Malwarebytes puts automatic antivirus cleanup on USB stick

"The technician's best friend"

US security firm Malwarebytes has invented a USB stick that IT staff can plug into any PC to automate the process of finding, logging and cleaning up a range of malware.

Called Techbench, the product is a key-shaped USB flash drive designed to get around the need to install software on every system being inspected for malware. Simply plugging in the drive starts the scanning process which can be left to complete on its own before a log file is saved.

The drive can be moved from PC to PC, saving the results for each in a separate folder. Quarantined files are saved on the drive itself. If necessary, Techbench can work in an automated mode to clean up and reboot a system without an admin having to be present.

What's on the drive? The drive contains Malwarebytes own antivirus software plus a protection system called Chameleon used to force a scan even when malware is trying to block its operation.

"Techbench is made by technicians, for technicians. As an IT support worker, there is nothing more frustrating than dealing with an endless line of computers infected with stubborn malware, each needing a different type of fix," said Malwarebytes CEO, Marcin Kleczynski.

"Techbench will address this problem by providing something which can simply be plugged in and automatically remove the problem. Hopefully, it will make the lives of computer technicians that little bit better."

As a former tech support person, Kleczynski had come up with the idea himself after spending "many hours fixing infected computers at his local PC repair shop, even though they already had AV software installed."

The onboard software could be configured to automatically update itself, he said.

Techbench is on sale for $399.95 for a year's license.

That is perhaps the one slight disadvantage of putting a scanning engine on a hardware device; the buyer becomes fully invested. Maintaining the investment requires buying a new license each year.

Equally, that one device can over time be used to protect significant numbers of machines without the need to license or install software on each machine. The savings from such flexibility suggest it could find takers among security teams.

Join the CSO newsletter!

Error: Please check your email address.

Tags Personal TechsecurityMalwarebytes

More about Malwarebytes

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts