Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Webroot Secure Anywhere vs Zero Day Scriptor
Message
<blockquote data-quote="cruelsister" data-source="post: 421075" data-attributes="member: 7463"><p>Rod- Thanks for the feedback on the music. I definitely love Buddy Guy, but lately have been moving more in the direction of Lisa Gerrard and Sleepingdog.</p><p></p><p>As to the AV question any answer from me is probably not want you want to hear. In the past malware was written for High and Noble purposes (like making desktop icons move around when the mouse pointer got near them or something like deleting random directories- that sort of thing). But with the advent of things like Data Stealers and Ransomware (where the Blackhats want to get paid) things changed. This change was more a function of the badguys changing servers in order to avoid detection more than anything else. Basically the malware has morphed to a new version is in place, and so on. But as I really don't want to go into the weeds here, I direct you to these reports if you are interested:</p><p></p><p><a href="http://www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf" target="_blank">http://www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf</a></p><p></p><p>and here: <a href="https://www.fireeye.com/blog/executive-perspective/2014/05/ghost-hunting-with-anti-virus.html" target="_blank">https://www.fireeye.com/blog/executive-perspective/2014/05/ghost-hunting-with-anti-virus.html</a></p><p></p><p>A second reason is the inability of traditional AV solutions to detect script based codes (like the one I wrote that was highlighted in this series of Videos). Inability is probably not the best word to use, as they could be able if they change the way their products worked. The issue is that many will use a script for diverse legitimate purposes, but a simple change in the script can turn it into malware. As it is extremely hard to detect the difference between good and bad (and consistent FP's will be bad for business) they prefer to ignore them. This has led to numerous severe security breaches in place like Home Depot, Target, etc. The malware I wrote for these tests highlights this blindspot (with the added surprise of bypassing UAC). In short, this is not new knowledge to anyone.</p><p></p><p>Umbra- </p><p></p><p></p><p>Good point. Companies like Endgame in the US and Vupen in France charge millions for passing on the exploits they uncover.</p></blockquote><p></p>
[QUOTE="cruelsister, post: 421075, member: 7463"] Rod- Thanks for the feedback on the music. I definitely love Buddy Guy, but lately have been moving more in the direction of Lisa Gerrard and Sleepingdog. As to the AV question any answer from me is probably not want you want to hear. In the past malware was written for High and Noble purposes (like making desktop icons move around when the mouse pointer got near them or something like deleting random directories- that sort of thing). But with the advent of things like Data Stealers and Ransomware (where the Blackhats want to get paid) things changed. This change was more a function of the badguys changing servers in order to avoid detection more than anything else. Basically the malware has morphed to a new version is in place, and so on. But as I really don't want to go into the weeds here, I direct you to these reports if you are interested: [URL]http://www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf[/URL] and here: [URL]https://www.fireeye.com/blog/executive-perspective/2014/05/ghost-hunting-with-anti-virus.html[/URL] A second reason is the inability of traditional AV solutions to detect script based codes (like the one I wrote that was highlighted in this series of Videos). Inability is probably not the best word to use, as they could be able if they change the way their products worked. The issue is that many will use a script for diverse legitimate purposes, but a simple change in the script can turn it into malware. As it is extremely hard to detect the difference between good and bad (and consistent FP's will be bad for business) they prefer to ignore them. This has led to numerous severe security breaches in place like Home Depot, Target, etc. The malware I wrote for these tests highlights this blindspot (with the added surprise of bypassing UAC). In short, this is not new knowledge to anyone. Umbra- Good point. Companies like Endgame in the US and Vupen in France charge millions for passing on the exploits they uncover. [/QUOTE]
Insert quotes…
Verification
Post reply
Top