Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Antivirus software
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== History == {{further|History of computer viruses}} {{See also|Timeline of computer viruses and worms}} === 1971–1980 period (pre-antivirus days) === The first known computer virus appeared in 1971 and was dubbed the "[[Creeper (program)|Creeper virus]]".<ref>{{cite web|url=http://vx.netlux.org/lib/atc01.html|title=The Evolution of Viruses and Worms|author=Thomas Chen, Jean-Marc Robert|date=2004|access-date=February 16, 2009|url-status=dead|archive-url=https://web.archive.org/web/20090517083356/http://vx.netlux.org/lib/atc01.html|archive-date=May 17, 2009}}</ref> This computer virus infected [[Digital Equipment Corporation]]'s ([[Digital Equipment Corporation|DEC]]) [[PDP-10]] mainframe computers running the [[TENEX (operating system)|TENEX]] operating system.<ref name="Guardian">[https://www.theguardian.com/technology/2009/oct/23/internet-history From the first email to the first YouTube video: a definitive internet history] {{webarchive|url=https://web.archive.org/web/20161231172753/https://www.theguardian.com/technology/2009/oct/23/internet-history |date=December 31, 2016}}. Tom Meltzer and Sarah Phillips. ''[[The Guardian]]''. October 23, 2009</ref><ref>''IEEE Annals of the History of Computing, Volumes 27–28''. IEEE Computer Society, 2005. [https://books.google.com/books?id=xv9UAAAAMAAJ&q=Creeper+%22computer+worm%22 74] {{webarchive|url=https://web.archive.org/web/20160513081502/https://books.google.com/books?id=xv9UAAAAMAAJ&q=Creeper+%22computer+worm%22&dq=Creeper+%22computer+worm%22&hl=en&ei=pRzNTeaOBdGbtwe81ZyNDg&sa=X&oi=book_result&ct=result&resnum=3&ved=0CEUQ6AEwAg |date=May 13, 2016}}: "[...]from one machine to another led to experimentation with the ''Creeper'' program, which became the world's first computer worm: a computation that used the network to recreate itself on another node, and spread from node to node."</ref> The Creeper virus was eventually deleted by a program created by [[Ray Tomlinson]] and known as "[[Reaper (program)|The Reaper]]".<ref name="John Metcalf 2014">{{cite web|url=http://corewar.co.uk/creeper.htm|title=Core War: Creeper & Reaper|first=John|last=Metcalf|date=2014|access-date=May 1, 2014|url-status=live|archive-url=https://web.archive.org/web/20140502001343/http://corewar.co.uk/creeper.htm|archive-date=May 2, 2014}}</ref> Some people consider "The Reaper" the first antivirus software ever written – it may be the case, but it is important to note that the Reaper was actually a virus itself specifically designed to remove the Creeper virus.<ref name="John Metcalf 2014"/><ref>{{cite web|url=http://virus.wikidot.com/creeper|title=Creeper – The Virus Encyclopedia|url-status=live|archive-url=https://web.archive.org/web/20150920104511/http://virus.wikidot.com/creeper|archive-date=September 20, 2015}}</ref> The Creeper virus was followed by several other viruses. The first known that appeared "in the wild" was "[[Elk Cloner]]", in 1981, which infected [[Apple II]] computers.<ref>{{cite web|url=http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci989616,00.html|title=Elk Cloner|access-date=December 10, 2010|url-status=live|archive-url=https://web.archive.org/web/20110107111044/http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci989616,00.html|archive-date=January 7, 2011}}</ref><ref>{{cite web|url=http://science.discovery.com/top-ten/2009/computer-viruses/computer-viruses-10.html|title=Top 10 Computer Viruses: No. 10 – Elk Cloner|work=The Science Channel |access-date=December 10, 2010|url-status=live|archive-url=https://web.archive.org/web/20110207034138/http://science.discovery.com/top-ten/2009/computer-viruses/computer-viruses-10.html|archive-date=February 7, 2011}}</ref><ref>{{cite web|url=http://www.infoniac.com/hi-tech/list-of-computer-viruses-developed-in-1980s.html|title=List of Computer Viruses Developed in 1980s|access-date=December 10, 2010|url-status=live|archive-url=https://web.archive.org/web/20110724010543/http://www.infoniac.com/hi-tech/list-of-computer-viruses-developed-in-1980s.html|archive-date=July 24, 2011}}</ref> In 1983, the term ''"computer virus"'' was coined by [[Fred Cohen]] in one of the first ever published academic papers on [[computer virus]]es.<ref>[http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohen-viruses.html Fred Cohen: "Computer Viruses – Theory and Experiments" (1983)] {{webarchive|url=https://web.archive.org/web/20110608214157/http://www.eecs.umich.edu/%7Eaprakash/eecs588/handouts/cohen-viruses.html |date=June 8, 2011}}. Eecs.umich.edu (November 3, 1983). Retrieved on 2017-01-03.</ref> Cohen used the term ''"computer virus"'' to describe programs that: ''"affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself."''<ref>{{cite journal|title=Invited Paper: On the Implications of Computer Viruses and Methods of Defense|journal=Computers & Security|first=Fred|last=Cohen|date=April 1, 1988|volume=7|issue=2|pages=167–184 |doi=10.1016/0167-4048(88)90334-3}}</ref> (note that a more recent definition of [[computer virus]] has been given by the Hungarian security researcher [[Péter Szőr]]: ''"a code that recursively replicates a possibly evolved copy of itself"'').