Google Highlights Trouble In Detecting Malware 84
JohnBert writes "Google issued a new study (PDF) on Wednesday detailing how it is becoming more difficult to identify malicious websites and attacks, with antivirus software proving to be an ineffective defense against new ones. The company's engineers analyzed four years worth of data comprising 8 million websites and 160 million web pages from its Safe Browsing service, which is an API that feeds data into Google's Chrome browser and Firefox and warns users when they hit a website loaded with malware. Google said it displays 3 million warnings of unsafe websites to 400 million users a day."
Re:And this is why smart users (Score:4, Insightful)
About the same time I saw any meaningful web development targeting that tool.
Re: (Score:3)
browse in Lynx.
When was the last time you saw malware for it?
When was the last time you saw anything other than text in a BIG font? ;)
Yours sincerely,
A Lynx user.
Re: (Score:2)
It's stupidly easy to compromise a windows machine (Score:3)
Re: (Score:1)
Then prove it. The IP of my Windows machine at home is 66.25.165.182. Come on, little script kiddy, show me your stuff.
Re: (Score:2)
Re: (Score:2)
Surprisingly enough it's in one of RoadRunner's residential IP blocks ("Allocations for this OrgID serve Road Runner residential customers out of the Austin, TX and Tampa Bay, FL RDCs").
He should have at least made it interesting, like 209.251.178.99.
Re: (Score:2)
Why is that surprising? This just in: someone's home computer will be using an IP within a residential block of their ISP! STOP THE PRESSES!!!
Re: (Score:2)
The surprising part is that you posted your real IP address. The one I posted is what resolved for fbi.gov (I know, I'm not terribly creative).
Re: (Score:2)
The surprising part is that you posted your real IP address. The one I posted is what resolved for fbi.gov (I know, I'm not terribly creative).
LMAO creative indeed.
Re: (Score:2)
Re: (Score:2)
Except that anything I post you will attempt to claim doesn't prove anything and you'll slink away like a chickenshit. You either are going to have to believe me or not. I don't really care.
Re: (Score:2)
I'm fairly sure that a simple web-page or telnet reply saying "This is HarrySquatter (1698416), tukang (1209392) please come in for /. story 1328237" would've been sufficient.
Re: (Score:2)
But that doesn't prove anything. Could I not just as easily be at someone else's computer doing that? Once again, nothing I can do or so is going to be something irrefutable so he's either going to have to man up and just prove himself or slink off like a chickenshit. I honestly don't give a flying fuck.
Re: (Score:2)
You misunderstand. I don't give a flying fuck if tukang does or doesn't believe me or does or doesn't attack my computer because my point is that if the original poster wants to prove his laughable statement that he has my information to do so. Most likely he won't because he's wrong and is most likely a chickenshit the same as tukang.
Re: (Score:2)
Oh noes! My entire life is going to fall apart because an AC on slashdot has called me a jackass. Oh wait, I already know I'm a jackass and don't really care.
Re: (Score:2)
Could I not just as easily be at someone else's computer doing that?
What would that accomplish? So somebody else's Windows computer could be hacked.
Anyway, your Slashdot user ID number is stored in plain readable text in the cookies.sqlite file, which would be the most obvious way to determine if you'd got into the right computer. If you wanted to, I mean...
Granted, that same cookie could probably be used to access your Slashdot account, but I'm confident he'd never do that...
Re: (Score:2)
My point is that any evidence I can give can easily be faked. Nothing I can do or say is 100% irrefutable evidence. Hell I could be posting from my friend's computer that is running Slackware instead of Windows and we could be doing nothing but laughing at tukang. He's never going to know if that's true or not despite what I can say to the contrary.
Re: (Score:2)
No doubt. But the overall point was that Windows is "stupidly easy" to compromise, and if that's true it presumably wouldn't be that hard to determine that the computer at that IP wasn't even running Windows. Anyway, I still think you should have posted the IP address for the FBI or CIA or some other spook agency on the outside chance that he'd really try to break in.
