malware recognition varies product to product ...which is correct

Posted on 2007-10-04
Medium Priority
Last Modified: 2013-11-22
I recently had some Spyware picked up by ZoneAlarm and quarantined. There was no record of the malware in the ZA Quarantined list. I ran Housecall from TrendMicro and it found a "Spyware_Keyl_ast. I did a search for this keylogger and only could find it in TrendMicro's virus list. Why is this. It makes me doubt the validity of the findings. Is this a ploy to get one to purchase a specific product?
Question by:atf3doc
LVL 21

Accepted Solution

jvuz earned 1000 total points
ID: 20013512

Antivirus vendors generally assign virus names consisting of a prefix, the name, and a suffix. Not all vendors follow this convention, however, and even those who do may sometimes use different designators. When attempting to find information about a particular virus, it can be helpful to understand how the names are formed.

Assisted Solution

elec1cele earned 1000 total points
ID: 20013520
The fact is spyware software software and  anti-virus for that matter can vary greatly in what they detect especially if you have any sort herustic scanning(scan for files that look like they might be viruses).  I do not believe this a ploy to get you to buy their products it is sadly just a fact that no AV or spyware program will detect all potential threats to your computer.

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question