11 Million Computers Fall Victim as Info-Stealer Bypasses Major Antiviruses

F

ForgottenSeer 72227

In general a good advice, but not enough to protect you against info stealers.
You are absolutely right!

While it is true that strategy will not work against info stealers, it will work against ransomware, which was the example I used when I made that comment.;)

In keeping with the spirit of this thread, it just serves as another remainder that any and all AV/security program can miss any type of malware at any given time...despite what AV marketing and tests may lead you to believe. It's worth noting that people in general tend to too rely too much in there AV's capabilities and as a result, they let their guard down. It is why it is so important to practice good computing hygiene, as it has way more impact on your overall security then any security program can actually/truly offer IMHO. Yes having an AV along side practicing good habits is still a good idea, but it shouldn't be a replacement for using good practices. While you can still get infected using good habits, it still lowers your chances significantly IMHO. As I've said, it is especially hard for the average person to keep up with all of this and it isn't getting any easier unfortunately.:(
 

pvsurfer

Level 2
Verified
Oct 20, 2019
64
But a general user would not know which connection to allow or block, hence legit programs may also be blocked unknowingly.
Whenever I get a WFC popup of a program/file requesting outbound connection I do not allow it if the popup reveals it's not signed by a reputable developer (one that I recognize)! When in doubt (allow/block?) I'll copy the name, block it temporarily and check it out before allowing. That approach has been working quite well for me.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top