Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
NoVirusThanks OSArmor
Message
<blockquote data-quote="NoVirusThanks" data-source="post: 697960" data-attributes="member: 68429"><p>NVT here <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p><p></p><p>Thank you for posting OSArmor here.</p><p></p><p>You may want to watch this video that demonstrate how OSArmor can block the payload of a DOC (MSWord) and SWF (Flash) exploit:</p><p>[MEDIA=youtube]gQt5xLqoAps[/MEDIA]</p><p></p><p>OSArmor is like a behavioral blocker with pre-built rules that block suspicious processes (in short). </p><p>It works by preventing a malware or ransomware infection in real-world scenario.</p><p></p><p>You should test it with real-world scenarios:</p><p>- Opening a malicious .DOC\.PDF.\XLS.\etc. file used to exploit MSWord\MSExcel\PDF Reader\etc to drop\download and execute a payload (malware\ransomware\etc) in the system</p><p>- Visiting a malicious website that exploits a vulnerability (Java\Flash Player\PDF\etc) to download and execute a payload in the system</p><p>- And so on. Simply clicking on a .exe file or a .vbs file would not trigger any alert.</p><p></p><p>OSArmor can also block fileless malware that execute JS or VBS code, i.e Poweliks:</p><p><a href="https://www.symantec.com/connect/blogs/poweliks-click-fraud-malware-goes-fileless-attempt-prevent-removal" target="_blank">Poweliks click-fraud malware goes fileless in attempt to prevent removal</a></p><p></p><p>This tool can really improve the security of the system and requires zero configuration.</p><p></p><p>If you have questions just ask, I'll reply here <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p></blockquote><p></p>
[QUOTE="NoVirusThanks, post: 697960, member: 68429"] NVT here :) Thank you for posting OSArmor here. You may want to watch this video that demonstrate how OSArmor can block the payload of a DOC (MSWord) and SWF (Flash) exploit: [MEDIA=youtube]gQt5xLqoAps[/MEDIA] OSArmor is like a behavioral blocker with pre-built rules that block suspicious processes (in short). It works by preventing a malware or ransomware infection in real-world scenario. You should test it with real-world scenarios: - Opening a malicious .DOC\.PDF.\XLS.\etc. file used to exploit MSWord\MSExcel\PDF Reader\etc to drop\download and execute a payload (malware\ransomware\etc) in the system - Visiting a malicious website that exploits a vulnerability (Java\Flash Player\PDF\etc) to download and execute a payload in the system - And so on. Simply clicking on a .exe file or a .vbs file would not trigger any alert. OSArmor can also block fileless malware that execute JS or VBS code, i.e Poweliks: [URL='https://www.symantec.com/connect/blogs/poweliks-click-fraud-malware-goes-fileless-attempt-prevent-removal']Poweliks click-fraud malware goes fileless in attempt to prevent removal[/URL] This tool can really improve the security of the system and requires zero configuration. If you have questions just ask, I'll reply here :) [/QUOTE]
Insert quotes…
Verification
Post reply
Top