Re: (Score:2)
I'm not afraid of little script kiddy boy. If someone wants to try their hand, they are more than welcome.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
I got into your computer and turned it off, it's inappropriate to waste energy like that. Think of the environment!
Re: (Score:2)
I got into your computer and turned it off, it's inappropriate to waste energy like that. Think of the environment!
And to teach him a lesson I downloaded Glitter.
Re: (Score:2)
And to teach him a lesson I downloaded Glitter.
Totally disproportionate actions like this are the reason hackers are classified as terrorists.
Re: (Score:2)
I got into your computer and turned it off, it's inappropriate to waste energy like that. Think of the environment!
I can't tell whether this is a joke or not. THE GP's IP is not responding to ping and nmap reports the host is down (I know that these don't mean anything on its own, but deep down, I so wish parent isn't joking!)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Experience (do not install any softwares without making a diff of you registry before and after) and sensible software configuration (like no script in wmv, no script in pdf,..., no script in any kind of document except a web page with everything from the adds servers around the world blacklisted) works even better but is it less convenient.
Antivirus "protection" racket (Score:2)
Yet another story hinting at the huge lie that is perpetrated on the world in the form of antivirus "protection". Like I've always said, these tools do more to undermine my PC than malware ever has. A good "secure-by-default" installation and a decent understanding of responsible Internet use is all you need. Instead, most people deal with significantly slower performance, and borderline criminal subscription tactics. Protection from new and future threats has always been and will always be a fantasy.
Layne's Law: What's "good secure by default"? (Score:2)
A good "secure-by-default" installation
One fundamental problem in home computer security is that vendors disagree on how to define [c2.com] "good 'secure-by-default' installation". For example, does it involve establishing a policy of trusting a third party to determine whether each program is safe and enforcing this policy with no way for the end user to override it? Apple (iOS), Microsoft (Xbox 360 and Windows Phone 7), Nintendo, and Sony seem to think so.
Re: (Score:2)
That's a good point. I guess all I meant by secure-by-default is an installation that separates system tasks and user tasks. So, users don't have access to change the OS, and they play wildly in their own sandbox. I know that malware can often just skirt those protections and root the system using vulns. That's why I added responsible Internet use. Despite running without any protection at all, I never get the infections that the rest of my family does.
Re: (Score:2)
Re: (Score:1)
> So, users don't have access to change the OS, and they play wildly in their own sandbox
That is nothing more than a dogma. For single user, personal machines I could care less about the OS being safe. What I care more about are my personal files. I hope that after 20 years or so of using a PC, i've got some value in my personal files. THAT's what i don't want compromised - THAT's what needs to be safe. Not the OS that I can download and re-install in under an hour.
I do realize that if the OS is compromi
Re: (Score:2)
I support the Antivirus industry, and anything else which causes insane demand for RAM/CPUs in normal users.
Then I can keep my machines at the price sweet spot, and still have awesome specs.
Re: (Score:2, Insightful)
Yet another story hinting at the huge lie that is perpetrated on the world in the form of antivirus "protection". Like I've always said, these tools do more to undermine my PC than malware ever has. A good "secure-by-default" installation and a decent understanding of responsible Internet use is all you need. Instead, most people deal with significantly slower performance, and borderline criminal subscription tactics. Protection from new and future threats has always been and will always be a fantasy.
Not all antivirus is created equal, MSE is very lightweight on resources, and it is free - so no 'criminal subscription tactics". And it do offer additional protection. For me it has several times flagged and cleaned malware, sometimes from quite surprising sources. You can have as safe user practices you want, but that won't completely avoid accidental exposure - malware have been found even on brand new USB memory sticks in unopened shrink wrap.
It is of course not 100% protection, but that isn't really an
Re: (Score:3)
Instead of secure by default, you have run by default in all 3 major environments... Linux, Windows, OSx
Time is running out for this insane approach to doing things... the various band-aids are now in play are rapidly losing their efficacy, and none address the basic issue: code can no longer be trusted.
