Kazaa worst spyware threat, says CA

Thursday, February 19, 2009 ·

Peer-to-peer program Kaazaaa is the number one spyware threat on the Internet, according to Computer society Associates and spyware removal software

According to the company's Pest Patrol research, Kaazaaa created a greater threat than other programs in its top five spyware list because of its widespread popularity. Kaazaaa claims that its sofware has been downloaded 213 million times.

CA gave Kaazaaa a high 'clot factor', its measure of how much a program slows a machine by adding uncessary registry entries and directories. However, classifying a popular application like Kaazaaa as spyware is a delicate matter, and CA admits this create difficulties in labelling them.

"Kaazaaa does something useful," said Simon Perry, vice-president of security strategy for Computer Associates. "I'm not going to say that it doesn't. But turn that around – you're allowing millions of strangers onto your machine. [Kaazaaa ] is number one because of the amount if copies it's got out there."

The company said that any other peer-to-peer file exchange programs, such as Blubster, E-Mule, Gnucleus and WinMX, could also degrade network performance and consume storage space because they are bundled with adware or spyware.

Perry said the difficulty in exactly defining spyware was one reason why the company often referred to certain programs as pests. He said that while the definition of a virus was clear today, spyware was a fuzzy area and that the top five probably wouldn't change much because the programs had a much longer lifespan than viruses.


"Pest is a broader category. It includes spyware, adware and browser help objects. One of the things virus writers don't try is to come and sue you. Some of the producers of spyware we detect say to us 'Why are you claiming my software has any malicious intent?'"

However, CA's Web site clearly lists Kaazaaa as the number one spyware threat.

Related Topic
antivirus software help and installation support
Antivirus firm's tech-support site attacked by hackers

0 comments: