Subject: General Tech | March 6, 2014 - 06:32 PM | Jeremy Hellstrom
Tagged: security, Android, antimalware, PUPs
Malwarebytes have recently updated their Android app to hunt down and slay PUPs, aka potentially unwanted programs or bloatware. These are the apps which harvest an excessive amount of personal data without making it clear why they do so as well as those which use questionable tricks to present ads to the user even when they are not actively using those apps. This is more than security, it will hunt down apps that drain the battery or simply demand more access that they reasonably should. This could be somewhat of a concern for developers who's apps are flagged as PUPs but the user will get the choice to allow the app to continue to run as it has in the past. Learn more at The Inquirer.
"ANTI-MALWARE FIRM Malwarebytes has updated its free mobile security app to protect users from the rise of what it calls "Potentially Unwanted Programs" (PUPs) affecting Android users."
Here is some more Tech News from around the web:
- Even HTTPS can leak your PRIVATE browsing @ The Register
- HANA on a minute – is that a 10PB RAM cloud server from SAP? IT IS @ The Register
- My Kronoz ZeSplash Smartwatch Prototype Review @ TechwareLabs
- HTML is a sexually transmitted disease, say many Americans @ The Register
- Exclusive interview with Thermaltake CEO Kenny Lin @ Kitguru
Subject: Editorial, General Tech | May 22, 2013 - 05:53 AM | Scott Michaud
Tagged: antivirus, antimalware
They might be a good means of guarding you from momentary lapses of judgment, but security is not equivalent to antivirus packages. You always need to consider how much your system is exposed to untrusted and even unsolicited data. Any software which accepts untrusted data has some surface with potential vulnerability to attack.
This, inherently, includes software which accepts data to scan it for malware.
Last week was host to Patch Tuesday, and one of its many updates fixed a vulnerability in Microsoft's Malware Protection Engine (MPE). The affected code is only present in applications which run the 64-bit version of the engine. For home users, these applications are: Microsoft Security Essentials (x86-64), Microsoft Malicious Software Removal Tool (x86-64), and all varieties of Windows Defender (x86-64). For enterprise users, MPE is also a part of Forefront and Endpoint applications and suites.
Despite the irony, I will not beat up on Microsoft. As far as I know, these vulnerabilities are semi-frequently patched in basically any antimalware application. At the very least, Microsoft declares and remedies problems with reasonable and appropriate policies; they could have just as easily buried this fix and pushed it out silently or worse, wait until it becomes actively exploited in the wild and even beyond.
But, and I realize I am repeating myself at this point, the biggest takeaway from this news: you cannot let the mere presence of antivirus suites permit you to be complacent. No scanner will detect everything, and some might even be the way in.