Hot Topics
RSS FeedMalware and Software Solutions
Security Update
Mar 7
More than ever before, security software is needed. However, as Ben Furfie found when he investigated, more and more PC users are beginning to think they know enough to be secure without the need for dedicated software, just as criminals begin to use psychological methods to ensnare more than ever...
Long ago, the dynamics of viruses and malware changed drastically. Gone are the days when crackers released crippling viruses with the sole aim of breaking PCs and gaining notoriety through the media fuss it would create.
But are the media panics around malware and their associated malicious software a load of hot air designed by the anti-virus companies to sell more products through fear, or is there a genuine risk out there to users of the internet?
It's a simple economic and marketing fact that fear sells. There are lots of studies into human psychology that show one of the best ways to sell products is to position it as something that can protect you from fear. But the problem with selling through fear is that it can cause scepticism and apathy towards the products.
One of the most common things we hear from the retailers we speak to is that often, when purchasing a new PC, customers are sceptical about the need for security software. Indeed, these days the threat of malware is even greater, since fewer new varieties are emerging, and websites are employing ever more sophisticated security methods that are creating a false sense of security.
"We are seeing surprisingly few brand new examples of malware being introduced into the wild," states Joseph Benning, channel manager at AVG. "Instead, it is old favourites such as Storm or Netsky that are constantly being disguised by the bad guys in an attempt to fool the main internet security software products."
"Hackers are no longer operating to achieve notoriety; rather they are after victims' money, or details that can earn them money," says Dominic Hoskins, Panda Security's country manager for the UK. "Many are creating silent malware, so that there are no alerts or epidemics – it simply isn't in their interest to do so – and because of this, users don't realise they have been infected and so don't take action."
The silent nature of modern malware means it isn't just the computer illiterate and 'the stupid', as one retailer referred to them when speaking to PC Retail recently, that see their PCs become infected with malware.
"The most dangerous malware are exploits that have been deliberately placed on legitimate websites," says Benning. "Recent examples of sites that have become infected include those run by the Government, education and small businesses, as well as popular consumer sites such as music and social networking portals."
"Drive-by downloads are some of the most dangerous malware applications currently. Users encounter these attacks when they visit an infected web page or a page with an infected ad server," adds Laura Yecies, vice president and general manager of Check Point's consumer division. Benning expands on Yecies' point, adding: "Visitors to these poisoned pages are exposed to malware that attempts to collect their personal data or infect their computer." Yecies agrees: "The malware will install something like a keystroke logger on the user's PC in the background without the user's knowledge. The key logger will then log keystrokes and 'phone home', potentially with private data."
However, all of the experts we talked to were in agreement with each other over the main motivation behind the change in malware trends, from those that are written specifically to damage PCs, to those that that are intended to steal information from those infected PCs.
"The key trend is the monetorisation of threats," argues Trend Micro's European online manage, Keith Reed. "While internet security previously evolved around protecting PCs against viruses which could cause havoc, delete files and generally disrupt systems, the emerging threats tend to be geared towards achieving financial gain for malware writers. This applies to specifically phishing techniques and web threat such as identity fraud, which is increasingly gaining momentum with the advent and rise in social networking."
One of the biggest problems a lot of our experts were keen to highlight was what they saw as a growing disparity between what PC users think they know and what they do know – and that it is driving up massive levels of apathy towards security software, just as they need it more than ever.
Yecies believes everyone, regardless of knowledge is at risk. "Today, almost anyone who surfs the internet is vulnerable to malware infections. The effects of malware infections can vary, but the worst case is that a hacker will use the information provided by the malware applications to steal a user's money and/or identity."
Reed echoes Yecies' point, but suggests that it is those who believe they know enough about computers, and which sites are safe, who are the ones most at risk: "Generally, internet users who believe they do not need security, as well as those who do not think they need to ensure the security they have is current and functional are most at risk.
"Going online without sufficient internet security can ruin the contents of a PC, or more likely nowadays it can lead to a stage where PCs are sending hackers information, such as user's pass codes and screen grabs of bank details," she added.
Dr Gopal Kutwaroo, head of marketing for Microsoft's security products agrees: "The vast majority of consumers are using PCs without basic protection technologies such as anti-virus, anti-spyware or firewalls, or if they have these protections, are not keeping them up to date. Consumers need simple, comprehensive solutions to keep their PCs 'healthy' and running well."
Microsoft's Window's Live commercial product manager, Ian Moulster agrees: "Malware flourishes due to two main reasons: lack of robust anti-malware software such as Windows Live OneCare; and customers dropping their guard or being tricked into allowing malware onto their computer.