{{sfn|Szor|2005|p={{page needed|date=August 2020}}}}<ref>{{cite web |url=https://www.virusbtn.com/virusbulletin/archive/2013/12/vb201312-obituary-Peter-Szor |title=Virus Bulletin :: In memoriam: Péter Ször 1970–2013 |url-status=live |archive-url= https://web.archive.org/web/20140826120240/https://www.virusbtn.com/virusbulletin/archive/2013/12/vb201312-obituary-Peter-Szor |archive-date=August 26, 2014}}</ref> The first [[IBM PC compatible]] "in the wild" computer virus, and one of the first real widespread infections, was "[[Brain (computer virus)|Brain]]" in 1986. From then, the number of viruses has grown exponentially.<ref>{{cite journal |url=http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html |date=October 1992 |title=History of Viruses |doi=10.6028/NIST.IR.4939 |url-status=live |archive-url= https://web.archive.org/web/20110423085041/http://csrc.nist.gov/publications/nistir/threats/subsubsection3_3_1_1.html |archive-date=April 23, 2011|last1=Bassham |first1=Lawrence |last2=Polk |first2=W.|journal=Nistir 4939 |doi-access=free }}</ref><ref name="theregister">{{cite web |last=Leyden |first=John |url=https://www.theregister.co.uk/2006/01/19/pc_virus_at_20/ |title=PC virus celebrates 20th birthday |date=January 19, 2006 |work=[[The Register]] |access-date=March 21, 2011 |url-status=live |archive-url= https://web.archive.org/web/20100906023749/http://www.theregister.co.uk/2006/01/19/pc_virus_at_20/ |archive-date=September 6, 2010}}</ref> Most of the computer viruses written in the early and mid-1980s were limited to self-reproduction and had no specific damage routine built into the code. That changed when more and more programmers became acquainted with computer virus programming and created viruses that manipulated or even destroyed data on infected computers.<ref>{{Cite web|title=The History of Computer Viruses|date=November 10, 2017|url=https://www.bbvaopenmind.com/en/technology/digital-world/the-history-of-computer-viruses/}}</ref> Before [[internet]] connectivity was widespread, computer viruses were typically spread by infected [[floppy disk]]s. Antivirus software came into use, but was updated relatively infrequently. During this time, virus checkers essentially had to check executable files and the boot sectors of floppy disks and hard disks. However, as internet usage became common, viruses began to spread online.<ref>{{cite web|url = http://www.pandasecurity.com/homeusers/media/press-releases/viewnews?noticia=4974&entorno=&ver=&pagina=&producto=|title = (II) Evolution of computer viruses|access-date = June 20, 2009|last = Panda Security|date=April 2004|archive-url = https://web.archive.org/web/20090802042225/http://www.pandasecurity.com/homeusers/media/press-releases/viewnews?noticia=4974&entorno=&ver=&pagina=&producto= |archive-date = August 2, 2009}}</ref> === 1980–1990 period (early days) === There are competing claims for the innovator of the first antivirus product. Possibly, the first publicly documented removal of an "in the wild" computer virus (the "Vienna virus") was performed by [[Bernd Fix]] in 1987.<ref>[https://web.archive.org/web/20090713091733/http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311150 Kaspersky Lab Virus list]. viruslist.com</ref><ref>{{cite web | url = http://www.research.ibm.com/antivirus/timeline.htm | publisher = [[IBM]] | title = Virus timeline | first = Joe | last = Wells | date = August 30, 1996 | access-date = June 6, 2008| archive-url= https://web.archive.org/web/20080604011721/http://www.research.ibm.com/antivirus/timeline.htm| archive-date= June 4, 2008 | url-status= live}}</ref> In 1987, Andreas Lüning and Kai Figge, who founded [[G Data Software]] in 1985, released their first antivirus product for the [[Atari ST]] platform.<ref name="Gdata">{{cite web|url = https://www.gdatasoftware.com/about-g-data/company-profile|title = G Data presents first Antivirus solution in 1987|access-date = December 13, 2017|last = G Data Software AG|year = 2017|url-status = live|archive-url = https://web.archive.org/web/20170315111115/https://www.gdatasoftware.com/about-g-data/company-profile|archive-date = March 15, 2017|df = mdy-all}}</ref> In 1987, the ''Ultimate Virus Killer (UVK)'' was also released.<ref name="UniqueNameOfRef">{{cite web|url = http://st-news.com/uvk-book/|title = The ultimate Virus Killer Book and Software|access-date = July 6, 2016|last = Karsmakers|first = Richard|date = January 2010|url-status = live|archive-url = https://web.archive.org/web/20160729032353/http://st-news.com/uvk-book/|archive-date = July 29, 2016|df = mdy-all}}</ref> This was the de facto industry standard virus killer for the [[Atari ST]] and [[Atari Falcon]], the last version of which (version 9.0) was released in April 2004.{{Citation needed|date=July 2016}} In 1987, in the United States, [[John McAfee]] founded the [[McAfee]] company and, at the end of that year, he released the first version of [[McAfee VirusScan|VirusScan]].<ref>{{cite book| last = Cavendish| first = Marshall| title = Inventors and Inventions, Volume 4| url = https://books.google.com/books?id=YcPvV893aXgC| year = 2007| publisher = Paul Bernabeo| isbn = 978-0761477679| page = 1033}}</ref> Also in 1987 (in [[Czechoslovakia]]), Peter Paško, [[Rudolf Hrubý]], and Miroslav Trnka created the first version of [[ESET NOD32|NOD]] antivirus.<ref>{{cite web |url = https://www.eset.com/int/about/ |title = About ESET Company |url-status = live |archive-url = https://web.archive.org/web/20161028220311/https://www.eset.com/int/about/ |archive-date = October 28, 2016 |df = mdy-all }}</ref><ref>{{cite web |url = http://www.vsquare.co.th/index.php?option=com_djcatalog2&view=item&id=7:eset-nod32-antivirus&cid=1:soft-ware&Itemid=159 |title = ESET NOD32 Antivirus |publisher = Vision Square |date = February 16, 2016 |url-status = live |archive-url = https://web.archive.org/web/20160224031719/http://www.vsquare.co.th/index.php?option=com_djcatalog2&view=item&id=7:eset-nod32-antivirus&cid=1:soft-ware&Itemid=159 |archive-date = February 24, 2016 |df = mdy-all }}</ref> In 1987, Fred Cohen wrote that ''there is no algorithm that can perfectly detect all possible computer viruses''.