I can make it even shorter. As long as antivirus vendors exist, the AVs are NOT enough. There is a reason that several AVs exist. This makes the attackers' lives harder.
Well... last infection I had was back in 2011... I think... when I was 13. But I will make sure to post here if I ever get infected again.This is also a reason why most people can sometimes get infected.![]()
Actually—no. The only reason why 3rd party antivirus companies exist is because Microsoft never bothered to provide any (functional) protection before the release of Windows 10. Only then Microsoft realized that users shouldn't pay for protection and developed competing product. People still living in the past are keeping them alive.I'll make it short and clear. As long as other antivirus vendors exist, Microsoft Defender is NOT enough. There is a reason the other AVs exist, otherwise they wouldn't exist and we would all have to use MD. Malware is evolving more and more, there is even AI malware.
The only reason why 3rd party antivirus companies exist is because Microsoft never bothered to provide any (functional) protection before the release of Windows 10.
Of course! Every competition is good competition, people should have variety of software to choose from. However, the fact is majority will settle with the default option, especially if it's free.Let's hope other vendors survive in the market, and people will still use several AVs. The hegemony of one option is unhealthy.
The only way to get malware is by running malicious files, whether it be by downloading and running it from a web browser, e-mail or torrent client. There are no other ways to get infected.
First: Your wrong, router malware is very common MIRAI botnet ring a bell? If it wasn't an issue you would see vendors never release updates but they do. What is uncommon is APT level implants that survive firmware upgrades/router resets that takes some engineering and time and resources but common unpatched routers are a huge problem.I have two issues with this.
First: router malware is extremely rare (almost non-existent) and the only way to get your router infected is if the attacker has physical access to the device. In that case, I think you have bigger problems than the malware itself. Even majority of vulnerabilities in Windows and Android are exploitable only if hacker gets physical access. These types of attacks don't concern me at all.
Second: I wouldn't blindly trust what US government says. Remember, Donny also said people should drink disinfectant to cure COVID-19. His minister of health is constantly promoting false health-related claims.
I'll give you this one. This is a number 1 concern in enterprise environments. Though when I was setting up my PCs at home, file and printer sharing was disabled by default on all of my PCs. Before anyone asks, network was set as private, yet I would have to manually enable everything before I could see other devices. Nonetheless, I keep file sharing disabled as I prefer to send files to other PCs using services like toffeeshare.com or justbeamit.com.Although this is almost always true at home, some exceptions can happen, for example:
- If one of the family computers is infected, the malware can spread to other computers over the home network.
It can; Emotet works by targeting unsecure and easy to guess passwords. Modern Wi-Fi routers are protected from these types of attacks. Keep in mind that brute forcing Wi-Fi isn't anything new and is as old as is the Wi-Fi technology itself.Malware (like the Emotet worm) can infect someone nearby and spread by brute-forcing your Wi-Fi network.
Hackers can only hack the router three ways:Attackers can remotely infect your router by using an exploit.
They can! And one infected device is enough. However, how many realistically IoT devices you own at home and how many of them are connected to the internet, or have ability to use online services? Of all IoT devices possible, I only have Smart TVs, phones and computers. I have IoT washing machine, but I never connected it to the internet nor installed an app because I don't need it.Attackers can remotely exploit one of the IoT devices and then exploit your computer.
So MIRAI botnet... it works by scanning the internet for exposed IoT devices and abuses default and unsecure passwords. Something you can avoid by simply doing a digital hygiene which is exactly what I'm talking about—stop exposing your devices to the world wide web and use strong password (even though the first thing is more than enough).First: Your wrong, router malware is very common MIRAI botnet ring a bell? If it wasn't an issue you would see vendors never release updates but they do. What is uncommon is APT level implants that survive firmware upgrades/router resets that takes some engineering and time and resources but common unpatched routers are a huge problem.
I don't trust any government. I just do a research myself using multiple sources and come with some conclusion. It's also worth not to lose your mind over government statements.Second: OK who do you trust then? RU maybe CN or even NK. I know which government I would choose to be honest about security. NO one is denying or defending Trump related issues and brain farts and no one is defending some of the weird units in his administration but I would trust what the NSA or USA government has to say over others.
How to you practice safe hygiene when your router has a open Telenet/SSH port with hard coded default admin credentials? Only a firmware upgrade can fix that.So MIRAI botnet... it works by scanning the internet for exposed IoT devices and abuses default and unsecure passwords. Something you can avoid by simply doing a digital hygiene which is exactly what I'm talking about—stop exposing your devices to the world wide web and use strong password (even though the first thing is more than enough).
I don't trust any government. I just do a research myself using multiple sources and come with some conclusion. It's also worth not to lose your mind over government statements.
you are missing one: the router/modem has a vulnerability. an RCE kind is the worst. Vulnerabilities has nothing to do with your settings, passwords. Worse thing still when it does not have an update function.Hackers can only hack the router three ways:
1. Your ISP gets hacked and hacker uses their connection to your ISP-provided router and launches an exploit
2. Your router uses exposes itself to the world wide web; has ports open, UPnP, or has firewall disabled
3. Your device is hacked and you're using default password for entering router's internal page
Plenty of those. How many people use their ISP supplied router? Even the big companies do not update firmware often.you are missing one: the router/modem has a vulnerability. an RCE kind is the worst.
Hackers comes in many grades. Those that pass and are willing become cybercrooks. Those that don't hack you and me. I'll admit it with no shame I have been hacked before. I wasn't as good in cyber defense then, with still lots more room to grow.All of these are real concerns, but for typical home user aren't really a concern. We have to keep in mind that businesses are real target, not you.
If you're using ISP router, contact them. They have ability to open/close ports as you wish.How to you practice safe hygiene when your router has a open Telenet/SSH port with hard coded default admin credentials? Only a firmware upgrade can fix that.
And most people working in high level security companies got their start in government especially NSA. It's not simple but I'd trust USA vs others.
If router isn't exposed to the web, the only way to hack it is through your ISP (if hackers attack them), by hacking your device and gaining access to router internal page and by hacking your Wi-Fi and gaining access that way.you are missing one: the router/modem has a vulnerability. an RCE kind is the worst. Vulnerabilities has nothing to do with your settings, passwords. Worse thing still when it does not have an update function.
Not everything is visible buddy. Just like how malware goes step by step inside your system, you never see those things visible on screen, and they don't need to touch your desktop icons nor start menu nor systray. And you never see a window opening when they run things.and gaining access to router internal page
Correct. Again, unless your devices aren't hacked (which you'd obviously notice) and your router isn't exposed to the web (which you can easily test)—you're safe.Not everything is visible buddy. If there is a bash inside or API they won't need to touch the web page. Just like how malware goes step by step inside your system, you never see those things visible on screen, and they don't need to touch your desktop icons nor start menu nor systray. And you never see a window opening when they run things.
All of these are real concerns, but for typical home user aren't really a concern.
Not everything is visible buddy. Just like how malware goes step by step inside your system, you never see those things visible on screen, and they don't need to touch your desktop icons nor start menu nor systray. And you never see a window opening when they run things.
People seriously need to chill and stop reading clickbait articles, especially regarding security. We can find million possibilities for attacks, but chances of them happening are almost non-existent.
![]()
Microsoft quietly reveals whether you need a third-party antivirus software in Windows 11
Microsoft explains if Windows 11 needs third-party antivirus in 2026 as Defender matches top tools and AI-driven threats reshape security.www.windowslatest.com