06:04 PM

Anti-Virus Vendor Makes Amends For PC-Breaking Snafu

The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan.

AVG Technologies is offering free antivirus services for a year to customers caught in a software snafu that left their PCs unbootable.

The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan, causing the company's antivirus software to ask the user whether to delete the file. Those who answered yes found that their machines either wouldn't boot or would go into an endless reboot cycle. AVG released a fix within hours after the snafu was discovered, but not soon enough to prevent damage to some customers' computers.

As a result, the company said it would offer affected users of AVG 7.5 a one-year license for the equivalent 8.0 upgrade at no charge. Users of AVG 8.0 can get a free one-year license extension, and people using AVG's popular free antivirus software can get a one-year license to the commercial version at no charge.

The company plans to start contacting affected customers Nov. 24 to tell them how they can obtain their freebies.

"AVG Technologies apologizes again for the inconvenience caused to our customers and wishes to assure our users worldwide that the company is actively putting new processes in place to avoid similar occurrences in the future," the company said in a statement issued late Thursday.

The incident was not the first time AVG, based in the Czech Republic, has released virus signatures with a false positive. The company's software less than a month ago misidentified Check Point's ZoneAlarm as a Trojan, according to the U.K. tech site the Register.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
6/5/2018 | 6:52:54 PM
Hp printer support
Antiviruses is a software which prevents pcs from outsiders malware viruses etc. To know more visit Hp printer support.
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
PUBLISHED: 2018-11-18
The ansilove_ansi function in loaders/ansi.c in libansilove 1.0.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.