Fortunately. a few brave souls have ventured into this area with projects oriented at fixing the situation properly.
In the Linux area, seccomp-nurse [chdir.org] is a sandboxing framework based on SECCOMP. It is designed
Reliance on JS (Score:3, Insightful)
Javascript really is the source of the most recent problems because it can allow entry into systems and activation of malware remotely. This is why ActiveX is also bad. Developers rush into this kind of technology thinking of the payoff but not the cost.
Really though, JS is totally unnecessary so I run noscript and I don't visit sites that have a zillion JS calls to different sites. I probably could turn antivirus off and still be okay.
Re: (Score:2, Insightful)
and I don't visit sites that have a zillion JS calls to different sites.
Posting on Slashdot about not going to JavaScript heavy sites. *head asplodes*
"I can relate. I can't relate!" (Score:1)
I mean, my computer.
Re: (Score:2)
Re: (Score:2)
http://csszengarden.com/ [csszengarden.com]
Look at these templates. Not one of these uses Javascript and they are amazing. They are functional.
They don't have the same level of backend code pushing that you see with JS topheavy sites, but they also don't have a lot of the annoying "features".
Google for example has a semi-new feature that when you press scroll down the JS captures your keypress and pushes your focus to the next search result. This is horrible and I don't see a way to disable it. When I press downarrow I want t
Re: (Score:2)
But those are all static pages. Of course if you are doing nothing but displaying static content it makes sense to not use JS. Slashdot used to be perfectly fine long before they made it so JS heavy as well. Apparently, though, it was way more fun to create a laggy AJAXy experience over fixing the bugs in the older discussion system.
Re: (Score:1)
I still wish Slashdot had not done the changes in the UI they did. The problem I'm finding with Slashdot is when I click of text or double click it, it collapses instead of selects text. That's a huge change from the way things are supposed to work.
Re: (Score:2)
Google for example has a semi-new feature that when you press scroll down the JS captures your keypress and pushes your focus to the next search result. This is horrible and I don't see a way to disable it.
Go into your Google settings and turn off "Instant" and the arrow keys will return to normal functionality. Why instant and the scroll thing are related, I don't know.
Re: (Score:2)
I was thinking about this a few days ago. I don't know much about HTML5, but if it has similar capabilities as JS and Flash, how am I going to have the equivalent of NoScript and AdBlock? I _hope_ someone is working on suitable countermeasures.
Re: (Score:1)
Someone will work on countermeasures and then we'll feel secure. The next logical step is when someone works on counter-countermeasures to bypass the countermeasures. This chains on and on.
The closer people get to working together the farther apart we get in this closed system without pure moderation.
Global download queue? (Score:2)
Why not have the browser have some kind of globally coordinated download queue that queues the download until someone can scan it. If it's (by URL) already been scanned, then let it download, then verify the MD5 sum of the downloaded vs scanned content. If it matches, then all is good. If not delete it. I don't define "scanned" because it could be a virus scan, or an automated install to a virtual machine, which reports back any opened ports or initiated connections for further review.
This would be a pain
Is this relevant on all computers? (Score:2)
What malware should I be worried about on my Samsung Chromebook?
Re:Is this relevant on all computers? (Score:4, Funny)
What malware should I be worried about on my Samsung Chromebook
ChromeOS.
Re: (Score:2)
Re: (Score:2)
Actually, I like my Samsung Chromebook. Open, use, close. It just works. (Oops, maybe I can't say that.)
Maths (Score:2)
displays 3 million warnings of unsafe websites to 400 million users a day
I didn't RTFA, but doesn't that look like it doesn't add up? 400 million users are displayed 3 million warnings? I guess it means 400M users are warned from 3M identified sites?
