Feeds

Security firms split over Phorm classification

Pushing onto the borderline

The essential guide to IT transformation

Security firms are split about whether they will classify Phorm's targeting cookies as adware.

Kaspersky Lab, whose anti-virus engine is licensed to many other security vendors, said it would detect the cookie as adware. However, AVG, developer of the most widely used free of charge anti-virus scanner, said it would not detect Phorm's cookie even though the Czech firm's CTO Karel Obluk describes the technology as "borderline".

AVG has decided not to detect Phorm cookies. The reason for this is that the cookies themselves do not store information about browsing habits and visited pages.

In this instance it is the ISP that monitors your surfing and forwards the information to Phorm. It is not possible to use these cookies to identify the actual pages you browse without cooperation from your ISP. In addition to that, if we were to block Phorm cookies then we would prevent users from being able to unsubscribe from the service

We believe that Phorm lies just outside the boundaries of being classified as adware - they adhere to the recommendations laid down by the Anti-Spyware Coalition requiring user consent. A user must accept the user licence agreement to make the service active and they allow users to unsubscribe from the service.

AVG regards what Phorm is doing as borderline but we have to concede they have made every attempt to try to stay on right side of that line.

Our view is based on information from public sources - we have not had any direct insight into their technology.

AVG's worries about informed consent by ISP subscribers, reservations about Phorm's preferred approach of obliging users to opt-out, and a lack of engagement between Phorm and security suppliers are echoed across the industry.

If security firms add detection for Phorm then users running a scan would get a warning that their ISPs have dropped either a Phorm opt-in or an opt-out cookie onto their systems.

As previously reported, Trend Micro said there was a "very high chance" that it would add detection for the tracking cookies as adware. PC Tools echoed Trend's concerns about privacy and security, urging Phorm to apply an opt-in approach.

Specialist anti-spyware firm Sunbelt Software also expressed concerns, saying Phorm's tracking cookies were candidates for detection by its anti-spyware software.

While we don't generally consider cookies to be adware (adware is a form of locally installed software; cookies are mere inert data), our anti-spyware products do target "tracking" cookies used by online advertising networks to gather data about surfers' web usage across sites/domains because these types of cookies do pose potential privacy concerns. Phorm's cookies fall into this category and are candidates for being targeted by our anti-spyware applications.

Webroot, another prominent anti-spyware firm, reported difficulties at getting samples of Phorm's tracking cookies for evaluation purposes.

We are detecting earlier generations of this adware, and our research team is still researching this most recent version as it is challenging to get samples due to the closed nature of the distribution at the moment.

On a general note, we have a predefined set of criteria (mainly based on the properties and behaviour), which we are using to decide if a particular sample should be detected or not, and which are applied universally.

We polled a number of security firms on their attitudes to Phorm. We are waiting for responses from Symantec and McAfee, the two largest anti-malware vendors, as well as Check Point, which markets the popular Zone Alarm personal firewall. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.