- Apr 29, 2013
- 524
See Full Review at: http://msecurity.wix.com/malwaresecurity
Last edited:
hahahahah .. Now I've learned all the way, but the first time, it was a long hunt too! But I liked the site.I'm sorry I was going to commit on the review and forgot on my previous post.
The review was written very good, I like the fact that you included images which makes it very helpful to understand. However I had to hunt to find the review.
It is here if anyone else has trouble finding it.
Excellent job!!
Is the difference between testing in vm with Windows security, that diffferent compared to testing in real system? I know its not the same but to which extent? has anyone tested in real system with samples from malwarehub having a proof?As far as I know, there is no malware that can bypass UAC till now, so UAC is more essential for me, basically UAC and CFW does the same thing, it can prevent malware if we use it with common sense. Although I agree they need to improve the detection rate, but it still a very good product, and thanks for the review, very well written
I'll take a look around for one. I think that the biggest thing is that most folks don't change the UAC to the max. Either from inexperience or ignorance. Social engineering is one of the biggest ways that people get infected. Installing a new program that they got on the internet. They think it's fine since they got it from a "reputable" web site. They get the UAC prompt and say "of course I want to install it" After that it's all over. Having something like CIS would hopefully detect any secondary spawns or limit it's execution. I'm not saying that UAC can't be used to its fullest but I don't think that it's secure enough to rely solely on it.Just a quit question with all of the protection features was CIS 7 able to block anything not already blocked by UAC?
If so I would like the sample please.
Enjoy!!
hahahahah .. Now I've learned all the way, but the first time, it was a long hunt too! But I liked the site.
I'm sorry I was going to commit on the review and forgot on my previous post.
The review was written very good, I like the fact that you included images which makes it very helpful to understand. However I had to hunt to find the review.
It is here if anyone else has trouble finding it.
Excellent job!!
I'll take a look around for one. I think that the biggest thing is that most folks don't change the UAC to the max. Either from inexperience or ignorance. Social engineering is one of the biggest ways that people get infected. Installing a new program that they got on the internet. They think it's fine since they got it from a "reputable" web site. They get the UAC prompt and say "of course I want to install it" After that it's all over. Having something like CIS would hopefully detect any secondary spawns or limit it's execution. I'm not saying that UAC can't be used to its fullest but I don't think that it's secure enough to rely solely on it.
I can understand what you are saying but couldn't a user just as easy allow a newly downloaded file on CIS by either allowing it or disabling CIS to allow it to execute? For example you just downloaded this new exciting file and CIS blocks it, so you think this is a false alert since CIS has blocked harmless files before and you decide to allow it anyway.
Since most CIS users are supposedly advanced users, they should also know how to utilize UAC properly.
I have had novice customers that would disable their security software to allow a file that keep getting blocked or quarantined thinking it was a false alert because of previous harmless files were block in the past. Some social engineering infected sites will even instruct users on how to disable their security software for a successful infection. For example; "In order to run this program you must right click on your antivirus software icon in your taskbar and select exit or shutdown". I wonder how many users get fooled by this?
Thanks.
S.O.B.s (Sneakily Overt Barbarians!)Dirty tricks