<ref name="Cohen1987">Cohen, Fred, [https://web.archive.org/web/20110604155118/http://www.research.ibm.com/antivirus/SciPapers/VB2000DC.htm An Undetectable Computer Virus (Archived)], 1987, IBM</ref> Finally, at the end of 1987, the first two [[Heuristic (computer science)|heuristic]] antivirus utilities were released: ''Flushot Plus'' by [[Ross Greenberg]]<ref>{{cite web |author=Yevics, Patricia A. |url=https://www.americanbar.org/newsletter/publications/gp_solo_magazine_home/gp_solo_magazine_index/tsp97flushot.html |title=Flu Shot for Computer Viruses |publisher=americanbar.org |url-status=live |archive-url= https://web.archive.org/web/20140826115405/https://www.americanbar.org/newsletter/publications/gp_solo_magazine_home/gp_solo_magazine_index/tsp97flushot.html |archive-date=August 26, 2014}}</ref><ref>{{cite web |url=https://strom.wordpress.com/2010/04/01/ross-greenberg/ |title=How friends help friends on the Internet: The Ross Greenberg Story |first=David |last=Strom |publisher=wordpress.com |date=April 1, 2010 |archive-url= https://web.archive.org/web/20140826115800/https://strom.wordpress.com/2010/04/01/ross-greenberg/ |archive-date=August 26, 2014 |url-status=live}}</ref><ref>{{cite web |title=Anti-virus is 30 years old |url=http://www.spgedwards.com/2012/04/anti-virus-is-30-years-old.html |publisher=spgedwards.com |date=April 2012 |archive-url= https://web.archive.org/web/20150427213954/http://www.spgedwards.com/2012/04/anti-virus-is-30-years-old.html |archive-date=April 27, 2015 |url-status=live}}</ref> and ''Anti4us'' by Erwin Lanting.<ref>{{cite web |url=http://www.techlineinfo.com/a-brief-history-of-antivirus-software/ |title=A Brief History of Antivirus Software |publisher=techlineinfo.com |url-status=live |archive-url= https://web.archive.org/web/20140826120523/http://www.techlineinfo.com/a-brief-history-of-antivirus-software/ |archive-date=August 26, 2014}}</ref> In his [[O'Reilly Media|O'Reilly]] book, ''Malicious Mobile Code: Virus Protection for Windows'', Roger Grimes described Flushot Plus as "the first holistic program to fight malicious mobile code (MMC)."<ref>{{cite book |last = Grimes |first = Roger A. |title = Malicious Mobile Code: Virus Protection for Windows |publisher = O'Reilly Media, Inc. |date = June 1, 2001 |pages = 522 |url = https://books.google.com/books?id=GKDtVYJ0wesC&q=%22Ross+Greenberg%22+flushot&pg=PA43 |isbn = 9781565926820 |url-status = live |archive-url = https://web.archive.org/web/20170321110232/https://books.google.com/books?id=GKDtVYJ0wesC |archive-date = March 21, 2017 |df = mdy-all }}</ref> However, the kind of heuristic used by early AV engines was totally different from those used today. The first product with a heuristic engine resembling modern ones was [[FRISK Software International|F-PROT]] in 1991.<ref>{{cite web |url=http://www.frisk.is/fyrirtaeki.html |title=Friðrik Skúlason ehf. |language=is |url-status=dead |archive-url= https://web.archive.org/web/20060617090822/http://www.frisk.is/fyrirtaeki.html |archive-date=June 17, 2006}}</ref> Early heuristic engines were based on dividing the binary into different sections: data section, code section (in a legitimate binary, it usually starts always from the same location). Indeed, the initial viruses re-organized the layout of the sections, or overrode the initial portion of a section in order to jump to the very end of the file where malicious code was located—only going back to resume execution of the original code. This was a very specific pattern, not used at the time by any legitimate software, which represented an elegant heuristic to catch suspicious code. Other kinds of more advanced heuristics were later added, such as suspicious section names, incorrect header size, regular expressions, and partial pattern in-memory matching. In 1988, the growth of antivirus companies continued. In Germany, Tjark Auerbach founded [[Avira]] (''H+BEDV'' at the time) and released the first version of ''[[AntiVir]]'' (named ''"Luke Filewalker"'' at the time). In [[Bulgaria]], Vesselin Bontchev released his first freeware antivirus program (he later joined [[FRISK Software International|FRISK Software]]). Also Frans Veldman released the first version of [[ThunderByte Antivirus]], also known as ''TBAV'' (he sold his company to [[Norman Safeground]] in 1998). In [[Czechoslovakia]], [[Pavel Baudiš]] and Eduard Kučera founded [[Avast Software]] (at the time ''ALWIL Software'') and released their first version of avast! antivirus. In June 1988, in [[South Korea]], [[Ahn Cheol-Soo]] released its first antivirus software, called ''V1'' (he founded AhnLab later in 1995). Finally, in autumn 1988, in the United Kingdom, Alan Solomon founded S&S International and created his ''[[Dr Solomon's Antivirus|Dr. Solomon's Anti-Virus Toolkit]]'' (although he launched it commercially only in 1991 – in 1998 Solomon's company was acquired by [[McAfee]], then known as Network Associates Inc.). Also in 1988, a mailing list named VIRUS-L<ref name="VIRUS-L mailing list">{{cite web |url=http://securitydigest.org/virus/mirror/www.phreak.org-virus_l/ |title=The 'Security Digest' Archives (TM) : www.phreak.org-virus_l |url-status=live |archive-url= https://web.archive.org/web/20100105064155/http://securitydigest.org/virus/mirror/www.phreak.org-virus_l/ |archive-date=January 5, 2010}}</ref> was started on the [[BITNET]]/[[European Academic Research Network|EARN]] network where new viruses and the possibilities of detecting and eliminating viruses were discussed. Some members of this mailing list were: Alan Solomon, [[Eugene Kaspersky]] ([[Kaspersky Lab]]), [[Friðrik Skúlason]] ([[FRISK Software International|FRISK Software]]), [[John McAfee]] ([[McAfee]]), Luis Corrons ([[Panda Security]]), [[Mikko Hyppönen]] ([[F-Secure]]), [[Péter Szőr]], Tjark Auerbach ([[Avira]]) and Vesselin Bontchev ([[FRISK Software International|FRISK Software]]).