Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Security IT

Ask Slashdot: How Dead Is Antivirus, Exactly? 331

Safensoft writes: Symantec recently made a loud statement that antivirus is dead and that they don't really consider it to be a source of profit. Some companies said the same afterwards; some other suggested that Symantec just wants a bit of free media attention. The press is full of data on antivirus efficiency being quite low. A notable example would be the Zeus banking Trojan, and how only 40% of its versions can be stopped by antivirus software. The arms race between malware authors and security companies is unlikely to stop.

On the other hand, experts' opinions of antivirus software have been low for a while, so it's hardly surprising. It's not a panacea. The only question that remains is: how exactly should antivirus operate in modern security solutions? Should it be one of the key parts of a protection solution, or it should be reduced to only stopping the easiest and most well-known threats?

Threats aren't the only issue — there are also performance concerns. Processors get better, and interaction with hard drives becomes faster, but at the same time antivirus solutions require more and more of that power. Real-time file scanning, constant updates and regular checks on the whole system only mean one thing – as long as antivirus is thorough, productivity while using a computer goes down severely. This situation is not going to change, ever, so we have to deal with it. But how, exactly? Is a massive migration of everything, from workstations to automatic control systems in industry, even possible? Is using whitelisting protection on Windows-based machines is the answer? Or we should all just sit and hope for Microsoft to give us a new Windows with good integrated protection? Are there any other ways to deal with it?
This discussion has been archived. No new comments can be posted.

Ask Slashdot: How Dead Is Antivirus, Exactly?

Comments Filter:
  • by fraxinus-tree ( 717851 ) on Sunday August 17, 2014 @05:35AM (#47687905)
    Dead as a security layer - not really. Also not dead as a profit source for other companies.
    • by fraxinus-tree ( 717851 ) on Sunday August 17, 2014 @05:45AM (#47687917)
      p.s. it is perfectly viable for a literate individual to not use an antivirus. It is also possible to not use AV on a PC in a corporate environment, but it has its implications. Then again, on a mailserver, a non-intrusive AV scanner (i.e. not adding 7 lines of bullshit at the end of every legitimate email) has a pretty good hassle-to-benefit ratio.
      • p.s. it is perfectly viable for a literate individual to not use an antivirus. It is also possible to not use AV on a PC in a corporate environment, but it has its implications. T

        I think using the OS supplied security controls the Windows Vista/7/8 family provides: Applocker/SRS, Group Policy, App-V
        is preferable to running antivirus in an OR scenario. It's also a lot more complicated.

      • by swb ( 14022 ) on Sunday August 17, 2014 @08:27AM (#47688261)

        I have a small client that hasn't run anything more than Microsoft Security Essentials for three years, mainly because they don't want to spend the money.

        So far, I've only had to rebuild about 3 PCs in that time frame due to infection. They also got hit by crytolocker but at a weird time where it just made sense to reload the share directories from a recent backup because there hadn't been any changes to worry about between infection and last backup.

        The controller feels that this is more or less an acceptable trade-off over time -- my labor cost to rebuild the PCs vs. the ongoing cost of AV.

        • by Cyberdyne ( 104305 ) * on Sunday August 17, 2014 @08:56AM (#47688349) Journal

          The controller feels that this is more or less an acceptable trade-off over time -- my labor cost to rebuild the PCs vs. the ongoing cost of AV.

          They are probably right there - of those 3 rebuilds, how many do you think would have been prevented by paying more for any given AV product? Thinking back, I can remember several PCs needing recovery work because of the AV system in use (good old McAfee pulled down an update which declared a piece of Windows XP itself to be malware and need deletion - leaving a machine you couldn't log in to until that file was reinstalled), and probably two nasty infections for me to clean, which got in despite McAfee being present with fairly paranoid settings.

          • by Ol Olsoc ( 1175323 ) on Sunday August 17, 2014 @09:44AM (#47688503)

            Thinking back, I can remember several PCs needing recovery work because of the AV system in use

            THIS! Symantec once decided to start a virus scan in the middle of a disc defrag.Did a good job - bollixed the whole thing up.