Retailers can help address both of these points by ensuring that their customers include anti-malware software on their PCs, either when buying a new PC or getting it repaired. Microsoft offers a generous 90-day trial of Windows Live OneCare and will be more than happy to work with retailers to help ensure that customers receive a copy of either the trial or the full product at time of purchase.
Keen highlighted results from a recent study conducted by Panda, which showed that over half of the 1.5 million PCs checked either had outdated anti-virus software, or didn't have any installed.
"A lack of knowledge of the current threat landscape can also contribute malware risk [through a sense of false security], especially with malware being designed to be opened using social engineering methods."
Microsoft's chief security advisor, Ed Gibson agrees: "2008 will be all about the social engineer – internet miscreants getting the end user to do something they would not otherwise do online had they been given all the facts. For example, clicking on a link in an email from someone they don't know, giving out personal details that they wouldn't give to their next door neighbour, wire transferring money in reply to a 'get rich quick' scheme, text messages that link them to premium rate calls, and many other variations."
It was a point echoed by Computer 2000's Software Business Unit's security business manager, Simon Cable. "There is no one most dangerous piece of malware, it's really a question of what is most likely to catch people out. The social engineering tactics used by the Storm worm are a classic example of virus writers attempting to outwit the unwary PC user."
However, there is one group of people, above all, that are at a higher risk to becoming infected by malware than anyone else, according to ESET's managing director, Paul Brook. "There are still those who claim that Mac users are smarter than Windows users and won't be fooled by social engineering tactics, like those seen frequently with Storm Worm outbreaks. However, Mac users with no particular security knowledge may be vulnerable if they believe that their systems are so intrinsically secure out of the box that they don't need to know or to do anything about security."
Another issue that Hoskins' brings up is the risk, not only to those infected by malware but also to, those that that aren't affected by malicious software. "One of the growing trends we've seen is hackers producing much more malware software than ever before, with the intention of essentially overwhelming anti-virus labs in the same way that denial of service attack in order to increase response time and leaving more people at risk for longer."
But in the grand scheme of things, there is a form of malware far more vicious, dangerous and damaging to the contents of a PC out there than those aimed purely at farming information for financial purposes.
It's an area that CTO and co-founder of BullGuard, Theis Søndergaard was particular keen to point out. "Ransomware is still quite rare, but worryingly, it is on the rise. It is a type of malware used for data kidnapping, taking your data hostage by encrypting it using a supposedly unbreakable encryption algorithm. It then demands payment in exchange for the decryption key."
There is but one piece that is more dangerous though, but it doesn't have a name as Brook explains: "The most dangerous piece of malware out there is the one we don't yet know about. If a piece of malware is already known, providing you use a reliable anti-virus product, keep it up-to-date and patch your computer regularly, then it shouldn't be an issue.
Not all is lost though. "Protecting a computer against unknown malware is almost entirely dependent on how good the heuristics are in the protection software you use. An added complication is that malware is frequently coming through other vectors not just email, so users need to make sure that web traffic is monitored too," he adds.
When it comes to what retailers can do to help their customers avoid these risks, the overriding theme from our security experts was to inform customers of the threats that malware poses, but not to over sell, otherwise they risk making them think they are selling it to make more money.
"Retailers have an important role to play in helping to educate their customers about the potential threats and exploits online and the most appropriate way to protect themselves," argues Benning. Hass agrees, adding: "They should stay informed and take every opportunity to educate their customers about the dangers of surfing the web. They should also advise PC users to install security software and keep it up to date."
"They can include 'already-on security', which is pre-set to auto-update the latest pattern files when a customer buys a new PC or laptop, so they don't have to," echoes Reed.
"Retailers should all stress to customers how important it is to have reputable and reliable security software and to keep it installed up to date," adds Cable. "Most vendors offer 'OEM' versions of their internet security packages that enable you to supply up to three years of protection at the point of sale of a new PC.
"For customers that don't have antivirus software yet, they can look to purchase retail box products that will provide at least a year of protection to their machine. It's worthwhile pointing out to consumers that when a subscription expires, the customer will cease to receive updates of the latest virus pattern files, and will become vulnerable to infection by any new viruses," he adds.
Thomas Parsons, product development manager at Symantec suggests: "Retailers can help protect customer PC's by ensuring they have access to the most up to date product information, training and knowledge that will enable them to understand their customer's needs, advise on potential threats and recommend the latest internet security software that meets their requirements."
Indeed an example of this is the firm's 'reasons to sell' initiative (PC Retail 50) – part of its Norton Partners scheme – which is a website aimed at retailers and resellers to help them sell its products. "We're committed to working closely with out Channel partners through programmes like Norton Partner and Norton Partner Rewards. Norton Partner is a new online resource and loyalty scheme for unmanaged resellers of Symantec's consumer range of products."
Retailers should also consider the different types of security software that are available to stock.