<ref name="VIRUS-L mailing list"/> In 1989, in [[Iceland]], [[Friðrik Skúlason]] created the first version of [[FRISK Software International|F-PROT Anti-Virus]] (he founded [[FRISK Software International|FRISK Software]] only in 1993). Meanwhile, in the United States, [[NortonLifeLock|Symantec]] (founded by Gary Hendrix in 1982) launched its first ''[[Norton AntiVirus|Symantec antivirus for Macintosh]]'' (SAM).<ref>{{cite web |url=http://www.pcm.com/n/Symantec-Softwares/manufacturers-14|title=Symantec Softwares and Internet Security at PCM|url-status=live|archive-url=https://web.archive.org/web/20140701134751/http://www.pcm.com/n/Symantec-Softwares/manufacturers-14|archive-date=July 1, 2014}}</ref><ref>SAM Identifies Virus-Infected Files, Repairs Applications, ''InfoWorld'', May 22, 1989</ref> SAM 2.0, released March 1990, incorporated technology allowing users to easily update SAM to intercept and eliminate new viruses, including many that didn't exist at the time of the program's release.<ref>SAM Update Lets Users Program for New Viruses, ''InfoWorld'', February 19, 1990</ref> In the end of the 1980s, in United Kingdom, Jan Hruska and Peter Lammer founded the security firm [[Sophos]] and began producing their first antivirus and encryption products. In the same period, in Hungary, [[VirusBuster]] was founded (and subsequently incorporated by [[Sophos]]).<ref>{{cite web |url=https://pitchbook.com/profiles/company/144629-92|title=VirusBuster Company Profile 2024: Valuation, Investors, Acquisition}}</ref> === 1990–2000 period (emergence of the antivirus industry) === In 1990, in Spain, Mikel Urizarbarrena founded [[Panda Security]] (''Panda Software'' at the time).<ref>{{cite web |url = http://www.gtts2012.com/panda-security/ |title = Panda Security |first = Sharanya |last = Naveen |access-date = May 31, 2016 |url-status = dead |archive-url = https://web.archive.org/web/20160630011311/http://www.gtts2012.com/panda-security/ |archive-date = June 30, 2016 |df = mdy-all }}</ref> In Hungary, the security researcher [[Péter Szőr]] released the first version of ''Pasteur'' antivirus. In 1990, the [[Computer Antivirus Research Organization]] ([[CARO]]) was founded. In 1991, CARO released the ''"Virus Naming Scheme"'', originally written by [[Friðrik Skúlason]] and Vesselin Bontchev.<ref>{{cite web|url=http://www.caro.org/articles/naming.html|title=A New Virus Naming Convention (1991) – CARO – Computer Antivirus Research Organization|url-status=live|archive-url=https://web.archive.org/web/20110813050343/http://caro.org/articles/naming.html|archive-date=August 13, 2011}}</ref> Although this naming scheme is now outdated, it remains the only existing standard that most computer security companies and researchers ever attempted to adopt. [[CARO]] members includes: Alan Solomon, Costin Raiu, Dmitry Gryaznov, [[Eugene Kaspersky]], [[Friðrik Skúlason]], [[Igor Muttik]], [[Mikko Hyppönen]], Morton Swimmer, Nick FitzGerald, [[Padgett Peterson]], Peter Ferrie, Righard Zwienenberg and Vesselin Bontchev.<ref>{{cite web|title=CARO Members|url=http://www.caro.org/users/index.html|publisher=CARO|access-date=June 6, 2011|url-status=live|archive-url=https://web.archive.org/web/20110718173410/http://www.caro.org/users/index.html|archive-date=July 18, 2011}}</ref><ref>[http://caro.org/users/igor.html CAROids, Hamburg 2003] {{webarchive |url=https://web.archive.org/web/20141107045334/http://caro.org/users/igor.html |date=November 7, 2014}}</ref> In 1991, in the United States, [[NortonLifeLock|Symantec]] released the first version of [[Norton AntiVirus]]. In the same year, in the [[Czech Republic]], Jan Gritzbach and Tomáš Hofer founded [[AVG Technologies]] (''Grisoft'' at the time), although they released the first version of their ''Anti-Virus Guard'' (AVG) only in 1992. On the other hand, in [[Finland]], [[F-Secure]] (founded in 1988 by Petri Allas and Risto Siilasmaa – with the name of Data Fellows) released the first version of their antivirus product. [[F-Secure]] claims to be the first antivirus firm to establish a presence on the World Wide Web.<ref>{{cite web |url=http://www.f-secure.com/weblog/ |title=F-Secure Weblog : News from the Lab |publisher=F-secure.com |access-date=September 23, 2012 |url-status=live |archive-url=https://web.archive.org/web/20120923084039/http://www.f-secure.com/weblog/ |archive-date=September 23, 2012}}</ref> In 1991, the [[European Institute for Computer Antivirus Research]] (EICAR) was founded to further antivirus research and improve development of antivirus software.