VisiCom Services Blog

VisiCom Services has been serving the Rochester Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Antivirus on Its Last Leg?

b2ap3_thumbnail_does_antivirus_still_protect_you_400.jpgAll of the recent vulnerabilities and bugs over the past few months, such as Heartbleed, GameOver Zeus, and the zero-day Internet Explorer vulnerability have many people thinking - just how strong is antivirus in the face of such threats? Symantec told The Wall Street Journal their opinion on the subject: Antivirus is "dead."

But how can one of the most fundamental parts of our home and business Internet security systems be dead? Perhaps a better word would be outdated, or maybe even outclassed - not by other types of software, but by the threats themselves. As Brian Krebs says, "this is a great example of how the cybercrime underground responds to - and in some cases surpasses - innovations put in place by the good guys."

World War III : The Web at War
When the battle for the Internet started around fifteen years ago, the antivirus industry was young. It consisted mainly of small labs where technicians would examine malware and come up with the best way to protect the public from it. Unfortunately, the industry didn't remain this way. As the amount of malware increased, the antivirus industry was left with an ultimatum - invest heavily in new technologies, or fall prey to the hordes of deadly software.

While the antivirus companies fortified their weapons, so too did malware grow more sophisticated. Eventually, an innovation called "crypting" emerged, which allowed hackers to scan their malware against the codes of all available antivirus systems, to see which among them could detect the code as malicious. The code is then altered until the antivirus software no longer identifies it as malicious. Once no software can detect their true intentions, the hackers dub the malware "fully undetectable."

Cracking the Code
You might have heard the term "decryption". In this case, it could be defined as protecting your data by analyzing and decoding foreign data that could be seen as potentially malicious. Afterward, the antivirus, if it has detected something unsavory, will not allow it into your system. Unfortunately, there is only so much that these services can do to protect your system when faced with such a formidable opponent.

Often times, the criminals abusing malware will use crypting services that take advantage of sophisticated operations, such as automated distribution of malware via servers. These servers are basically robots that control the output of malware at a controlled rate fixed by the user. This basically means that, if malware is spread through attachments in emails, they could very well make their way into your system if you open the attachment too quickly after receiving it. Why? Because the antivirus software hasn't had time to decode it and recognize that it is harmful to your PC.

A New Solution
All of this leads officials to believe that antivirus, as a protective software, is outdated. Leaders in the antivirus industry, Juniper and FireEye, have turned their efforts toward detection and response, rather than prevention. It seems that antivirus companies deem it inevitable that malware will get through their defenses, making stopping it difficult and almost impossible. So, they instead are trying to find ways to minimize the damage done and eliminate the threat where it is. Juniper has been experimenting by putting fake data in firewalls to distract hackers, while Shape Security Inc. seeks to make it more difficult for hackers to use credit card numbers and passwords that have been stolen.

Of course, a good antivirus can still go a long way toward keeping your computer safe. Some crypting isn't as useful as it's made out to be (crooks can still lie to other crooks) or they might not work at all in the first place. In this case, it is still important to have an up-to-date antivirus, though it might not be as useful as it used to be.

If your business is only utilizing antivirus for your network security, it would be wise to consider something more powerful such as our Unified Threat Management (UTM) solution, which has multiple layers of protection, from firewalls, virus/spam protection, and content filtering to help keep your data safe.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 16 October 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up For Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
14 September 2017
Usually I don't refer spending time like these categories subjects and website but really the blog w...
Tip of the Week: 4 Google Chromecast Features that May Surprise You
05 September 2017
I’m really satisfied to find this site.I need to thank you only for this brilliant read!!I unquestio...
Microsoft OneNote May Be the Best Note-Taking Tool on the Market
27 June 2017
I blog frequently and I really value your substance. The article has really crested my advantage. I ...

Latest Blog Entry

16 October 2019
Visicom Blog
Security
Most people know what a URL is. It’s the address of a website, typically starting with http:// or https://, and it is essentially the location of a web page or application that can be accessed through...

Latest News

Contact Us

Learn more about what VisiCom Services can do for your business.

callphone

Call us today    248.299.0300

2534 S Rochester Road
Rochester Hills, Michigan 48307

#