Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
How Antivirus Companies Are Hacking the Truth -- and Making Us All More Vulnerable
Message
<blockquote data-quote="509322" data-source="post: 770500"><p>That's all on the user. The user is entirely the problem. People will want to argue some kind of counter point, but it is an exercise in futility.</p><p></p><p>A user that uses a product incorrectly is all their fault. It is their responsbility to figure out how to use it properly and use it properly every single time. That's why people fail 90 out of 100 times with warranty claims... because they misused the product which immediately voided the warranty.</p><p></p><p></p><p></p><p>They're called application and OS exploits. All you need is a single type for your system to be pwned. They're are two types, zero-day and known. True zero days with remote code execution are worth a lot of money. Enough money that the ones that find it will probably sell it instead of trying to scale it up and make it work is some hoakee, end-user campaign that will net them less money. The known ones get the systems that are unpatched or running unpatched softs. Exploits target the most widely distributed softs out there. The popular ones.</p><p></p><p></p><p></p><p>You don't have to be a high risk user for your system to be pwned. But the reality is that - if you are a safe user - the likelihood of infection is low.</p><p></p><p>And in truth, you can run default Windows security and never get infected.</p><p></p><p>It all comes down to what the user wants.</p><p></p><p>And if a user doesn't know, well then it's all on them. That's life bro. That applies to so many things in life. You are an adult, it is your responsibility to figure it out. IT security is no different.</p><p></p><p></p><p></p><p>Default deny - the kind of default deny that I am talking about - stops just about everything. It is not difficult to learn nor difficult to use. It is not the inconvenience that some people make it out to be. The person is inherent to default deny. There are millions of people who make default deny work for them and they go about their stuff without obsessing.</p></blockquote><p></p>
[QUOTE="509322, post: 770500"] That's all on the user. The user is entirely the problem. People will want to argue some kind of counter point, but it is an exercise in futility. A user that uses a product incorrectly is all their fault. It is their responsbility to figure out how to use it properly and use it properly every single time. That's why people fail 90 out of 100 times with warranty claims... because they misused the product which immediately voided the warranty. They're called application and OS exploits. All you need is a single type for your system to be pwned. They're are two types, zero-day and known. True zero days with remote code execution are worth a lot of money. Enough money that the ones that find it will probably sell it instead of trying to scale it up and make it work is some hoakee, end-user campaign that will net them less money. The known ones get the systems that are unpatched or running unpatched softs. Exploits target the most widely distributed softs out there. The popular ones. You don't have to be a high risk user for your system to be pwned. But the reality is that - if you are a safe user - the likelihood of infection is low. And in truth, you can run default Windows security and never get infected. It all comes down to what the user wants. And if a user doesn't know, well then it's all on them. That's life bro. That applies to so many things in life. You are an adult, it is your responsibility to figure it out. IT security is no different. Default deny - the kind of default deny that I am talking about - stops just about everything. It is not difficult to learn nor difficult to use. It is not the inconvenience that some people make it out to be. The person is inherent to default deny. There are millions of people who make default deny work for them and they go about their stuff without obsessing. [/QUOTE]
Insert quotes…
Verification
Post reply
Top