Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Security Statistics and Reports
VoodooShield 6 - December 2020 Report
Message
<blockquote data-quote="danb" data-source="post: 918334" data-attributes="member: 62850"><p>Yeah, it looks like tretg45 blew right past everything, including SS. Like I was saying in post #9, signed files that are valid and verified are extremely difficult to detect as malware pre-execution. Especially if you are running VS on AutoPilot, it really needs to be paired with a robust AV with post-execution mitigations. This file probably would have bypassed AutoPilot even on the Aggressive security posture. If you guys happen to test this as well, please let me know.</p><p></p><p>The good news is... at least this confirms that malware detection has not sufficiently advanced to the point to where we do not need to lock our computers (with an initial non-affirmative mini prompt of course) <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />.</p><p></p><p>We could test VS in the default aggressive modes and security postures, but how much fun would that be? <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />. I imagine most people are curious how well VS does when set to the least aggressive modes and security postures, but if this is not the case, maybe users can suggest how they would like to see VS configured while testing. Thank you guys for testing! If anyone testing needs a Pro license, please PM me.</p></blockquote><p></p>
[QUOTE="danb, post: 918334, member: 62850"] Yeah, it looks like tretg45 blew right past everything, including SS. Like I was saying in post #9, signed files that are valid and verified are extremely difficult to detect as malware pre-execution. Especially if you are running VS on AutoPilot, it really needs to be paired with a robust AV with post-execution mitigations. This file probably would have bypassed AutoPilot even on the Aggressive security posture. If you guys happen to test this as well, please let me know. The good news is... at least this confirms that malware detection has not sufficiently advanced to the point to where we do not need to lock our computers (with an initial non-affirmative mini prompt of course) ;). We could test VS in the default aggressive modes and security postures, but how much fun would that be? ;). I imagine most people are curious how well VS does when set to the least aggressive modes and security postures, but if this is not the case, maybe users can suggest how they would like to see VS configured while testing. Thank you guys for testing! If anyone testing needs a Pro license, please PM me. [/QUOTE]
Insert quotes…
Verification
Post reply
Top