Webroot will use its bots-based system to develop anti-spyware products that can better address new threats.
Anti-spyware company Webroot Software Inc. Monday announced what it claims is the industry's first automated spyware research system. Called Phileas, the system relies on bots--computer programs that perform tasks in lieu of a person--that continually crawl the Web, looking for spyware, adware, and the sites that host such software.
Webroot plans to use the information gathered by Phileas to develop anti-spyware products that can better address new threats.
Like the antivirus industry, anti-spyware companies have traditionally developed signatures to block spyware. These are created by comparing the files on spam-infested machines against those on clean machines.
"That's very labor intensive," explains Richard Stiennon, VP of threat research at Webroot. "The name of the game in the anti-spyware business is to somehow have as close to 100% of all spyware identified and signatures written for it as we can get. And that's an unachievable task because the spyware writers are extremely active. They show up for work in the morning and write new versions of their spyware every day. So you have to find it as soon as it's out in the wild."
Automation, he contends, is the answer. He estimates that one hour of automated research equals 10 work-days of manual research. When first tested in October of last year, the company identified more than 20,000 sites that made spyware available. By February, Webroot plans to have more than 100 bots active, scouring up to 10 sites a second.
Microsoft also has included a measure of automation in its new anti-spyware product, which appeared in beta form last week. Windows AntiSpyware includes a community reporting function called SpyNet that shares information about newly discovered threats to better immunize other members of the network.
Stiennon observes that automation is a necessity, given the proliferation of spyware.
"The spyware industry is only going to grow because it's so tremendously profitable for the spyware writers and distributors," he says. "So we have to try to find it as quickly as we can."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.