cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
- Content source
- https://youtu.be/G3Kg_PAjr0s
I assume most people already knew this. One can take any existing piece of malware and modify it slightly so it evades detection and it becomes a new threat, active and functional, until discovered, analyzed and signature updates are pushed. That's pretty much common knowledge and is showing the fallacy of signature based systems for the most part.
This is similar to my claim that blacklisting websites is a losing battle. Some people install 14 different extensions in Chrome 'hoping' to catch every possible malware site as soon as possible, but they'll always be a step behind. Fortinet is very good with categorizing new web threats, but even Fortinet is always a step behind.
This is why I am advocating, researching, and working on teams looking to evolve technology to the next level. These technologies are coming, eventually. Gryhon is the first 'home' system to exploit these new systems at any measurable level. Gryphon is quite nice in it's ML/AI IPS system in that it 'watches' your devices, then uses Bayes' theorem to develop a statistical history of how the device functions 'out of the box'. Bayes' theorem creates the normalcy metric and any variance of that causes the device to be quarantined as compromised and notify the owner (you) via alerts on the mobile app. As this system evolves, I believe it's one of the better technologies going forward.
IMO Fortinet is behind the curve on this as they still use mostly traditional methods and rely more on a security fabric for increasing awareness rather than prevention itself. Keep an eye out, a lot of firms are working to address the very problem CS posted about. It's only a matter of time.
So the best security solution for those that are not inclined to be security enthusiasts it is best practice to get the hell off of Windows entirely and use Chromebook.
Yes, that is why I gave up on AVs long time ago. It is an never ending war, some battles are won, some lost. What is the point of fighting then?One can take any existing piece of malware and modify it slightly so it evades detection and it becomes a new threat, active and functional, until discovered, analyzed and signature updates are pushed. That's pretty much common knowledge and is showing the fallacy of signature based systems for the most part.
True, but chances of being infected by the fresh sample are unlikely, it takes days to spread. K9 blocks all links on MalCode/PhishTank.This is similar to my claim that blacklisting websites is a losing battle. Some people install 14 different extensions in Chrome 'hoping' to catch every possible malware site as soon as possible, but they'll always be a step behind.
The hassle takes a few mins, but people want everything to be served to them. It is easier to just install AV and be done with it.Lock down the system and one ends up with a quite secure system - without the hassles that some people actively claim it will cause.
There was once a french testing site, testing fresh samples daily, ESET had the top score 50-60%, the rest was around 30-40%. No wonder, it is gone.The top 6 or 5 anti virus companies that always score 100% detection rate won't allow Pro AV test sites to test with true Zero Day malware samples.
But with Chromebook, I can't play league of legend, I can't use Fx audio enhancer(its important for me), I can't use Adobe illustrator and splash player premium(i don't like other players )!
Chromebook is also expensive! I can get free update when I'm using windows but with Chromebook, there is always a life cycle ( 5 years I think)! so you pay a lot of money and after 5 years you have to buy a new one! Chromebook is not for third world countries! maybe its good for ppl like ForgottenSeer 58943 who want to pays a lot of money.
The hassle takes a few mins, but people want everything to be served to them. It is easier to just install AV and be done with it.
Yes, that is why I gave up on AVs long time ago. It is an never ending war, some battles are won, some lost. What is the point of fighting then?
Lockdown said:But sooner or later, once enough people start using Chromebook, it will be heavily targeted too. Just like Windows. And that time won't be too far off considering that Chromebook popularity and use is growing at a high rate.
It's a war that cannot be won. And the security industry has been losing the war since day 1. Malware and malicious attack growth is accelerating at a far faster rate than the industry can keep up with.
Yes, that is why I gave up on AVs long time ago. It is an never ending war, some battles are won, some lost. What is the point of fighting then?
TairikuOkami said:The hassle takes a few mins, but people want everything to be served to them. It is easier to just install AV and be done with it.
This is really true, but on the other hand, AV testing must simulate real life I think, so maybe it will be more possible to come through old malwares than zero day in life of every moderate user.
Better to fall back to whitelisting, Would that sample have passed Windows Defender Smart screen or Avast in hardened aggressive mode, I wonder.
To survive an attack of a LION, you don't have to outrun the lion. You only have to be faster than one other person. AV companies share new detection samples. Even with blacklisting a high first victim risk (chance of surviving a lion attack) does not automatically translate to a high infection risk (chance of encountering a lion in real life). Why bother to pay for an AV at all?
At the moment the tour de France is running. The power (in kilowatt) what a cyclist can deliver is kept secret (otherwise a cyclist would know at what level of effort/strain he could break a competitor). TimeToDetection performance is the kilowatt secret of the AV-industry. Asking for TTD (although valid) is like fighting Windmill's . It is not going to happen Dona Cruel Sister
So, if someone likes the trips "beyond Earth", then KIS would be probably the better choice.
Based on some additional KIS features, like for example, Application Control.Based on what?
Based on some additional KIS features, like for example, Application Control.