Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

LVL 44

Expert Comment

by:noci
lookat bugtraq   and look for "Defense in depth the microsoft way" a now 52 part series.
... of microsoft not following their own advise. (With a side step of 30 something installer failures).
0
What were the top attacks of Q1 2018?
LVL 1
What were the top attacks of Q1 2018?

The Threat Lab team analyzes data from WatchGuard’s Firebox Feed, internal and partner threat intelligence, and a research honeynet, to provide insightful analysis about the top threats on the Internet. Check out our Q1 2018 report for smart, practical security advice today!

For those interested, AV-Comparatives Summary Report for 2017 has just been released.

https://www.av-comparatives.org/wp-content/uploads/2018/02/avc_sum_201712_en.pdf

Last Revision - 6th February 2018
1
After this morning's debacle with Malwarebytes, I got to thinking about another package that I recently discovered — Emsisoft. They seem to be pitching the product as both anti-malware and anti-virus. Anyone have personal experience with it to share? Thanks much, Joe
0
LVL 104

Expert Comment

by:John
Malwarebytes is neither the first vendor nor the last to make mistakes like this. You said in another post that they have issued a fix. So I suggest you not make a hasty exit. The next one along will make the same mistake in due course.
0
LVL 60

Author Comment

by:Joe Winograd, Fellow&MVE
Thanks for the comment, John, but I do not plan to stop using Malwarebytes...sorry if my post implied that. The incident simply triggered my thinking about A-M/A-V products and caused me to remember that I received a free, one-year subscription to Emsisoft when I upgraded my SyncBackPro from V7 to V8. But I never heard of Emsisoft and am hoping to get some feedback from fellow EE members about it. Regards, Joe
0
Malwarebytes is gobbling up all physical memory! Started about an hour ago here. It also turned off real-time protection. Must be a bad MBAM update. Anyone else seeing this? Only choice right now is to uninstall it, as far as I can tell.  Regards, Joe
0
LVL 19

Expert Comment

by:Andrew Leniart
Thanks for your update Joe.  I just re-enabled the Malwarebytes service and started it. Did an update and can confirm the issue has indeed been resolved. It's why I don't go to all the trouble of uninstalling.

Just about any software vendor will royally screw up like this at least once, so instead of uninstalling, I just disable and get on with my day. It also perfectly illustrates why I never rely on a single security package to keep me safe :)
0
LVL 60

Author Comment

by:Joe Winograd, Fellow&MVE
You're welcome, Andrew, I'm glad it's resolved for you, too.

I also don't rely on a single security package, although you have to be very careful when running more than one...in some cases, they can conflict with each other and cause a lot of grief. That's why you hear the popular caveat of not running more than one anti-virus product on the same machine. Cheers, Joe
0
0
Microsoft released a video about Ransomware.  Surprisingly good.

Take a look at it here...

https://resources.office.com/ww-thankyou-ransomware-what-you-need-to-know-video.html

Curious about your thoughts on the advice being given?
1
LVL 31

Expert Comment

by:Thomas Zucker-Scharff
Prevention is the takeaway. Always has been to me.  I think this is a little on the late side,  better late than never. We've had better responses here on EE than this one, imho.
0
LVL 19

Author Comment

by:Andrew Leniart
I think this is a little on the late side,  better late than never.

Good point, although I'm often surprised how many business owners I still come across who say something along the lines of "Ransomware, yeah I've heard about that. What's it all about?" Better late than never is a good sentiment, but if it gets the information over to some people who still have their heads buried in the sand, then I think its great.

We've had better responses here on EE than this one

You've won that argument :)  Although this is very much aimed at non-tech savvy people and I see that as one of its strengths.  

Thanks for sharing your thoughts.
0
1
Many are looking to uninstall Kaspersky Lab software from their computers, amidst recent plans by the Department of Homeland Security to "remove and discontinue present and future use of the products."

While Kaspersky’s instructions for this may paint the process as straight-forward, we’ve often seen issues in uninstalling Kaspersky anti-virus, for example:

If you do plan to uninstall Kaspersky and run into any issues, don’t hesitate to Ask your question in the Anti-Virus Apps topic.

And as always, make sure you have an antivirus and malware protection system installed, like Webroot or Immunet.
7
LVL 19

Expert Comment

by:Lucas Bishop
Yeah @Nicholas. Generally you'd expect the accusations to have some evidence to back them up. Will be interesting to see what emerges from this and how Kaspersky's business is able to handle the fallout.
1
LVL 66

Expert Comment

by:Jim Horn
That matches up with the hard sell tactics Micro Center used on me when I bought my last laptop in an effort to upsell me on Kaspersky's anti-virus software.
0
For those who like to keep up..

The latest AV Comparatives Real-World Protection Test February – June 2017 has been released.
2
Cloud Class® Course: Microsoft Azure 2017
LVL 12
Cloud Class® Course: Microsoft Azure 2017

Azure has a changed a lot since it was originally introduce by adding new services and features. Do you know everything you need to about Azure? This course will teach you about the Azure App Service, monitoring and application insights, DevOps, and Team Services.

