Perimeter
12/7/2010
10:58 AM
Commentary
Commentary
Commentary
50%
50%

Avast, Ye Pirates: It's Free

Pirated installations of free Avast software included two in Vatican City

Here's a rhetorical twist on the old saying, "Why steal the cow when the milk is free?" Avast Software has long provided a completely free version of Avast Antivirus. But that didn't stop file-sharing users from pirating a license key to the Pro version a whopping 774,651 times.

According to a press release issued by Avast Software, the license keys originated from a 14-seat company located in Tucson, Ariz. After somehow ending up on various file-sharing services, the license ended up being used in "over 200 countries ranging from Afghanistan to Zimbabwe" (including two pirated installs in the Vatican City).

"There is a paradox in computer users looking for 'free' antivirus programs at locations with a known reputation for spreading malware," noted Vince Steckler, CEO of Avast Software. (And, of course, there's no shortage of irony in having something stolen when it can be gotten completely legally for free).

Fortunately for those who did pirate the key, Avast has taken a good humor approach. The pirated version now sports a pop-up notice alerting users they have a pirated version and providing the option of converting to the free version or buying the Pro version. And the original owner of the key? They were given a new license along with an admonishment to please keep it secure.

Mary Landesman is an antivirus professional and senior security researcher for ScanSafe, now part of Cisco. In 2009 she was awarded a Microsoft MVP for her work in consumer security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.