<ref>{{cite web|title=About EICAR|url=http://www.eicar.org/6-0-General-Info.html|work=EICAR official website|access-date=October 28, 2013|url-status=dead|archive-url=https://web.archive.org/web/20180614161636/http://www.eicar.org/6-0-General-Info.html|archive-date=June 14, 2018}}</ref><ref>{{cite web|url= http://www.eset.com/resources/white-papers/AVAR-EICAR-2010.pdf |title=Test Files and Product Evaluation: the Case for and against Malware Simulation |first1=David|last1=Harley|first2=Lysa|last2=Myers|first3=Eddy|last3=Willems |work=AVAR2010 13th Association of anti Virus Asia Researchers International Conference |access-date=June 30, 2011|archive-url = https://web.archive.org/web/20110929040553/http://www.eset.com/resources/white-papers/AVAR-EICAR-2010.pdf |archive-date = September 29, 2011}}</ref> In 1992, in Russia, Igor Danilov released the first version of ''SpiderWeb'', which later became [[Dr.Web]].<ref>{{cite web |url=http://www.reviewcentre.com/reviews95169.html |title=Dr. Web LTD Doctor Web / Dr. Web Reviews, Best AntiVirus Software Reviews, Review Centre |publisher=Reviewcentre.com |access-date=February 17, 2014 |url-status=live |archive-url=https://web.archive.org/web/20140223163636/http://www.reviewcentre.com/reviews95169.html |archive-date=February 23, 2014}}</ref> In 1994, [[AV-TEST]] reported that there were 28,613 unique malware samples (based on MD5) in their database.<ref name="ReferenceA">[In 1994, AV-Test.org reported 28,613 unique malware samples (based on MD5). "A Brief History of Malware; The First 25 Years"]</ref> Over time other companies were founded. In 1996, in [[Romania]], [[Bitdefender]] was founded and released the first version of ''Anti-Virus eXpert'' (AVX).<ref>{{cite web|title=BitDefender Product History |url=http://www.bitdefender.co.uk/site/Main/view/product-history.html |url-status=dead |archive-url=https://web.archive.org/web/20120317052525/http://www.bitdefender.co.uk/site/Main/view/product-history.html |archive-date=March 17, 2012}}</ref> In 1997, in Russia, [[Eugene Kaspersky]] and [[Natalya Kaspersky]] co-founded security firm [[Kaspersky Lab]].<ref>{{cite web|url=http://infowatch.com/company/management|title=InfoWatch Management|author=<!--Staff writer(s); no by-line.-->|publisher=InfoWatch|access-date=August 12, 2013|url-status=dead|archive-url=https://web.archive.org/web/20130821073955/http://infowatch.com/company/management|archive-date=August 21, 2013}}</ref> In 1996, there was also the first "in the wild" [[Linux]] virus, known as ''"[[Staog]]"''.<ref>{{cite web|url=https://help.ubuntu.com/community/Linuxvirus|title=Linuxvirus – Community Help Wiki|url-status=live|archive-url=https://web.archive.org/web/20170324032340/https://help.ubuntu.com/community/Linuxvirus|archive-date=March 24, 2017}}</ref> In 1999, [[AV-TEST]] reported that there were 98,428 unique malware samples (based on MD5) in their database.<ref name="ReferenceA"/> === 2000–2005 period === In 2000, Rainer Link and Howard Fuhs started the first open source antivirus engine, called ''OpenAntivirus Project''.<ref>{{cite web|url=http://openantivirus.org|title=Sorry – recovering...|url-status=live|archive-url=https://web.archive.org/web/20140826133818/http://openantivirus.org/|archive-date=August 26, 2014}}</ref> In 2001, Tomasz Kojm released the first version of [[ClamAV]], the first ever open source antivirus engine to be commercialised. In 2007, [[ClamAV]] was bought by [[Sourcefire]],<ref>{{cite web |url=http://www.clamav.org/2007/08/17/sourcefire-acquires-clamav/ |title=Sourcefire acquires ClamAV |publisher=ClamAV |date=August 17, 2007 |access-date=February 12, 2008 |url-status=dead |archive-url= https://web.archive.org/web/20071215031743/http://www.clamav.org/2007/08/17/sourcefire-acquires-clamav/ |archive-date=December 15, 2007}}</ref> which in turn was acquired by [[Cisco Systems]] in 2013.<ref>{{cite web| url=http://www.cisco.com/web/about/ac49/ac0/ac1/ac259/sourcefire.html| title=Cisco Completes Acquisition of Sourcefire| date=October 7, 2013| website=cisco.com| access-date=June 18, 2014| archive-url= https://web.archive.org/web/20150113145121/http://www.cisco.com/web/about/ac49/ac0/ac1/ac259/sourcefire.html |archive-date=January 13, 2015| url-status=live}}</ref> In 2002, in United Kingdom, [[Morten Lund (investor)|Morten Lund]] and Theis Søndergaard co-founded the antivirus firm BullGuard.<ref>[http://www.brandeins.de/magazin/bewegt-euch/der-unternehmer.html Der Unternehmer – brand eins online] {{webarchive|url=https://web.archive.org/web/20121122114224/http://www.brandeins.de/magazin/bewegt-euch/der-unternehmer.html |date=November 22, 2012}}. Brandeins.de (July 2009). Retrieved on January 3, 2017.</ref> In 2005, [[AV-TEST]] reported that there were 333,425 unique malware samples (based on MD5) in their database.<ref name="ReferenceA"/> === 2005–2014 period === In 2007, [[AV-TEST]] reported a number of 5,490,960 new unique malware samples (based on MD5) only for that year.<ref name="ReferenceA"/> In 2012 and 2013, antivirus firms reported a new malware samples range from 300,000 to over 500,000 per day.