Lockdown said:
But sooner or later, once enough people start using Chromebook, it will be heavily targeted too. Just like Windows. And that time won't be too far off considering that Chromebook popularity and use is growing at a high rate.
Then the next chromebook will come around, and so on
It's a war that cannot be won. And the security industry has been losing the war since day 1. Malware and malicious attack growth is accelerating at a far faster rate than the industry can keep up with.
Perhaps appguard should step up their marketing, give em some fire Lockdown
Yes, that is why I gave up on AVs long time ago. It is an never ending war, some battles are won, some lost. What is the point of fighting then?
Give up on AVs, break entire windows, worth?
TairikuOkami said:
The hassle takes a few mins, but people want everything to be served to them. It is easier to just install AV and be done with it.
So it's easier to just strip windows naked?
This is really true, but on the other hand, AV testing must simulate real life I think, so maybe it will be more possible to come through old malwares than zero day in life of every moderate user.
The point of the tests is to test which AV is the best, we all know that for old malware all the AVs can detect it, it's with zero-day malware where they struggle, otherwise there is little difference
Better to fall back to whitelisting, Would that sample have passed Windows Defender Smart screen or Avast in hardened aggressive mode, I wonder.
People would whitelist at least some of the stuff, downloaded some image ending with .jpg.exe? "That's a legit image, stupid smart screen hahaha", whereas AV doesn't ask people "is this legit stuff or not?", it says "This stuff is bad" and user is like "Aah, good find, guess I'm not gonna open it". Ofc there's always the person that'll allow it anyway, but that's the outlier
To survive an attack of a LION, you don't have to outrun the lion. You only have to be faster than one other person. AV companies share new detection samples. Even with blacklisting a high first victim risk (chance of surviving a lion attack) does not automatically translate to a high infection risk (chance of encountering a lion in real life). Why bother to pay for an AV at all?
Statistically, the majority of malware attacks are from old malware (not counting phishing and stuff), not brand new zero-day or close-to-zero-day which the AV may not have picked up yet, so AVs makes sense for the average user. Besides, there are free AVs that are pretty good relative to some paid AVs
At the moment the tour de France is running. The power (in kilowatt) what a cyclist can deliver is kept secret (otherwise a cyclist would know at what level of effort/strain he could break a competitor). TimeToDetection performance is the kilowatt secret of the AV-industry. Asking for TTD (although valid) is like fighting Windmill's . It is not going to happen Dona Cruel Sister
That would assume AVs literally have a 0% detection rate on zero-day malware, which is not the case. It's not even that low, judging by the malware testing hub that we have here in MalwareTips. What you said implies as if zero-day protection is so bad that an AV is basically all about the signatures, and thus time-until-zero-day-malware-is-added-to-signatures is the only thing that matters in an AV, which is not the case I think. Also, your cyclist analogy is bad. Just because you can see how fast the other cyclist is (in this case in terms of kilowatts) doesn't mean you can input enough kilowatts to beat him. It's not like you suddenly become stronger by learning how much stronger the other cyclist is compared to you, you still have to train to obtain that strength