June 17, 2015 By Shane Schick 2 min read

Long before the emergence of Google or Bing, it was the search engine known as Ask Jeeves, but a recent move by Microsoft led many in the security sector to believe it was labeling the Ask toolbar as malware with its Security Essentials product.

In a post published on Microsoft’s TechNet blog, the software company said its Security Essentials will now detect “search protection code,” which ultimately makes it recognize certain versions of the Ask toolbar as malware. Using the toolbar can affect the default search engine in a browser, restrict users from modifying their default search preferences and cause pages to load more slowly.

Initial reports suggested Microsoft was taking a shot at Oracle, which bundles the search product in the Windows version of Java, by classifying it as malware. However, WinBeta, among other sites, quickly updated their stories once Microsoft posted a clarification that Security Essentials does not consider the latest version of the Ask toolbar a piece of malware. Instead, the software giant said it was referring to an outdated version that 99 percent of users don’t have installed.

As they become outdated, products like the Ask toolbar are sometimes described by Microsoft and others as “unwanted software” or potentially unwanted programs. Usually designed to serve online ads or other content for commercial purposes, Infosecurity Magazine noted that these programs are increasingly viewed as an IT risk. A recent case in point is Superfish, the adware that was pre-installed on many Lenovo machines that caused a scandal for the way it was potentially harming users.

Even without Microsoft’s intervention, removing something like the Ask toolbar is something any computer user can do at any time. The problem, as The Register pointed out, is that the request to install it can come up every time someone updates Java, so it takes some discipline to remember and not agree.

Whether or not the latest version of the Ask toolbar is compliant with Microsoft policies, the whole issue raises some questions about how malware should really be defined. If it’s something that doesn’t infect your computer and steal data but simply changes default settings in a browser, a writer on SlashGear argued, there may be a need to educate older or less tech-savvy users so they can be aware of the issues and their potential consequences. Now that Microsoft has made this move, Apple’s Mac OS users may start looking more carefully at what they’re installing, too.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today