Sophos red flags Google Analytics

Posted by   Virus Bulletin on   Jun 10, 2011

Popular analytics tool mistakenly flagged as 'high risk'.

Security firm Sophos had an embarrassing moment this morning when its scanner flagged Google Analytics as malicious.

While the average Internet user may have little experience with Google's analytics tool, it is used by half of the one million most popular websites - to track information about site visits through a number of scripts embedded in the web page. The false positive (FP) would thus have been seen by almost every user of Sophos's malware scanner online between 5am and 6am GMT.

Upon discovery of the FP, the company quickly released a fix that has since been issued to all its customers, with the scanning engines being updated automatically.

Sophos is far from the first company to suffer an embarrassing false positive and it is unlikely to be the last. Thankfully, the company did the only right thing to do in such a case: fixed the issue, warned customers and openly admitted its mistake.

More at Sophos's Naked Security blog here.

Posted on 10 June 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.