- Feb 7, 2023
- 2,349
In general, blocking threats as early as possible is always recommended. Any solution that allows you to run malware (be it contained) and then dwells on this malware, desperately trying to take a decision if it should be remediated or not, exposes your system and information to a risk, and is not optimal. Ask a few IT professionals and they will tell you the same -- even executing malware on virtual machines without the proper hardware enforcement measures in place is not recommended. Maybe it will be fine for a while, maybe not for a while, but for 5, 10,15 years,. One day, disaster will happen. The aim of cyber security is to act pro-actively, not reactively.That's exactly my experience too. Up until now, Comodo has protected me and my PCs reliably. I'm particularly worried about the AI, can Comodo still keep up, or is their strategy sufficient? I don't trust anyone for now. I'm really open to all advice and grateful.
Also a strong argument.
It is also recommended to apply additional security at the door, which in terms of sophisticated attacks, most frequently is your email inbox.
In some cases, allowing the malware to run may be necessary, as attackers will always target pre-execution prevention methods first.
Although many attempts to evade pre-execution analysis would fail, some would succeed.
Behavioural blocking systems, containment (there are different implementations of that), traffic control would reduce the potential damage.
This should be the last line of defence.
Once malware has managed to run, without proper, very resource-intensive forensics analysis, often made impossible due to lost attack artefacts, no business or individual can guarantee that your information and system are not compromised in any way. Unless you have deployed some sort of attack investigation previously (such as EDR) and even that's not guarantee. If anyone is making claims how "malware is executed and system is 100% safe", these people are simply dishonest.
In some very complex attacks (that will not target you), just downloading the file subjects it to various parsers (icon viewers, preview generators) and this has been enough to exploit Windows vulnerabilities, without the file ever having to be executed. However, this is extremely rare but outlines the importance of more robust methods.
@bazang Dude I told you many times that I understand your arguments and accept them. Not sure why it is so difficult for you to understand what I'm saying. I do not want any improvements in Comodo -- I do not use Comodo.
Last edited: