Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Any real-time software that uses non-traditional ways to find malware?
Message
<blockquote data-quote="danb" data-source="post: 915680" data-attributes="member: 62850"><p>I am happy to see that someone else recognizes that critical components can be broken <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />.</p><p></p><p>Here is some info on McAfee ENS, released in 2017. Certainly cool stuff they are working on... </p><p></p><p>"With the latest McAfee Endpoint Security, you don’t have to wait for a signature. If an executable has never been seen before, your endpoints automatically classify it as “greyware” and treat it with appropriate suspicion. Your endpoints first conduct pre-execution scanning of its code base—essentially a static look at the code (before it runs). Then, they perform dynamic analysis of the behavior during execution. All of these capabilities, and others, are part of protection at each endpoint that limits the damage and spread of greyware to other endpoints. And they’re designed and integrated to close that window of vulnerability—to stop malware even before security systems know exactly what it is."</p><p></p><p>[URL unfurl="true"]https://www.mcafee.com/blogs/enterprise/endpoint-security/migrate-new-mcafee-endpoint-security-ens/[/URL]</p><p></p><p>I just find our approach a little easier, and if the user happens to allow something they should not, then McAfee would probably block it.</p><p></p><p>Fun conversation, but I have a lot to do, thank you!</p></blockquote><p></p>
[QUOTE="danb, post: 915680, member: 62850"] I am happy to see that someone else recognizes that critical components can be broken ;). Here is some info on McAfee ENS, released in 2017. Certainly cool stuff they are working on... "With the latest McAfee Endpoint Security, you don’t have to wait for a signature. If an executable has never been seen before, your endpoints automatically classify it as “greyware” and treat it with appropriate suspicion. Your endpoints first conduct pre-execution scanning of its code base—essentially a static look at the code (before it runs). Then, they perform dynamic analysis of the behavior during execution. All of these capabilities, and others, are part of protection at each endpoint that limits the damage and spread of greyware to other endpoints. And they’re designed and integrated to close that window of vulnerability—to stop malware even before security systems know exactly what it is." [URL unfurl="true"]https://www.mcafee.com/blogs/enterprise/endpoint-security/migrate-new-mcafee-endpoint-security-ens/[/URL] I just find our approach a little easier, and if the user happens to allow something they should not, then McAfee would probably block it. Fun conversation, but I have a lot to do, thank you! [/QUOTE]
Insert quotes…
Verification
Post reply
Top