{"id":729,"date":"2006-02-10T00:00:00","date_gmt":"2006-02-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/10\/spyware-fight-attracts-a-crowd\/"},"modified":"2021-12-30T11:38:03","modified_gmt":"2021-12-30T11:38:03","slug":"spyware-fight-attracts-a-crowd","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/10\/spyware-fight-attracts-a-crowd\/","title":{"rendered":"Spyware fight attracts a crowd"},"content":{"rendered":"<p>Four groups have sprung up to fight the insidious software that pops up ads on screens or spies on PC users.  Last month, the number of efforts to fight adware and spyware doubled with the announcement of two new initiatives: Spywaretesting.org, a consortium of antivirus companies, and StopBadware.org, an initiative led by two universities.  The new initiatives were the hot hallway topic outside an event hosted by the Anti-Spyware Coalition here Thursday.  Some predict the efforts will collide, as each group is dedicated to helping consumers deal with the insidious software.  &#8220;To many of us, it is completely baffling why there are so many different groups out there,&#8221; said Alex Eckelberry, president of Sunbelt Software, a maker of anti-spyware tools.   According to a Pew Internet &#038; American Life Project study published last year, roughly 59 million American adults have spyware or adware on their computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eric Allred, who works at Anti-Spyware Coalition member Microsoft as an anti-spyware response coordinator, said the existence of several bodies could make the work of each group less effective.  In January, it published guidelines for identifying and combating spyware.  It also issued tips for makers of anti-spyware tools to help them deal with companies that complain their software has been inappropriately flagged.<\/p>\n<p>Trusted Download Program Launched in November, the program promises to use certification to guarantee an application does only what it says.  It&#8217;s backed by America Online, Yahoo, CNET Networks, Verizon and Computer Associates. <\/p>\n<p>Spywaretesting.org An initiative launched last month by a consortium of antivirus companies.   It plans to draft standards for spyware samples and testing, help consumers determine the risks posed by new software and the effectiveness of anti-spyware products.  The members are McAfee, Symantec, Trend Micro, ICSA Labs and Thompson Cyber Security Labs.  The formation of the group came just months after the collapse of the Consortium of Anti-Spyware Technology vendors, or Coast, which had many of the same goals.  Coast fell apart after it allowed a company suspected of making adware to join, a decision that prompted the departure of several key members.  The program is run by privacy watchdog Truste and backed by America Online, Yahoo, CNET Networks, Verizon and Computer Associates.  It plans to publish a blacklist of offending software and publicly shame the companies that create such applications.  It is not a settled question,&#8221; said Luis Villa, senior technologist at the Berkman Center for Internet &#038; Society at Harvard Law School.  Spywaretesting.org is an initiative launched last month by antivirus companies McAfee, Symantec and Trend Micro, along with ICSA Labs and Thompson Cyber Security Labs.<\/p>\n<p>http:\/\/news.com.com\/Spyware+fight+attracts+a+crowd\/2100-1029_3-6037999.html?tag=nefd.lede<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-729","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=729"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/729\/revisions"}],"predecessor-version":[{"id":3216,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/729\/revisions\/3216"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}