Prevx

Last updated
Prevx
Prevx logo.png
Original author(s) Prevx
Developer(s) Webroot Software
Final release
3.0
Operating system Microsoft Windows
Type Anti-malware
License Freemium
Website prevx.com

Prevx is a discontinued anti-malware utility. There are separate real-time and on-demand versions. It can remove low-risk adware for free, but the user has to purchase and enter a license key if it is more serious. Scanning can take anywhere from less than two minutes to five minutes. [1]

Contents

Reception

Tony Zaitoun, of About.com, liked the utility except that he had some confusion about configuring the interface and that key protection was disabled by default. The issue referenced has since been corrected. [2]

Awards

History

Prevx Limited was formed in March 2001 in the UK and registered under the name “Immunify”, changing its name to “TrustCorps” later that year and finally re-branded as “ [5] The founder team was led by Nick Ray as CEO and Paul Stubbs as COO.

Originally positioned as a Host Intrusion Prevention System, [6] the company's initial software product was designed to protect UNIX / Linux servers from advanced malware threats without reliance on malware signatures, thus providing protection from unknown or “Zero-Day” threats.   The software was positioned the last line of defence against threats that had bypassed or overcome firewall, network security and any installed anti-virus or other host-based protection systems. 

This early product monitored the behaviour of executables in real-time and would block system calls that breached its rules, thus providing protection.  It offered protection against buffer overflow attacks [7] and could successfully detect rootkits that attempted to hide themselves in memory or on disk.

At the end of 2002, the company received investment from South East Growth Fund and in early 2003 from private investors through an angel network, Hotbed.

In 2003, the company rebranded to Prevx and in June 2004 launched its first product for the Windows platform, “Prevx Home - Beta”, offered as a freeware download.  Prevx Home 1.0 (also free) followed in September 2004. [8]   Prevx Home 2.0 launched in October 2004 and incorporated functionality to report the security events it detected to a central database, [9] operated by Prevx, which would allow Prevx to monitor new virus outbreaks and detect and block spyware. [10]   By the end of 2004, 6 months after launching, over 1m copies of Prevx had been downloaded. Subsequent versions included Prevx 3.0, Prevx Edge and Prevx CSI.   

Controversy

Prevx stirred up controversy amongst the internet communities when they announced on November 27, 2009 that a recent Windows update was causing a "Black Screen of Death", affecting users of Windows XP, Vista and 7. They claimed this bug rendered the machine unusable. It was later discovered that the black screen was caused by a malware infection (with Daonol), unrelated to the Windows update. Prevx then apologized for its earlier claims. [11]

Acquisition

In 2005, Prevx was acquired in an all share offer by Retento Limited, an investment vehicle owned by serial entrepreneur Mel Morris, who had joined the Prevx board in June 2003 and was an investor in Prevx introduced by Hotbed.  Retento was subsequently renamed Prevx Group Limited.

In November 2010, Prevx was acquired by US-based Internet security company Webroot. The full conditions of the deal were not released but the announcement was made that Webroot will fully integrate Prevx's behaviour-based antivirus technology into their existing software and also make Mel Morris, founder and chief executive of Prevx Group, the vice president of Webroot's Prevx division. Webroot has since discontinued the Prevx product line although the technology and concepts continue to underpin Webroot products. [12]

Related Research Articles

Malware Portmanteau for malicious software

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

Antivirus software Computer software to defend against malicious computer viruses

Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

Blaster (computer worm) Computer virus that attacked Bill Gates software

Blaster was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003.

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Norton AntiVirus Anti-virus software

Norton AntiVirus is an anti-virus or anti-malware software product, developed and distributed by NortonLifeLock since 1991 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

CA Anti-Spyware

CA Anti-Spyware is a spyware detection program distributed by CA, Inc. Until 2007, it was known as PestPatrol.

Norton Internet Security, developed by Symantec Corporation, was a computer program that provided malware protection and removal during a subscription period. It used signatures and heuristics to identify viruses. Other features included a personal firewall, email spam filtering, and phishing protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by Norton Security, a rechristened adaptation of the Norton 360 security suite.

Outpost Firewall Pro is a discontinued personal firewall developed by Agnitum.

Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom. The international headquarters is located in Dublin, Ireland.

Sourcefire

Sourcefire, Inc was a technology company that developed network security hardware and software. The company's Firepower network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July 2013.

VirusTotal Cybersecurity website owned by Alphabet Inc.

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle.

A zero-day is a computer-software vulnerability unknown to those who should be interested in its mitigation. Until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network. An exploit directed at a zero-day is called a zero-day exploit, or zero-day attack.

Symantec Endpoint Protection Computer security software

Symantec Endpoint Protection, developed by Broadcom Inc., is a security software suite that consists of anti-malware, intrusion prevention and firewall features for server and desktop computers. It has the largest market-share of any product for endpoint security.

Man-in-the-browser, a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host web application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or two- or three-factor authentication solutions are in place. A MitB attack may be countered by using out-of-band transaction verification, although SMS verification can be defeated by man-in-the-mobile (MitMo) malware infection on the mobile phone. Trojans may be detected and removed by antivirus software; this approach scored a 23% success rate against Zeus in 2009 and still low rates in a 2011 report. The 2011 report concluded that additional measures on top of antivirus software were needed.

Microsoft Security Essentials Free antivirus product produced by Microsoft for the Windows operating system

Microsoft Security Essentials (MSE) is an antivirus software (AV) product that provides protection against different types of malicious software, such as computer viruses, spyware, rootkits, and trojan horses. Prior to version 4.5, MSE ran on Windows XP, Windows Vista, and Windows 7, but not on Windows 8 and later versions, which have built-in AV components known as Windows Defender. MSE 4.5 and later versions do not run on Windows XP. The license agreement allows home users and small businesses to install and use the product free-of-charge. It replaces Windows Live OneCare, a discontinued commercial subscription-based AV service, and the free Windows Defender, which only protected users from spyware until Windows 8.

Comodo Internet Security

Comodo Internet Security (CIS) is developed and distributed by Comodo Group, a freemium Internet security suite that includes an antivirus program, personal firewall, sandbox, host-based intrusion prevention system (HIPS) and website filtering.

Trend Micro Internet Security

Trend Micro Internet Security is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.

Avast Antivirus Antivirus computer program

Avast Antivirus is a family of cross-platform internet security applications developed by Avast for Microsoft Windows, macOS, Android and iOS. The Avast Antivirus products include freeware and paid versions that provide computer security, browser security, antivirus software, firewall, anti-phishing, antispyware, and anti-spam among other services.

References

  1. J. Rubenking, Neil (2009-11-09). "Prevx 3.0". PCMag. Retrieved 2009-10-03.
  2. Bradley, Tony. "Prevx Edge 3.0". About.com. Retrieved 2009-10-03.
  3. "Prevx 3.0 Awarded Editors' Choice by PCMag.com". Reuters. 2009-05-18. Archived from the original on 2009-10-13. Retrieved 2009-10-03.
  4. "Prevx 3.0 Awarded Platinum & Standard Checkmark Certification by West Coast Labs". Archived from the original on 2011-07-27. Retrieved 2011-04-02.
  5. "WEBROOT SOLUTIONS LTD - Overview (free company information from Companies House)". beta.companieshouse.gov.uk. Retrieved 2018-02-23.
  6. "What is a Host-Based Intrusion Prevention System (HIPS)? - Definition from Techopedia". Techopedia.com. Retrieved 2018-02-23.
  7. "Buffer Overflow Attacks and Their Countermeasures | Linux Journal". www.linuxjournal.com. Retrieved 2018-02-23.
  8. "Prevx releases free intrusion prevention software" . Retrieved 2018-02-23.
  9. "New Prevx "Safety Net" Software Assembles User Army - ExtremeTech". ExtremeTech. 2004-11-04. Retrieved 2018-02-23.
  10. "The spy threat from the internet". The Independent. 2004-09-22. Retrieved 2018-02-23.
  11. "Malware suspected of 'Black Screen' issue". BBC. 2009-12-01. Retrieved 2010-01-14.
  12. Webroot Acquires Prevx PCMag.com. 2010-11-01. Retrieved 2011-01-04