Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Why are we even messing with anything other than WD these days?
Message
<blockquote data-quote="danb" data-source="post: 888107" data-attributes="member: 62850"><p>No, that article is not about kernel exploits at all. When the article mentions SMB, it is not referring to SMB vulnerabilities, it is referring to <strong><u>S</u></strong>mall and <strong><u>M</u></strong>edium Sized <strong><u>B</u></strong>usinesses.</p><p></p><p>Besides, I posted that article to demonstrate that BAFS is great in theory, but less useful in practice. If you want to talk kernel exploits, I will suggest that it is better to be capable of interrupting the attack chain as opposed to being completely blind to them. Either way, there are tons of articles on dwell time, just google it and you will see.</p><p></p><p>I was simply asking for evidence that supports the claim that home users are immune to enterprise attacks. I have never seen such evidence, so maybe I am missing something, and I would be grateful if someone could provide some evidence, rather than just claiming "home user with updated Windows was ever infected" without any evidence.</p><p></p><p>And really, I was simply answering the OP's question "Why are we even messing with anything other than WD these days?". And my answer, in a nutshell, is that it is probably a good idea to also have a third party lightweight layer of protection, simply because I have studied SmartScreen's results and they are not quite as perfect as some people think they are.</p></blockquote><p></p>
[QUOTE="danb, post: 888107, member: 62850"] No, that article is not about kernel exploits at all. When the article mentions SMB, it is not referring to SMB vulnerabilities, it is referring to [B][U]S[/U][/B]mall and [B][U]M[/U][/B]edium Sized [B][U]B[/U][/B]usinesses. Besides, I posted that article to demonstrate that BAFS is great in theory, but less useful in practice. If you want to talk kernel exploits, I will suggest that it is better to be capable of interrupting the attack chain as opposed to being completely blind to them. Either way, there are tons of articles on dwell time, just google it and you will see. I was simply asking for evidence that supports the claim that home users are immune to enterprise attacks. I have never seen such evidence, so maybe I am missing something, and I would be grateful if someone could provide some evidence, rather than just claiming "home user with updated Windows was ever infected" without any evidence. And really, I was simply answering the OP's question "Why are we even messing with anything other than WD these days?". And my answer, in a nutshell, is that it is probably a good idea to also have a third party lightweight layer of protection, simply because I have studied SmartScreen's results and they are not quite as perfect as some people think they are. [/QUOTE]
Insert quotes…
Verification
Post reply
Top