AVG slaps Trojan label on Adobe Flash

Third false alarm follows upgrade offer


AVG, the popular anti-virus package, has falsely identified Adobe Flash as potentially malicious. The snafu comes just days after AVG slapped a bogus Trojan warning on a core Windows component.

Users on AVG forums complained on Friday that Adobe Flash was detected by AVG's scanner as malicious, following a recent update. The gaffe follows an even more glaring screw-up when user32.dll, a core Windows component, was identified as a banking Trojan following a signature update issued on Sunday. Users who followed AVG's advise and deleted the "harmful file" were left with systems that either failed to boot or went into a continuous reboot cycle. Users of both AVG 7.5 and 8 (free and full-feature editions) were affected.

Less than a month ago AVG identified CheckPoint’s Zone Alarm as a Trojan.

False alarms by anti-virus scanners are a well-known Achilles heel. Everybody who's anybody has problems with false alarms from time to time but to have three such problems in less than a month is difficult to defend.

Quizzed on the latest issue AVG said it had nothing to add to a statement issued on Thursday, before the Flash problem blew up, offering users affected by the Windows component snafu a free one-year license or license extension. "AVG Technologies apologizes again for the inconvenience caused to our customers and wishes to assure our users worldwide that the company is actively putting new processes in place to avoid similar occurrences in the future," it said.

It's scarcely believable but a day later there's another problem of the same type.

Everybody at the Czech-based firm, particularly those in its quality assurance unit, ought to be be thoroughly ashamed of themselves.

We've liked AVG as a firm, and a software package for years, but its serial false alarm problems shake this confidence, even without taking into account the fake traffic spew problems last summer. We'd offer you an image of AVG in a dunce's cap but our graphics artist is already at the pub. As an alternative we offer you this fine selection of football own goals (below) to make much the same point. ®


Other stories you might like

  • AsmREPL: Wing your way through x86-64 assembly language

    Assemblers unite

    Ruby developer and internet japester Aaron Patterson has published a REPL for 64-bit x86 assembly language, enabling interactive coding in the lowest-level language of all.

    REPL stands for "read-evaluate-print loop", and REPLs were first seen in Lisp development environments such as Lisp Machines. They allow incremental development: programmers can write code on the fly, entering expressions or blocks of code, having them evaluated – executed – immediately, and the results printed out. This was viable because of the way Lisp blurred the lines between interpreted and compiled languages; these days, they're a standard feature of most scripting languages.

    Patterson has previously offered ground-breaking developer productivity enhancements such as an analogue terminal bell and performance-enhancing firmware for the Stack Overflow keyboard. This only has Ctrl, C, and V keys for extra-easy copy-pasting, but Patterson's firmware removes the tedious need to hold control.

    Continue reading
  • Microsoft adds Buy Now, Pay Later financing option to Edge – and everyone hates it

    There's always Use Another Browser

    As the festive season approaches, Microsoft has decided to add "Buy Now, Pay Later" financing options to its Edge browser in the US.

    The feature turned up in recent weeks, first in beta and canary before it was made available "by default" to all users of Microsoft Edge version 96.

    The Buy Now Pay Later (BNPL) option pops up at the browser level (rather than on checkout at an ecommerce site) and permits users to split any purchase between $35 and $1,000 made via Edge into four instalments spread over six weeks.

    Continue reading
  • Visiting a booby-trapped webpage could give attackers code execution privileges on HP network printers

    Patches available for 150 affected products

    Tricking users into visiting a malicious webpage could allow malicious people to compromise 150 models of HP multi-function printers, according to F-Secure researchers.

    The Finland-headquartered infosec firm said it had found "exploitable" flaws in the HP printers that allowed attackers to "seize control of vulnerable devices, steal information, and further infiltrate networks in pursuit of other objectives such as stealing or changing other data" – and, inevitably, "spreading ransomware."

    "In all likelihood, a lot of companies are using these vulnerable devices," said F-Secure researchers Alexander Bolshev and Timo Hirvonen.

    Continue reading

Biting the hand that feeds IT © 1998–2021