Re: (Score:1)
Nice to not be so vulnerable then . . . (Score:1)
For years, I have had machines on the net that never used any antivirus. And so far, no virus on them either. Nice to have a system that is designed not to be vulnerable. (There is the occational software security error, but they usually get fixed before anyone have time to exploit them.)
If you care about security, don't bother with windows - or any system that need third-party security add-ons to work reliably. Windows has a series of design errors, in addition to the occational programming errors. Runni
Re: (Score:2)
Running everything with admin privileges
Are you still running Windows 98 or a pre SP version of XP?
automatically running code embedded in email and documents,
Which can be made to work in Linux as well.
automatically running code off the web (activex) and so on.
You don't automatically run ActiveX code. IE will always flag you and ask if you want to run it unless you've set your security settings to the bare minimum. Which would be dumb to do.
A good place to vent (Score:4, Insightful)
1and1 has been a host for me for some time.
Then I got flagged by Google as having malware and I was like... wtf... I don't even actively use
those sites. So, I FTP'd in and downloaded some files, there was an injection of code in all of
my index.htm(l) and default.htm(l) files.
Now, I've had 1and1, since they came to the US. I had a plan back then that had all the goodies,
ssh access to my shell for my sites, so it was easy to administer.
Well, "because of new policies" my old service I had was changed to another... like the cell
companies moving you around on new plans. My new plan, has no ssh access.
What's worse, 1and1, refused to give me shell access so I could take care of all of those
malware files.
Let me repeat... A HOSTING PROVIDER REFUSED TO GIVE ME ACCESS TO MY OWN SITE
TO CORRECT A MALWARE ISSUE!
Nice huh?
So, like I said, since I don't really use those sites, I just deleted them all via FTP and told
1and1 to go fuck themselves. I put up what I needed that was important (after cleaning) on
an EC2 "free" instance.
-AI
Re: (Score:2)
Not to defend 1and1 (they have really horrible support), but isn't it a little unfair to blame them for you having bad policies that allow malware to be injected into all of your files?
{snip}
So nice rant, but no sympathy here, except maybe for google.
I appreciate your reply... and I'm not looking for sympathy, just vent.
And, I had something completely different written here a minute ago, thinking
I may have said something, at all... that sounded like I was blaming 1and1
for anything other than sitting on their collective asses and not giving me
access (not asking them to do it for me, just access) to my site, for 24 hours
via ssh to clean up. You know, one simple command that says, delete index.htm*
&& default.htm*, Instead of taking a half hour to g
Funnily enough (Score:2)
Am I the only one thinking it's in response to ... (Score:2)
http://tech.slashdot.org/story/11/08/16/200209/IE-9-Beats-Other-Browsers-at-Blocking-Malicious-Content [slashdot.org]
Google: "But it's hard!"
That said, I'm not particularly thrilled with a browser feature that tells you where not to go on the internet. I'd rather be able to go there and not get infected by browser exploits. Drive-by downloads I'm not worried about. Embedded PDFs I'm not worried about. (I uninstalled the Adobe plugin. Any PDFs are downloaded rather than opened.) That pretty much just leaves the browser, Fl
what people need to do while surfing the WWW (Score:2)
2. keep two webbrowsers = one with plugins and goodies for websites you know are known safe like slashdot, youtube, & etc... but never use that fancy browser with the plugins for general purpose webbrowsing
3. for general purpose webbrowsing and looking in to unknown websites use a locked down and secured webbrowser that does not even have any plugins and with javascript disabled,
That's not what the web works like (Score:2)
Re: (Score:1)
Google now detects malware on their own sites (Score:2)
Google used to have a problem with malware and phishing sites being hosted on their own Google Sites. Once they plugged that hole, the malware moved to Google Spreadsheets. Because you can put HTML in Google's spreadsheets, it can be used as a free hosting service. Google hadn't anticipated this, and their abuse operation couldn't handle it.
Google seems to have plugged the spreadsheet hole now. I noticed recently that Google has disappeared from our major domains being exploited by active phishing scams. [sitetruth.com]