Feeds

AVG slaps Trojan label on Adobe Flash

Third false alarm follows upgrade offer

Beginner's guide to SSL certificates

AVG, the popular anti-virus package, has falsely identified Adobe Flash as potentially malicious. The snafu comes just days after AVG slapped a bogus Trojan warning on a core Windows component.

Users on AVG forums complained on Friday that Adobe Flash was detected by AVG's scanner as malicious, following a recent update. The gaffe follows an even more glaring screw-up when user32.dll, a core Windows component, was identified as a banking Trojan following a signature update issued on Sunday. Users who followed AVG's advise and deleted the "harmful file" were left with systems that either failed to boot or went into a continuous reboot cycle. Users of both AVG 7.5 and 8 (free and full-feature editions) were affected.

Less than a month ago AVG identified CheckPoint’s Zone Alarm as a Trojan.

False alarms by anti-virus scanners are a well-known Achilles heel. Everybody who's anybody has problems with false alarms from time to time but to have three such problems in less than a month is difficult to defend.

Quizzed on the latest issue AVG said it had nothing to add to a statement issued on Thursday, before the Flash problem blew up, offering users affected by the Windows component snafu a free one-year license or license extension. "AVG Technologies apologizes again for the inconvenience caused to our customers and wishes to assure our users worldwide that the company is actively putting new processes in place to avoid similar occurrences in the future," it said.

It's scarcely believable but a day later there's another problem of the same type.

Everybody at the Czech-based firm, particularly those in its quality assurance unit, ought to be be thoroughly ashamed of themselves.

We've liked AVG as a firm, and a software package for years, but its serial false alarm problems shake this confidence, even without taking into account the fake traffic spew problems last summer. We'd offer you an image of AVG in a dunce's cap but our graphics artist is already at the pub. As an alternative we offer you this fine selection of football own goals (below) to make much the same point. ®

Internet Security Threat Report 2014

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.