Feeds

AVG slaps Trojan label on Adobe Flash

Third false alarm follows upgrade offer

Protecting users from Firesheep and other Sidejacking attacks with SSL

AVG, the popular anti-virus package, has falsely identified Adobe Flash as potentially malicious. The snafu comes just days after AVG slapped a bogus Trojan warning on a core Windows component.

Users on AVG forums complained on Friday that Adobe Flash was detected by AVG's scanner as malicious, following a recent update. The gaffe follows an even more glaring screw-up when user32.dll, a core Windows component, was identified as a banking Trojan following a signature update issued on Sunday. Users who followed AVG's advise and deleted the "harmful file" were left with systems that either failed to boot or went into a continuous reboot cycle. Users of both AVG 7.5 and 8 (free and full-feature editions) were affected.

Less than a month ago AVG identified CheckPoint’s Zone Alarm as a Trojan.

False alarms by anti-virus scanners are a well-known Achilles heel. Everybody who's anybody has problems with false alarms from time to time but to have three such problems in less than a month is difficult to defend.

Quizzed on the latest issue AVG said it had nothing to add to a statement issued on Thursday, before the Flash problem blew up, offering users affected by the Windows component snafu a free one-year license or license extension. "AVG Technologies apologizes again for the inconvenience caused to our customers and wishes to assure our users worldwide that the company is actively putting new processes in place to avoid similar occurrences in the future," it said.

It's scarcely believable but a day later there's another problem of the same type.

Everybody at the Czech-based firm, particularly those in its quality assurance unit, ought to be be thoroughly ashamed of themselves.

We've liked AVG as a firm, and a software package for years, but its serial false alarm problems shake this confidence, even without taking into account the fake traffic spew problems last summer. We'd offer you an image of AVG in a dunce's cap but our graphics artist is already at the pub. As an alternative we offer you this fine selection of football own goals (below) to make much the same point. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.