Feeds

AVG finally bothers with behaviour-based defences

And what time do you call this?

Top 5 reasons to deploy VMware with Tegile

AVG has belatedly introduced behaviour-based anti-malware protection to its line of paid-for security products.

AVG Internet Security 8.5, released on Monday, adds behaviour-based security technology to existing pattern-based detection. The technology comes from the recent acquisition of Sana Security. Sana's technology will also be available as a standalone product, called AVG Identity Protection, which will be priced at $19.99, and can work with other vendors' anti-virus products.

Many of the leading AV engines have relied for years on generic detection and heuristic technology, which is another way of describing behaviour-based detection, to identify malware. Paul Burke, newly-appointed VP of product management at AVG, said the difference with AVG was that its technology incorporated supplemental analysis and back-end lookups to avoid problems such as false positives.

Blocking malware on the basis of its behaviour, rather than recognising its signature, is a straightforward enough concept but one mired in rival marketing claims that are sometimes difficult to unravel. AVG's use of the term Identity Protection adds reference to a buzz word but boils down to technology that shuts down banking Trojans if any attempt is made to log keystrokes, for example.

AVG Identity Protection gives computer users an additional layer of protection on top of their existing security software. IDP is specifically focused on helping to prevent thieves from using carefully-targeted attacks to steal passwords, bank account details, credit card numbers, and other digital valuables.

It uses a technology called behavioral analysis to make sure all the programs running on a user's computer are operating the way they should. If it spots something suspicious that could indicate an attempted ID theft attack, it shuts that activity down, preventing any possible theft from happening.

AVG quotes a user base of 80m, and though it doesn't say what percentage uses the better-known free version, it's safe to say it's the vast majority. AVG's free product also got a boost with the 8.5 rev of the product, adding safe-surf to existing anti-virus, anti-spyware and safe-searching capabilities.

Both the safe-surf and safe-searching software flow from AVG's acquisition of the Linkscanner technology from Exploit Prevention Labs. LinkScanner Search-Shield, which places safety ratings next to search results, debuted with AVG 8.0 and caused severe problems for webmasters tarnished by AVG's black list.

The LinkScanner Search-Shield component scanned every result on a page returned by a search, using a user agent that was deliberately almost indistinguishable from a surfer visiting a site using Internet Explorer. This "traffic-spewing" behaviour distorted site visitor statistics, especially for sites with high search engine ranking, while simultaneously sucking up extra bandwidth.

AVG responded to criticism by changing the technology so that it didn't pre-scan every page returned by a search query, instead relying on a local blacklist, and pre-fetching and scanning only those links selected by a surfer.

The added safe-surf component, which users of the paid version of the product have enjoyed since last year, brings in-line protection into the mix and because it analyses only sites users are actually about to visit doesn't pose the same potential problems as the unmodified safe-search feature.

In another catch-up development, AVG added centralised anti-spam protection to its small-business targeted Exchange Server product. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.