The Channel logo

News

By | John Leyden 13th June 2008 12:25

Yahoo! Messenger! Trojan! false alarm!

ZoneAlarm in Brown Alert drama

Check Point's personal firewall software falsely identified a component of Yahoo! Messenger as a Trojan this week.

ZoneAlarm Pro mistakenly pegged an audio conferencing ActiveX control within Yahoo Messenger as the Yspy Trojan. As a result users of the software were prompted to delete yacscom.dll, a critical component of the IM client. By default the harmless control is placed in quarantine.

Versions of the control in Yahoo version 8.1 trip the false alarm, Beta News (which came across the problem on its own systems) reports.

The issue created an ongoing discussion thread on the ZoneAlarm Support forum. Late on Thursday one user posted a reply from a Check Point rep confirming the false alarm.

Check Point is reportedly working on a fix. The Israeli firm is yet to respond to our own queries on the matter.

False alarms by security software happen periodically to vendors across the industry even though the issue is rarely discussed more widely. Previous examples have included Kaspersky's designation of software as infected by a low-risk virus and Microsoft's Live OneCare anti-virus service falsely warning that Gmail's website was contaminated by a computer virus. ®

comment icon Read 13 comments on this article alert Send corrections

Opinion

Windows 10 on Surface 3

Tim Anderson

It's do-or-die for Microsoft's new operating system on 29 July
Wine Taps by N Wong, Flickr, CC 2.0 License

Simon Sharwood

Clouds sell compute by the glass. On-premises kitmakers want to sell wine-as-a-service

Greg Knieriemen

Privacy, security, information sovereignty, what we all want, right?
Microsoft's Joe Belfiore, speaking at Build 2015

Andrew Orlowski

Redmond devotees may as well have demanded manga desktop wallpaper

Features

Time to pull out the magnifying glass to swot up on those Ts&Cs
Android icon desktop toys
Nice devices, now speak 'enterprise' to me
Standard Form 86 reads like a biography of each intelligence worker
Protestor barricade image via Shutterstock
Breaking through the hardware barricades to a new network state