<ref>{{cite magazine|title=The digital detective: Mikko Hypponen's war on malware is escalating |first=Greg |last=Williams |magazine=Wired |date=April 2012 |url=https://www.wired.co.uk/magazine/archive/2012/04/features/the-digital-detective |archive-url= https://web.archive.org/web/20160315051548/http://www.wired.co.uk/magazine/archive/2012/04/features/the-digital-detective |archive-date=March 15, 2016 |url-status=live}}</ref><ref>{{cite web |url=http://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it.html|title=Everyday cybercrime – and what you can do about it|date=September 16, 2013 |url-status=live |archive-url= https://web.archive.org/web/20140220062643/http://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it.html |archive-date=February 20, 2014}}</ref> Over the years it has become necessary for antivirus software to use several different strategies (e.g. specific email and network protection or low level modules) and detection algorithms, as well as to check an increasing variety of files, rather than just executables, for several reasons: * Powerful [[macro (computer science)|macro]]s used in [[word processor]] applications, such as [[Microsoft Word]], presented a risk. Virus writers could use the macros to write viruses embedded within documents. This meant that computers could now also be at risk from infection by opening documents with hidden attached macros.{{sfn|Szor|2005|pp=66–67}} * The possibility of embedding executable objects inside otherwise non-executable file formats can make opening those files a risk.<ref>{{cite web|url = http://news.cnet.com/2100-1001-271267.html|title = New virus travels in PDF files|access-date = October 29, 2011|date = August 7, 2001|url-status = live|archive-url = https://web.archive.org/web/20110616051806/http://news.cnet.com/2100-1001-271267.html|archive-date = June 16, 2011|df = mdy-all}}</ref> * Later email programs, in particular Microsoft's [[Outlook Express]] and [[Microsoft Outlook|Outlook]], were [[vulnerability (computing)|vulnerable]] to viruses embedded in the email body itself. A user's computer could be infected by just opening or previewing a message.<ref>{{cite web|url = http://www.slipstick.com/outlook/antivirus.htm|title = Protecting Microsoft Outlook against Viruses|access-date = June 18, 2009|last = Slipstick Systems|date=February 2009| archive-url= https://web.archive.org/web/20090602233638/http://www.slipstick.com/outlook/antivirus.htm| archive-date= June 2, 2009 | url-status= live}}</ref> In 2005, [[F-Secure]] was the first security firm that developed an Anti-Rootkit technology, called ''BlackLight''. Because most users are usually connected to the Internet on a continual basis, [[Jon Oberheide]] first proposed a [[Cloud computing|Cloud-based]] antivirus design in 2008.<ref>{{cite web|url=https://www.usenix.org/legacy/event/sec08/tech/full_papers/oberheide/oberheide_html/index.html|title=CloudAV: N-Version Antivirus in the Network Cloud|publisher=usenix.org|url-status=live|archive-url=https://web.archive.org/web/20140826115701/https://www.usenix.org/legacy/event/sec08/tech/full_papers/oberheide/oberheide_html/index.html|archive-date=August 26, 2014}}</ref> In February 2008 McAfee Labs added the industry-first cloud-based anti-malware functionality to VirusScan under the name Artemis. It was tested by [[AV-Comparatives]] in February 2008<ref>[http://www.av-comparatives.org/wp-content/uploads/2008/01/sp_fdt_mcafee_200802_en.pdf McAfee Artemis Preview Report] {{webarchive|url=https://web.archive.org/web/20160403110306/http://www.av-comparatives.org/wp-content/uploads/2008/01/sp_fdt_mcafee_200802_en.pdf |date=April 3, 2016}}. av-comparatives.org</ref> and officially unveiled in August 2008 in [[McAfee VirusScan]].<ref>[http://library.corporate-ir.net/library/10/104/104920/items/313409/MFEFQ308Oct30Final.pdf McAfee Third Quarter 2008] {{webarchive|url=https://web.archive.org/web/20160403020632/http://library.corporate-ir.net/library/10/104/104920/items/313409/MFEFQ308Oct30Final.pdf |date=April 3, 2016}}. corporate-ir.net</ref> Cloud AV created problems for comparative testing of security software – part of the AV definitions was out of testers control (on constantly updated AV company servers) thus making results non-repeatable. As a result, [[Anti-Malware Testing Standards Organization|Anti-Malware Testing Standards Organisation]] (AMTSO) started working on method of testing cloud products which was adopted on May 7, 2009.<ref>{{cite web |url=http://www.amtso.org/download/amtso-best-practices-for-testing-in-the-cloud-security-products|title=AMTSO Best Practices for Testing In-the-Cloud Security Products|publisher=AMTSO|url-status=dead |archive-url= https://web.archive.org/web/20160414175042/http://www.amtso.org/download/amtso-best-practices-for-testing-in-the-cloud-security-products/|archive-date=April 14, 2016|access-date=March 21, 2016}}</ref> In 2011, [[AVG (software)|AVG]] introduced a similar cloud service, called Protective Cloud Technology.<ref>{{cite web|url=http://www.avgsecurity.co.za/technology-overview |title=TECHNOLOGY OVERVIEW |website=AVG Security |access-date=February 16, 2015 |url-status=dead |archive-url=https://web.archive.org/web/20150602055929/http://www.avgsecurity.co.za/technology-overview |archive-date=June 2, 2015}}</ref> === 2014–present: rise of next-gen, market consolidation === Following the 2013 release of the APT 1 report from [[Mandiant]], the industry has seen a shift towards signature-less approaches to the problem capable of detecting and mitigating [[Zero-day (computing)|zero-day attacks]].<ref>{{cite magazine|url=https://www.wired.com/story/mysterious-return-of-years-old-chinese-malware-apt1/|title=The Mysterious Return of Years-Old Chinese Malware|magazine=Wired|date=18 October 2018|access-date=16 June 2019|via=www.wired.com|last1=Barrett|first1=Brian}}</ref> Numerous approaches to address these new forms of threats have appeared, including behavioral detection, artificial intelligence, machine learning, and cloud-based file detection. According to Gartner, it is expected the rise of new entrants, such [[VMware Carbon Black|Carbon Black]], [[Cylance]] and [[CrowdStrike|Crowdstrike]] will force end point protection incumbents into a new phase of innovation and acquisition.