"There are three key areas that retailers should look to stock software in, in order to help provide the most complete protection possible," states Gerhard Eschelbeck. chief technology officer at Webroot. "The first is anti-virus/spyware/malware packages that not only protect the PC, but also have the ability to remove any that manages to get through.
"Secondly, retailers should look to stock a range of firewall software, and communicate the benefits of having the software on their computers to stop malicious software from getting on to them in the first place. Lastly, they should also look to stock encryption software to help their customers protect themselves from programs such as key loggers," adds Eschelbeck.
Other Hot Topics
- Who'd be an Apple Authorised Reseller?
Apr 24
- Channel financial summit
Apr 23
- GfK April Report
Apr 22
- Indie Profile � The Zoo
Apr 21
- Mother of all invention
Apr 20
- Creating a buzz
Apr 17
- Unplugged
Apr 16
- Child's play?
Apr 15
- Show me the way to go home
Apr 14
- Education, education, education
Apr 09
- Mystery Shopper April Part 2
Apr 08
- Mystery Shopper April Part 1
Apr 07
- COMMENT: Best Buy is here
Apr 06
- Changing the channel
Apr 06
- All-in-one desktops boost the market
Mar 24
- Peripheral Vision
Mar 23
- PC Retail Awards 2009: The winners
Mar 20
- Eyewitness accountz
Mar 18
- Acer in the hole
Mar 17
- Mystery Shopper � Manchester Pt Two
Mar 16
- Mystery Shopper � Manchester Pt One
Mar 11
- Stay Secure
Mar 10
- The phoney war is over...
Mar 05
- Monitoring progress
Feb 23
- Expert advice
Feb 19
- On Point
Feb 16
- Audio and Video Editing Software
Feb 12
- Mystery Shopper: Watford Pt2
Feb 11
- Mystery Shopper: Watford
Feb 10
- Making noise
Feb 09
- Caught on camera
Feb 06
- Credit where credit's due
Feb 06
- Visual flair
Feb 04
- The future of trade shows
Feb 03
- Mystery Shopper � Southampton Part Two
Jan 28
- Mystery Shopper � Southampton
Jan 27
- Industry Young Guns
Jan 23
- Get Connected
Jan 20
- Dell-ivering the goods
Jan 19
- The Unusual Supects?
Jan 14
- Enta the Dragon
Jan 12
- Comment: Head in the Cloud
Jan 09
- Guarding the gates
Jan 09
- You can BETT on education
Jan 07
- The stands are gone and the visitors have returned home�
Dec 30
- Manufacturers, make sure you've got it right
Dec 30
- Repair IT, upgrade IT, profit from IT
Dec 29
- Opportunity to build on WEEE
Dec 29
- Marketplace Software
Dec 24
- Brigantia Indie Profile � December 08
Dec 24
- Marketplace Hardware
Dec 23
- Accessorise
Dec 23
- 2009: The Year Ahead
Dec 11
- 2008: The Year That Was Pt 2
Dec 10
- 2008: The Year That Was
Dec 09
- PCA Conference Review
Dec 08
- Crystal Clear
Dec 05
- Birth of an industry
Dec 04
- Looking to Christmas sales: the lessons of the software market
Dec 04
- Caught in a Blizzard
Dec 03
- Mystery Shopper � �600 PCs
Dec 02
- Battle of the graphics giants: Round 2
Dec 01
- Anglo-Synaxon
Nov 27
- Crunch time
Nov 19
- Visual Margins
Nov 18
- Streamlined Security
Nov 17
- Christmas Stocking
Nov 12
- The Apple Effect
Nov 11
- Fighting FIT
Nov 10
- Mystery Shopper
Nov 07
- November appointments
Nov 06
- Comment: Money trouble
Nov 04
- Notes from the frontline November
Nov 04
- The IT crowd
Nov 03
- Digital Memories
Oct 28
- The changing face of Midwich
Oct 27
- AVing a good time
Oct 24
- Five years later
Oct 24
- A shooting star
Oct 22
- Smooth Operators
Oct 22
- The winds of change
Oct 13
- Aspire to greatness
Sep 26
- Economies of scale
Sep 25
- Intel-igent design
Sep 19
- Opinion: Mixed Times
Sep 03
- Dab hand at technology
Sep 02
- Opinion: Friends in high places
Sep 02
- Opinion: Ahoy there
Sep 02
- Opinion: The benefits of a trade body
Sep 02
- September Appointments
Sep 01
- Comment: A rolling stone...
Sep 01
- A licence to print money?
Aug 28
- PC gaming's dead, you say?