"Prohibits the DOD from using software platforms developed by Kaspersky Lab due to
reports that the Moscow-based company might be vulnerable to Russian government
influence."

https://www.armed-services.senate.gov/imo/media/doc/FY18%20NDAA%20summary2.pdf

https://www.bleepingcomputer.com/news/government/senate-gets-ready-to-ban-kaspersky-products-as-fbi-interviews-companys-us-employees/

2
A recent post by Brian Matis motivated me to make this alternate post to see what sort of reaction others might have about these recent revelations.

A recent article on The Verge claims that "The older operating system was less vulnerable that anyone expected"

Windows XP computers were mostly immune to WannaCry

Another article from the same source claims "Windows XP was ‘insignificant,’ researchers say" with regards to helping the WannaCry outbreak spread.

"Almost all WannaCry victims were running Windows 7"

Lots of folks (from their perspective) with a genuine need to keep running on Windows XP suffered a lot of grief in Tech forums as being one of the root causes of giving WannaCry a platform to spread and thrive from, yet now it appears all the criticism may have been a little premature and unjustified.

For the record, I personally don't condone anyone using unsupported operating systems and actively encourage everyone I deal with to get themselves up to date, but I am also sympathetic to those who feel they have a genuine need to do that, so also think they shouldn't be …
0
LVL 31

Expert Comment

by:Thomas Zucker-Scharff
We have too many XP computers at my institution (some with only SP2) - mostly due to budgets and instrumentation.
0
LVL 19

Author Comment

by:Andrew Leniart
Hi Thomas,
Have you considered purchasing an XP Updates agreement with Microsoft? Might be an easier solution if budget restraints prevent you from upgrading? I wouldn't feel comfortable with a lot of XP machines in an environment as it would be a case of when, not if, it will come back to bite you.  Patches are available, just at a cost.

Incidentally, SP3 for XP is still provided by Microsoft - why not install it?

Steps to take before you install Windows XP Service Pack 3

How to obtain Windows XP Service Pack 3 (SP3)

Cheers..
0
LVL 5

Expert Comment

by:Christ Harold
Thanks for Valuable Information Sir

Christ
1
LVL 53

Author Comment

by:Jackie Man
You are welcome.

Please feel free to post any question in Android topic,
4
There seems to be a general consensus that if you've been hit with a Ransomware Virus, especially if by a newly discovered strain of ransomware, and do not have a reliable and unaffected backup to restore from, that all hope is lost.  

This is not necessarily the case!

Whilst it's true that Ransomware is one of the most difficult "destructive infections" to recover from, recovery should never be considered impossible.

Advising those seeking help that they should just accept defeat and wipe all chances of recovering their data is bad advice. This is a point that has been proven time and time again, particularly with past Ransomware strains that were once considered hopeless, yet have now had decryption recovery tools developed to restore data.

If you have been hit by a Ransomware Virus and don't have a backup - do not accept advice that you should just cut your losses, format your hard drive and admit defeat. That's just letting the criminals win.

The first thing you should do (after deactivating the virus) is make a Full Image Backup of your affected hard drive using an imaging backup tool like Acronis, Macrium Reflect or similar so as to have a copy of all files that were encrypted.  Safely store that backup away for future recovery attempts, or to restore from if a recovery attempt goes belly up.

Once backed up, Wipe and Start fresh if desired to get back to a working …
3
LVL 19

Author Comment

by:Andrew Leniart
Security companies do have excellent heuristics and definitions,  but they will never catch everything.

No argument.  But doesn't it then naturally follow that they can never "block" or "prevent" everything either?

Using that train of thought, even with all of the security software that you have protecting your machine(s), how can you be certain that you don't have a key logger recording your key strokes right now? Or a yet unknown time bomb trojan just waiting to jump up and deliver its payload? How could any system ever be trustable?

I'm honestly not trying to be argumentative here, it's just that the logic behind your conclusion is escaping me.

If you can't trust your security software to clean up an infection that has been researched and that it knows about, then how is it that you can trust the same software to prevent a yet unrealized one from occurring?

I'll agree we probably need to disagree.  

Life would be too boring if everyone agreed on everything anyway. :)

My thanks again for your input.
1
LVL 31

Expert Comment

by:Thomas Zucker-Scharff
I guess what I meant was that no one security software is likely to catch everything.  That is why I have a multilayered approach on my machines.  But you are correct, I do not feel safe even with that.  I guess I am on the paranoid side, which begs the question, "Is one paranoid, if the fear is true?"  That is a paraphrase of the original question.

The biggest problem, IMHO, is that to secure one's computer (and still have a computer that actually works, instead of one filled with cement), one needs to put enough security software on there that it slows down even the best of computers.

I would like a product that doesn't hog resources and assures me that I will never get malware of any kind (like that is happening).
2
7
LVL 18

Author Comment

by:Kyle Santos
Nice.  Thank you.
1
LVL 127

Expert Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
I blame the NSA for creating the tools!
4
ESET are offering free online Cyber Security Awareness Training to educate employees about the dangers online.  If you're interested in knowing a little more about the very basics of Cyber Security you can have a look at the course here:
https://www.eset.com/us/cybertraining/
5
LVL 5

Expert Comment

by:Juana Villa
WOW! That is pretty cool. Thanks for sharing :D
1
LVL 22

Author Comment

by:David Atkin
You're welcome Juana :)
1

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.