<ref>{{cite web|url=https://www.gartner.com/doc/reprints?id=1-2XXIZ8F|title=Magic Quadrant Endpoint Protection Platforms 2016|publisher=Gartner Research}}</ref> One method from [[Bromium]] involves micro-virtualization to protect desktops from malicious code execution initiated by the end user. Another approach from [[SentinelOne]] and [[Carbon Black (company)|Carbon Black]] focuses on behavioral detection by building a full context around every process execution path in real time,<ref name="NetworkWorld">{{cite web|url=http://www.networkworld.com/article/2466793/security0/start-up-offers-up-endpoint-detection-and-response-for-behavior-based-malware-detection.html|title=Start-up offers up endpoint detection and response for behavior-based malware detection|first=Ellen|last=Messmer|publisher=networkworld.com|url-status=live|archive-url=https://web.archive.org/web/20150205023309/http://www.networkworld.com/article/2466793/security0/start-up-offers-up-endpoint-detection-and-response-for-behavior-based-malware-detection.html|archive-date=February 5, 2015|date=2014-08-20}}</ref><ref name="HSToday.US">{{cite web|url=http://www.hstoday.us/briefings/industry-news/single-article/bromium-research-reveals-insecurity-in-existing-endpoint-malware-protection-deployments/05ccfa234d62872b3d3a5422f2cbd4bd.html|title=Homeland Security Today: Bromium Research Reveals Insecurity in Existing Endpoint Malware Protection Deployments|url-status=live|archive-url=https://web.archive.org/web/20150924031641/http://www.hstoday.us/briefings/industry-news/single-article/bromium-research-reveals-insecurity-in-existing-endpoint-malware-protection-deployments/05ccfa234d62872b3d3a5422f2cbd4bd.html|archive-date=September 24, 2015}}</ref> while [[Cylance Inc.|Cylance]] leverages an artificial intelligence model based on machine learning.<ref>{{Cite news|url=https://www.forbes.com/sites/thomasbrewster/2016/07/06/duelling-unicorns-crowdstrike-vs-cylance-in-brutal-battle-to-knock-hackers-out/#9cd0a3b12114|title=Duelling Unicorns: CrowdStrike Vs. Cylance In Brutal Battle To Knock Hackers Out|work=Forbes|date=July 6, 2016|url-status=live|archive-url=https://web.archive.org/web/20160911015121/http://www.forbes.com/sites/thomasbrewster/2016/07/06/duelling-unicorns-crowdstrike-vs-cylance-in-brutal-battle-to-knock-hackers-out/#9cd0a3b12114|archive-date=September 11, 2016}}</ref> Increasingly, these signature-less approaches have been defined by the media and analyst firms as "next-generation" antivirus<ref>{{Cite news|url=http://thevarguy.com/blog/anti-virus-dead-shift-toward-next-gen-endpoints|title=Is Anti-virus Dead? The Shift Toward Next-Gen Endpoints|last=Potter|first=Davitt|date=June 9, 2016|url-status=usurped|archive-url=https://web.archive.org/web/20161220093921/http://thevarguy.com/blog/anti-virus-dead-shift-toward-next-gen-endpoints|archive-date=December 20, 2016}}</ref> and are seeing rapid market adoption as certified antivirus replacement technologies by firms such as Coalfire and DirectDefense.<ref>{{cite web|url=https://www.cylance.com/cylanceprotect-achieves-hipaa-security-rule-compliance-certification|title=CylancePROTECT® Achieves HIPAA Security Rule Compliance Certification|publisher=Cylance|url-status=dead|archive-url=https://web.archive.org/web/20161022023812/https://www.cylance.com/cylanceprotect-achieves-hipaa-security-rule-compliance-certification|archive-date=October 22, 2016|access-date=October 21, 2016}}</ref> In response, traditional antivirus vendors such as [[Trend Micro]],<ref>{{cite web|url=http://www.trendmicro.com/us/business/xgen/index.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_-/xgen/index.html-_-vanity|title=Trend Micro-XGen|date=October 18, 2016|publisher=Trend Micro|url-status=live|archive-url=https://web.archive.org/web/20161221074459/http://www.trendmicro.com/us/business/xgen/index.html?cm_mmc=VURL%3Awww.trendmicro.com-_-VURL-_-%2Fxgen%2Findex.html-_-vanity|archive-date=December 21, 2016}}</ref> [[NortonLifeLock|Symantec]] and [[Sophos]]<ref>{{cite web|url=https://www.sophos.com/en-us/products/endpoint-antivirus.aspx|title=Next-Gen Endpoint|publisher=Sophos|url-status=live|archive-url=https://web.archive.org/web/20161106204530/https://www.sophos.com/en-us/products/endpoint-antivirus.aspx|archive-date=November 6, 2016}}</ref> have responded by incorporating "next-gen" offerings into their portfolios as analyst firms such as [[Forrester Research|Forrester]] and [[Gartner]] have called traditional signature-based antivirus "ineffective" and "outdated".<ref>[https://www.forrester.com/report/The+Forrester+Wave+Endpoint+Security+Suites+Q4+2016/-/E-RES113145 The Forrester Wave™: Endpoint Security Suites, Q4 2016] {{webarchive|url=https://web.archive.org/web/20161022024840/https://www.forrester.com/report/The+Forrester+Wave+Endpoint+Security+Suites+Q4+2016/-/E-RES113145 |date=October 22, 2016}}. Forrester.com (October 19, 2016). Retrieved on 2017-01-03.</ref> As of [[Windows 8]], Windows includes its own free antivirus protection under the [[Windows Defender]] brand. Despite bad detection scores in its early days, AV-Test now certifies Defender as one of its top products.