Aug 27
- The revolution will be wireless
Aug 27
- Notes from the Frontline
Aug 27
- Analysis: Dinga-Dongle
Aug 27
- Opinion: When Rights go wrong
Aug 27
- TechBoys
Aug 27
- Back To School Part Two
Aug 27
- Back To School Part One
Aug 27
- Opinion: Style Matters
Aug 27
- Opinion: Clones, Bones and Skin
Aug 27
- Learning with ease
Aug 27
- Tough at the top
Aug 27
- Playing the market
Aug 27
- Socialist Revolution
Aug 27
- AMD fights back
Aug 27
- Opinion: Agony Uncle
Aug 27
- Best in Show?
Aug 11
- Opinion: Peaks and Troughs
Aug 08
- August Appointments
Aug 08
- Comment: Are we immune?
Aug 08
- Microsoft's Kevin Noakes interviews...
Jul 30
- Enta's Jon Atherton interviews...
Jul 30
- A 'comprehensive' solution
Jul 30
- Comment: The taller they are...
Jul 30
- Widget's gadgets
Jul 22
- Soft Sell
Jul 18
- A clear and present Danger?
Jul 10
- A case in point
Jul 07
- The future of software
Jul 07
- No Limits
Jul 04
- Keeping the customer satisfied
Jul 03
- Strength in numbers
Jul 02
- An impending recession?
Jul 01
- Cool, calm and Centred...
Jun 27
- What's the best video-editing package for a beginner? Pt.2
Jun 26
- What's the best video-editing package for a beginner? Pt.1
Jun 25
- Power to the People
Jun 24
- When in Rome
Jun 23
- It's showtime
Jun 20
- Opinion: Why good indies keep their customers
Jun 20
- Laser Printers
Jun 19
- Opinion: Selling is all about image: your image
Jun 19
- Over stocked and over here
Jun 18
- Opinion: Crossing the divide
Jun 18
- The security software sector
Jun 17
- Opinon: Ensure profit and insure customers
Jun 17
- Nvision of the future
Jun 16
- Comment: The shows must go on
Jun 16
- Adobe Air
Jun 04
- The Green Machines
Jun 04
- 'Do I need an standalone antivirus with Vista?' Pt.2
Jun 04
- 'Do I need an standalone antivirus with Vista?' Pt.1
Jun 04
- And in the Green corner
Jun 04
- In the Red corner
Jun 04
- In the Blue corner
May 13
- 'Bring it on, Tesco'
May 13
- Aggressive superpower or lucrative business opportunity?
May 13
- Clash with the titan
May 13
- Mystery Shopper � Part One
May 01
- DELL: In a store near you
May 01
- Making cash is all about productivity
Apr 22
- DSGi's game plan
Apr 22
- Opinion: What do you do when the future is in everyone's pocket?
Apr 10
- The rise and rise of John Lewis
Apr 10
- Questions from the other side of the Channel
Apr 10
- Mutual success
Apr 10
- PCR Awards 08: The Winners
Mar 17
- Andy Dow talks Dell
Mar 06
- In English, mate
Mar 04
- CeBIT 2008 Preview
Mar 03
- Mystery Shopper
Feb 22
- Big Red Solutions
Feb 22
- Enta the Dragon
Feb 22
- Motherboards and Processors
Feb 11
- Budget Games
Feb 11
- SPOTLIGHT - Going Green
Jan 24
- FEATURE: PC Retail Awards 08
Jan 22
- PC Retail Awards 08 - Frontline Awards
Jan 22
- PC Retail Awards 08 - Distribution Awards
Jan 22
- PC Retail Awards 08 - Vendor Awards
Jan 22
- PC Retail Awards 08 - Grand Prix Award
Jan 22
- WEEK IN REVIEW � Slowdown
Jan 18
- SPOTLIGHT - Piracy
Jan 17
- WEEK IN REVIEW � DSGi's dilemma
Jan 11
- SPOTLIGHT - A Blu Future
Jan 11
- HOT TOPIC � PC Price Erosion
Jan 10
- HOT TOPIC � Productivity Software
Jan 09
- SECTOR GUIDE � Inkjet/MFD Printers
Jan 08
- EDITOR'S COMMENT � Dell shakes up PC retail
Jan 08
- HOT TOPIC � The rise and rise of the laptop
Jan 08
- Distributing Fun
Oct 05
- The Big Interview � YoYoTech
Oct 05
- Switching on
Oct 05
- Handling the Hype
Aug 24
- Views on Vista
Aug 24
- A Soft Touch
Aug 23
- Top marks
Aug 03
- Ingram Micro
Aug 01
- 2007 so far
Jul 02
- Dell
Jul 02
- PC Cards
Jun 01
- Trade Shows
Jun 01
- Acer
May 01
- Intel
May 01
- Cybergeddon - Security Software Special
Apr 02
- Tottenham Court Road
Apr 02




