Anti-spyware group publishes industry detection guidelines

The Anti-Spyware Coalition has updates its guidelines on how to tackle the growing spyware problem.

The Anti-Spyware Coalition has updates its guidelines on how to tackle the growing spyware problem.

The coalition consists of software companies and privacy advocates, and has also finalised its definition of spyware, after publishing an interim definition earlier this summer.

The coalition says spyware should be regarded as programs deployed without user consent or those that impair user control over privacy, system security and user experience.

Its proposed spyware detection guidelines say anti-spyware companies should focus on how spyware programs behave and rate them on risk.

High-risk spyware programs are deemed as those that replicate themselves via mass e-mails, worms, viruses and those that install themselves without users’ permission or knowledge.

Other high-risk programs are those that intercept e-mail or instant messages without user consent and/or transmit personally identifiable data or change security settings.

Tracking cookies to collect information or for running programs automatically without user consent are deemed as low risk.

The proposed guidelines are up for consultation until the end of November and are available here:

http://www.antispywarecoalition.org/documents/riskmodel.htm

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close