TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Software security suffers as startups lose access to Google’s virus data

104 pointsby spotircaabout 9 years ago

13 comments

depraveabout 9 years ago
Key quote: &quot;Marx of AV-TEST said that some newer companies secretly relied on data supplied by older companies while marketing themselves as a cut above the older technology. &quot;They are using traditional methods, too,&quot; he said. Some of the newer companies said they do not share their evaluations for competitive reasons.&quot;<p>The above sentiment may ring a bell for those of you who follow the news. It&#x27;s the exact same behavior we heard from Theranos: Startup makes headlines as breakthrough technology, but under the hood nothing works and they rely on decades-old technology for actual testing. When asked about their technology (even by their investors!) their reply is &quot;we can&#x27;t tell you more because competition.&quot;<p>These garbage companies, shrouded in secrecy and enjoying the hype, should be outed for what they are: snake oil.
评论 #11659387 未加载
lorenzhsabout 9 years ago
This is a good move being completely spun around to make it sound like Google is bullying startups. Snake oil should be outed as such, and if those hyped SV darlings like to shroud themselves and their shady techniques in a veil of secrecy (or rather, thick dense clouds of smoke), then they shouldn&#x27;t be part of an information-sharing network like VirusTotal.<p>In the end, this is good for everyone&#x27;s security.
PeekPokeabout 9 years ago
This only affects organisations that don&#x27;t contribute back into the community - leechers in otherwords.<p>Virustotal has always been a platform whose data is enriched by the community for the benefit of all and so Cylance, Crowdstrike, etc can frankly go suck balls if they don&#x27;t want to contribute.
评论 #11658652 未加载
pmxabout 9 years ago
Article puts a really negative spin on what can only be a good move. Why should leechers be allowed to make huge sums of money on the back of the rest of the communities work?
Cozumelabout 9 years ago
It doesn&#x27;t seem like a coincidence that this is coming right after OSVDB shut up shop ( <a href="https:&#x2F;&#x2F;blog.osvdb.org&#x2F;2016&#x2F;04&#x2F;05&#x2F;osvdb-fin&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.osvdb.org&#x2F;2016&#x2F;04&#x2F;05&#x2F;osvdb-fin&#x2F;</a> ), it&#x27;s a good move by industry to shut out leechers and over hyped snake oil companies.
fridekabout 9 years ago
Why are they not contributing back? I fail to see any real competitive advantage to gain. Even if you happen to protect against a threat that is not publicly known, you can&#x27;t really advertise that without a) making it publicly known b) making yourself sound like a jerk.
评论 #11659316 未加载
roosterjm2k2about 9 years ago
How is an article that is clearly incredibly biased on top of the front page?<p>Leechers who don&#x27;t contribute got cut off - that sounds incredibly fair... yet the article spins it to sound like it was malicious.<p>I guess the entitlement complex rolls all the way up to businesses, too...
评论 #11660476 未加载
_Codemonkeyismabout 9 years ago
Key sentence<p>&quot;Some security companies rely completely on the database, essentially freeloading, said executives on both sides of the divide, and did not want to share their analysis for fear of being found out.&quot;
cleverfooabout 9 years ago
Let me see if I can try to simplify the underlying problem here (I dabble in this space):<p>Little bit os background: writing pattern matching signatures is hard, adding a bunch of &quot;known malicious&quot; hashes to your malware database is easy.<p>So, company A with a staff of folks writing pattern matching signatures has its engine added to VirusTotal and virus total shares&#x2F;sell hashes found by that engine to folks that pay for its API. Company B, without a staff of engineers writing pattern matching signatures, signs up for VirtualTotal API and creates its malware database based purely on the hashes other actual engines create.<p>Two important things to keep in mind, when this happens at the scale of VirusTotal (basically all real engines are participating) the end result &quot;hash database&quot; is, essentially, bullet proof since it&#x27;s likely that any sample used to test its effectiveness will be run by VirusTotal first.<p>We (I run scanii.com a malware&#x2F;content detection API service) run into this all the time with folks either abusing or just not understanding the reason VT exists.
评论 #11661323 未加载
ZoFreXabout 9 years ago
&quot;Software security suffers&quot; [citation needed]<p>This article is a mix of facts and opinions and it plays pretty fast and loose with which are which.
matt_wulfeckabout 9 years ago
&gt; On Wednesday, the 12-year-old service quietly said it would cut off unlimited ratings access to companies that do not share their own evaluations of submitted samples.<p>Not sure why the headline spins google as the bad guy here. The system works best if all companies contribute, and clearly there&#x27;s some who are not contributing.
jbaviatabout 9 years ago
An open-source equivalent to VirusTotal, built for scaling, is IRMA by Quarkslab.<p><a href="http:&#x2F;&#x2F;irma.quarkslab.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;irma.quarkslab.com&#x2F;</a>
rpedelaabout 9 years ago
I am a little confused. VirusTotal has public and private APIs. Are these companies losing access to those APIs? If so, what if you aren&#x27;t a security company but want to use it for virus detection of uploaded files?
评论 #11660231 未加载