- Sep 17, 2016
- 113
There is an issue with the Web Protection is some Security Software. Avast doesn't scan Trusted Websites by Default so malvertizing has the upper hand.
100% security is an illusion.
100% security is an illusion.
That's a real problem. that is actually my biggest worry: when a trusted download site gets hacked. However, the malicious download will probably not have a sig from the actual vendor, in such a case. So if you are patient enough to check the sig, you will probably be okay.
or when people downloaded Linux Mint to have a more secure OS than Windows and realized days later that the download server was hacked and hosted a backdoored version of the OS...
@Umbra I'm curious, what if they aren't aware they have a backdoored version, is there any way of checking from within the OS itself?
and how would a smart user protect himself from this linux download in the first place? ISOs don't have digital sigs and can't be checked on VTMaybe suspicious connections... honestly, built-in backdoors (if properly made) are very difficult to find.
and how would a smart user protect himself from this linux download in the first place? ISOs don't have digital sigs and can't be checked on VT
If you mean protection without using signatures, yes that's possible. Most important things would be whitelisting, virtualization, and rollback software. An example of this would be voodoo shield set to always on, using comodo atuo sandbox, and using shadow defender all the time (Except when you want to change something). Another good addition is hmpa.
do you use a certain app or web service to find and compare hashes?by hash, normally the developers of any OS/programs release the original hash ; then you just have to compare it. Under real life situation, hashes cant be faked, because if you change one bit of code of a program, the hash would change accordingly. (there is some complex mathematical and algorithmic theories about "hash collisions" but the chance to find one is near impossible)
Could you point out where I can get this information please? Specially the one which is completely free as you say.Nothing beats the proper users' surfing behaviour education. I's the best protection you can ever have without spending a single amount.
If you read through the various posts in this thread, I think you will get a good education. People hashed out the issues pretty well.Could you point out where I can get this information please? Specially the one which is completely free as you say.
Well, some say nowadays it's possible with small sized files, iirc less than 5MB are susceptible to forge, even SHA-1. For large files like Windows ISO images no problem at all, it would need vast resources (amazing and comples and expensive computational power) to forge a Windows iso file.by hash, normally the developers of any OS/programs release the original hash ; then you just have to compare it. Under real life situation, hashes cant be faked, because if you change one bit of code of a program, the hash would change accordingly. (there is some complex mathematical and algorithmic theories about "hash collisions" but the chance to find one is near impossible)
Honestly I asked @CMLew in a quasi-rhetorical wayIf you read through the various posts in this thread, I think you will get a good education. People hashed out the issues pretty well.
http://www.pandasecurity.com/mediacenter/malware/malvertising-protect-business/One of your company’s employees could be reading the latest news about the Olympic games on a trusted page (possibly even on a reputable news page), and if he clicks the wrong advertisement–one that looks like an advertisement but isn’t– the system will be infected.
A super small section of the code from the website (which seemed trustworthy at first) is actually in charge of cataloguing the user and the machine to look for adequate malware, and then downloading it. This could happen to your business while it also hits the New York Times, Yahoo, BBC, or AOL.
Malvertising can infect anyone. The enemy hides in those banners bordering websites. Cybercriminals probably gain access to websites by hacking into networks of real advertisements. In 2015, Google blocked 780 million malicious ads that could have easily passed by as legitimate advertisements.
like it! I wish my sense of humor was as subtle as yours.Honestly I asked @CMLew in a quasi-rhetorical way
I know it's impossible and not achievable to be safe with only good surfing habits. If this wasn't true then the myriad of solutions available of advanced protection like ReHIPS, Sandboxie, ERP, AppGuard, you name it, wouldn't exist in the first place.
On the other hand there's malware with very advanced capabilities to mislead anyone.
Exempli gratia:
http://www.pandasecurity.com/mediacenter/malware/malvertising-protect-business/
Honestly I asked @CMLew in a quasi-rhetorical way
I know it's impossible and not achievable to be safe with only good surfing habits. If this wasn't true then the myriad of solutions available of advanced protection like ReHIPS, Sandboxie, ERP, AppGuard, you name it, wouldn't exist in the first place.
On the other hand there's malware with very advanced capabilities to mislead anyone.
Exempli gratia:
http://www.pandasecurity.com/mediacenter/malware/malvertising-protect-business/
Hashtab, will integrate itself , in the right properties tabsdo you use a certain app or web service to find and compare hashes?