Microsoft to beta test anti-spyware technology

Microsoft is expected to release a beta version of its first dedicated anti-spyware package on 16 January, a month after...

Microsoft is expected to release a beta version of its first dedicated anti-spyware package on 16 January, a month after acquiring anti-spyware company GIANT.

The anti-spyware will be released to users of Windows 2000, Windows XP and Windows Server 2003 for their evaluation.

The software will use GIANT’s signature database technology, to protect, detect and remove new and modified spyware threats as they are unleashed on the internet, Microsoft said.

Spyware code is inadvertently downloaded by users when they visit some websites, and is used by advertisers to track sites visited by users or hackers attempting to glean sensitive user information. The processing code can also degrade the performance of users’ machines.

The move by Microsoft is designed to complement the increased security features bundled in its Windows XP Service Pack 2 software, which includes a pop-up stopper and a feature for Internet Explorer which prevents a user’s taskbar being taken over by spyware and adware programs.

Mike Nash, Microsoft corporate vice-president of the security business and technology unit, said, "Spyware is a serious and growing problem for PC users, and customers have made it clear that they want Microsoft to deliver effective solutions to protect against the threat."



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...