<ref>{{Cite web |author1=Paul Wagenseil |date=2016-05-25 |title=Is Windows Defender Good Enough? Not Yet |url=https://www.tomsguide.com/us/avoid-windows-defender,news-22729.html |access-date=2023-12-18 |website=Tom's Guide |language=en}}</ref><ref>{{Cite web |title=Test antivirus software for Windows 11 - October 2023 |url=https://www.av-test.org/en/antivirus/home-windows/ |access-date=2023-12-18 |website=www.av-test.org |language=en-US}}</ref> While it isn't publicly known how the inclusion of antivirus software in Windows affected antivirus sales, Google search traffic for antivirus has declined significantly since 2010.<ref>{{Cite web |title=Google Trends |url=https://trends.google.com/trends/explore?date=all&q=antivirus&hl=en |access-date=2023-12-18 |website=Google Trends |language=en-US |archive-date=December 18, 2023 |archive-url=https://web.archive.org/web/20231218123917/https://trends.google.com/trends/explore?date=all&q=antivirus&hl=en |url-status=dead }}</ref> In 2014 Microsoft bought McAfee.<ref>{{cite web|title=McAfee Becomes Intel Security|url=http://s927.t.en25.com/e/es.aspx?s=927&e=269752&elq=1610bb9546d14d169335d6b8d1b37f7c|publisher=McAfee Inc|access-date=January 15, 2014|archive-date=January 15, 2014|archive-url=https://archive.today/20140115034548/http://s927.t.en25.com/e/es.aspx?s=927&e=269752&elq=1610bb9546d14d169335d6b8d1b37f7c|url-status=dead}}</ref> Since 2016, there has been a notable amount of consolidation in the industry. [[Avast]] purchased [[AVG AntiVirus|AVG]] in 2016 for $1.3 billion.<ref>{{Cite web |title=Avast Announces Agreement to Acquire AVG for $1.3B |url=https://press.avast.com/avast-announces-agreement-to-acquire-avg-for-13b |access-date=2023-12-18 |website=Avast Announces Agreement to Acquire AVG for $1.3B |language=en}}</ref> [[Avira]] was acquired by [[Norton AntiVirus|Norton]] owner [[Gen Digital]] (then NortonLifeLock) in 2020 for $360 million.<ref>{{Cite web |last=Lunden |first=Ingrid |date=2020-12-07 |title=NortonLifeLock acquires Avira in $360M all-cash deal, 8 months after Avira was acquired for $180M |url=https://techcrunch.com/2020/12/07/nortonlifelock-acquires-avira-in-360m-all-cash-deal-8-months-after-avira-was-acquired-for-180m/ |access-date=2023-12-18 |website=TechCrunch |language=en-US}}</ref> In 2021, the [[Avira]] division of [[Gen Digital]] acquired BullGuard.<ref>{{Cite web |author1=Daniel Todd |date=2022-02-07 |title=BullGuard to drop name in favour of Norton branding |url=https://www.itpro.com/business/business-strategy/367111/bullguard-to-drop-name-in-favour-of-norton-branding |access-date=2023-12-18 |website=channelpro |language=en}}</ref> The BullGuard brand was discontinued in 2022 and its customers were migrated to Norton. In 2022, Gen Digital acquired Avast, effectively consolidating four major antivirus brands under one owner.<ref>{{Cite web |title=NortonLifeLock Completes Merger with Avast |url=https://press.avast.com/nortonlifelock-completes-merger-with-avast |access-date=2023-12-18 |website=NortonLifeLock Completes Merger with Avast |language=en}}</ref> In September 2024, following the US Commerce Department's ban on [[Kaspersky Lab|Kaspersky]], Pango Group acquired its customers (about 1 million).<ref>{{Cite web |title=Kaspersky antivirus gets sold to U.S. firm Pango Group |url=https://www.axios.com/2024/09/05/kaspersky-pango-group-antivirus-deal |access-date=2025-05-14 |website=Axios |date=2024-09-05 |language=en}}</ref> The customers received continued services with no action required on their part. Then, in December 2024, Pango Group merged with Total Security, the provider of Total AV antivirus. The combined entity, now called Point Wild, has an enterprise value of $1.7 billion. <ref>{{Cite web |title=Pango Group Merges with Total Security; Combined Company Rebranded Point Wild |url=https://www.prnewswire.com/news-releases/pango-group-merges-with-total-security-combined-company-rebranded-point-wild-302330290.html |access-date=2025-05-14 |website=PR Newswire |date=2024-06-26 |language=en}}</ref> As of 2024, more than half of Americans use built-in antivirus protection for their devices like [[Microsoft Defender]] or [[Gatekeeper (macOS)|XProtect]] from [[Apple Inc.|Apple]]. However, about 121 million adults still use third-party antivirus software. Half of these adults use paid products, and about 50% of third-party software users - the owners of personal computers and [[Windows]] operating systems.<ref>{{Cite web |title=2024 Antivirus Trends, Statistics, and Merket Report |url=https://www.security.org/antivirus/antivirus-consumer-report-annual/ |url-status=live |archive-url=https://web.archive.org/web/20240717010707/https://www.security.org/antivirus/antivirus-consumer-report-annual/ |archive-date=2024-07-17 |access-date=2024-11-24 |website=Security.org |language=en}}</ref> Antivirus programs on mobile devices are used by 17% of adults.<ref>{{Cite web |title=2025 Antivirus Trends, Statistics, and Market Report |url=https://www.security.org/antivirus/antivirus-consumer-report-annual/ |access-date=2025-03-18 |website=Security.org |language=en-US}}</ref> The 2025 antivirus market report confirms that most third-party antivirus users are on desktop devices, primarily aged between 35 and 45.<ref>{{Cite web |title=2025 antivirus market report: trends, stats and forecasts |url=https://cybernews.com/best-antivirus-software/antivirus-market-report/ |access-date=2025-05-14 |website=Cybernews |date=2025-04-22 |language=en}}</ref> In contrast, younger users (18–25) tend to rely on [[Ad blocking|ad blockers]] instead.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)