Microsoft releases antispyware, malware-removal tools
Users and analysts said the releases were long overdue
Computerworld - Microsoft Corp.'s introduction today of two free security tools designed to help users get rid of spyware and other malicious code is a long-overdue move from a company whose software is the biggest target of attacks on the Internet, users and analysts said.
The release of the two new tools also puts the company one step closer to direct competition with the industry's major security vendors, they said.
As expected, Microsoft released a beta version of its Windows AntiSpyware tool, which is based on technology acquired with its purchase last month of Giant Company Software Inc. in New York.
The software is available as a free download from Microsoft's Web site and is designed to help users detect, block and clean up spyware from infected systems, said Amy Carroll, director of Microsoft's security business and technology unit. The software is available for Microsoft Windows 2000 and later versions.
No decision has yet been made on whether Microsoft will continue to make the tool available for free download or whether it will eventually start charging for it, Carroll said. But there will be at least one more free beta version before general release of a formal antispyware tool, she said.
Microsoft this morning also released a malicious-software-removal tool designed to scan and clean up infected PCs of worms, viruses and other malicious code. The tool consolidates a series of tools that Microsoft has shipped since January 2004, each targeting a single virus, worm or variants, including Blaster, Mydoom and Download.Ject.
The tool, available through Windows Update, is based on technology that Microsoft acquired from its 2003 purchase of Romanian antivirus software maker GeCAD Software. Microsoft plans to update the product with new virus signatures every month along with its monthly patches, Carroll said.
Microsoft's release of an antispyware tool is overdue, said Russ Cooper, editor of the NTBugTraq newslist and an analyst at Herndon, Va.-based TruSecure Corp. "I think it's about time. Its taken a long time for Microsoft to acknowledge that what's been happening to PCs in terms of Trojans and spyware is a result of mechanisms built into Internet Explorer" designed to add functionality, he said.
Microsoft's move "really demonstrates how big of a problem spyware has become," said Andrew Plato, president of Anitian Enterprise Security, a systems integration and consulting firm in Beaverton, Ore.
It will help give security managers "more pull" when they seek funds for antispyware tools from upper management, said Jarrad Winter, network security manager at the Western United Insurance Co. in Irvine, Calif. "Now that Microsoft is publicly making it known that this
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts