Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
MAX AI Based Korean AV
Message
<blockquote data-quote="AtlBo" data-source="post: 721674" data-attributes="member: 32547"><p>Anyway, even if MAX would have had a first chance before the initial breach, if the actual worm type of payload is run, MAX is not effective at stopping this if I understand correctly. So it would be certain types of activity more associated with the droppers of worms or worm type activity that MAX has a hard time with <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite119" alt=":rolleyes:" title="Roll eyes :rolleyes:" loading="lazy" data-shortname=":rolleyes:" />.</p><p></p><p>It's like sometimes we forget with tests that the malware is sitting there on the desktop. The presumption is it will run for a test obviously, but in real life it must be activated somehow for the malware to have a chance. At any rate, if MAX has a weakness with worm type activity, I think I might say it is moreso that it just doesn't block some types of scripts very well. I am basing this purely on what Kaspersky has to say about worms here:</p><p></p><p><a href="https://www.kaspersky.com/blog/a-malware-classification/3037/" target="_blank">A Malware Classification -Kaspersky Daily</a></p><p></p><p>[SPOILER="Worm"]</p><p><strong>Worm</strong>: Worms are considered to be a subdivision of viruses since they are also self-replicating programs; however unlike viruses, they do not infect existing files. Instead, worms are installed directly onto their victims� computers in a single instance of �self standing� code, before finding opportunities to spread or tunnel themselves into other systems through things like the manipulation of vulnerable computer networks. Worms, as with viruses, can also be defined further by breaking down the methods in which they infect, like through email, instant messaging or file sharing. Some worms exist as standalone files, while others reside in computer memory only.</p><p>[/SPOILER]</p><p></p><p>Don't know if this would line up 1 for 1 with the [USER=7463]@cruelsister[/USER] definition of a worm. Feel free o/c to correct me as your knowledge base dictates...</p></blockquote><p></p>
[QUOTE="AtlBo, post: 721674, member: 32547"] Anyway, even if MAX would have had a first chance before the initial breach, if the actual worm type of payload is run, MAX is not effective at stopping this if I understand correctly. So it would be certain types of activity more associated with the droppers of worms or worm type activity that MAX has a hard time with :rolleyes:. It's like sometimes we forget with tests that the malware is sitting there on the desktop. The presumption is it will run for a test obviously, but in real life it must be activated somehow for the malware to have a chance. At any rate, if MAX has a weakness with worm type activity, I think I might say it is moreso that it just doesn't block some types of scripts very well. I am basing this purely on what Kaspersky has to say about worms here: [URL="https://www.kaspersky.com/blog/a-malware-classification/3037/"]A Malware Classification -Kaspersky Daily[/URL] [SPOILER="Worm"] [B]Worm[/B]: Worms are considered to be a subdivision of viruses since they are also self-replicating programs; however unlike viruses, they do not infect existing files. Instead, worms are installed directly onto their victims� computers in a single instance of �self standing� code, before finding opportunities to spread or tunnel themselves into other systems through things like the manipulation of vulnerable computer networks. Worms, as with viruses, can also be defined further by breaking down the methods in which they infect, like through email, instant messaging or file sharing. Some worms exist as standalone files, while others reside in computer memory only. [/SPOILER] Don't know if this would line up 1 for 1 with the [USER=7463]@cruelsister[/USER] definition of a worm. Feel free o/c to correct me as your knowledge base dictates... [/QUOTE]
Insert quotes…
Verification
Post reply
Top