known viruses and found that virtually all of the scanners missed at least some of them.

Plenty of questions remain about the report, which is scheduled to be published in January. (Heise has a brief synopsis of the report here.) It would be helpful to know the methodology and what products were tested.

But taken at face value, the research raise questions about the effectiveness of heuristic engines. Heuristic scans examine the code inside a file for suspicious behavior and flag those it thinks have a high likelihood of being malicious. Because they don't need virus definitions, they can provide better protection immediately following the release of a new virus.

A second report, released Thursday by researchers from Kaspersky Labs, said online scanners may be contributing to the deterioration of heuristics. Sites such as VirusTotal, for instance, allow a user to scan a suspicious file. The site then compares the code against 32 antivirus products to check for malicious code.

"But as so often happens, something that can be used for good - helping users check the integrity of their files - can also be used by virus writers," the researchers note. "They quickly caught on to the fact that services like the ones mentioned above could be used to test how well their creations can evade popular antivirus solutions."

They document websites such as AvCheck.ru, which charge as much as a dollar per scan and promise not to submit the files to antivirus companies. That way, malware developers can be assured their works in progress won't be sent to antivirus companies.

Bright spots in the c't report: Eset's NOD32 detected 68 per cent of the completely unfamiliar attacks. And F-Secure was "able to perform convincingly in the behavioural blocking test", which measured how well a product protected a machine from getting infected. Kaspersky and BitDefender also got high marks. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.