Feeds

AVG chokes fake traffic spew

LinkScanner to quit scanning links

Maximizing your infrastructure through virtualization

Updated After howls of protest from countless web masters, AVG has promised to quit spewing fake traffic across the internet.

Earlier this year, the Czech-headquartered security company paired its new anti-virus engine, AVG 8, with a real-time malware scanner that vets search engine results before you even click on them. If you search Google for "depressed tigers", for instance, the AVG LinkScanner automatically visits each link that appears on the results page.

Downloaded by more than 20 million people worldwide, the tool has caused considerable traffic spikes on sites large and small, and because it attempts to hide itself behind the user's IP address, web masters are struggling to filter this fake traffic from their log files - if they're even aware it's fake. Meanwhile, some site owners complain the tool is forcing them to pay for extra bandwidth.

But in a recent post to Whirlpool - an Australian tech discussion forum - AVG says that on July 9, it will roll out a new version of the tool that does not pre-scan search results. And a similar message was fired to Daniel Brandt, the man behind protest site AVG Watch.

According to these missives, the paid version of LinkScanner will continue to scan links after users click on them.

Stay tuned for more. LinkScanner has promised us a chat. ®

Update

In a statement over the weekend, AVG said it would push out an updated version of its Search-Shield software that will "only notify users of malicious sites" and will no longer scan every search result. This patch is already available to users of the free version of the software, and will be rolled out to paying customers on July 9. See this article's comments page for further details.

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.