            I'd had to fix other computers all bitched up by McAffee also.

            When the anti virus is effectively identical to a virus, there isn't much point in using it.

            In the end, and while I was still using Windows, I just used MSE, which worked pretty well.

            • Re: (Score:2, Informative)

              by magamiako1 ( 1026318 )
              We use McAfee at work. With proper coaxing, it works pretty well and is unobtrusive--but it actually requires becoming familiar with the product and its features. It took a lot of trial and error.

              One quick way you can help reduce A/V hit on a system is to remove zip file scanning during on-access scans and on-demand scans. Also, setting a file scan time limit can limit the amount of time the AV spends on one particular type of file.

              Other antivirus solutions handle this a bit better, but McAfee is workable w
            • by gilgongo ( 57446 )

              As another poster pointed out, it is perfectly viable for a literate - or just sensible - individual to not use an antivirus. For more than 20 years, and for various reasons (monetary, but also relating to general hassle), I have been running my family's Windows computers without any AV save for MSE in the last few years. I have yet to have any significant problems in doing so. My parents, my wife and my son (although he just uses and iPad now) are perhaps unusual in not surfing pr0n or not clicking links o

        • by KitFox ( 712780 )

          The management company where I work mandates Sophos. Scans once a week and I get weekly tickets during the scan about computers running so slow that nothing can be done. When it was Sophos only, Sophos caught about 20-30 items a week and I had to reimage or repair about two computers a week from infections or Sophos-caused issues.

          Now for the past year the 250 systems still use Sophos because corporate says they have to, but the site also uses Webroot. ~800k full installer for Webroot, 2-minute scans that no

    • by blippo ( 158203 )

      Since the industry managed to turn against the users and trust only the media industry, the "trusted computing" solution is not a viable option.

      Othervise, it would have been nice to allow only certain binaries or software developers/publishers to run. It would also be nice to sign the binaries
      and not allow changes.

      Since the user seems to be the least trusted element, and that it seems that I have to blindly trust 200+ root certificate signers when using the web,
      there is no use in pretending that there exist

      • Othervise, it would have been nice to allow only certain binaries or software developers/publishers to run. It would also be nice to sign the binaries and not allow changes.

        That would be less help than you might expect (although OS X does do exactly this by default now). Remember all those Word macro viruses of a few years ago? Totally unaffected: it's a genuine copy of MS Word that's running, it's just doing something it really, really shouldn't be. Likewise any browser exploit. Trojans have always relied

        • Depending on who you work with, blocking attachments can be very useful. If you have users that will click on anything, yes you need to block attachments.

          Unfortunately, we have users that will click on anything. But yes, security is a process.

  • by Anonymous Coward

    What are virus writers looking to get out of writing malware? Money? Fame? Absolute Power?? Well neither of the last two are ever going to happen.

    We should incentivize the reporting of bugs... Getting recognition as being a prolific bug finder, and fixer in a positive light would be a start. Also being paid is another avenue. Optional fame, and a steady reliable source of money would be very appealing to most people.

    Am I just being naive?

    • by Opportunist ( 166417 ) on Sunday August 17, 2014 @07:01AM (#47688049)

      Money. Simple as that.

      I've been on the "other side" of the security business for a bit over a decade now. I'm not really earning pocket change, but it's by some margin dwarfed by what the criminal side of our business makes.

      Malware is profitable. If you really want to fight malware, you first have to make it unprofitable. As long as it is possible to profit from spam and botnets, it's not going to stop. And since the source of spam and botnets is in countries you can't really reach, while the targets are "here", I guess it's time to start punishing those who are unable or unwilling to keep their computers secure.

      Yes, that means punishing the victim. Whereas the victim here is a facilitator for the culprit. It's like leaving your car unlocked and open on the main road and someone using it for a bank heist. I don't know about yours, in my country, if that's your car you're due for facilitating a crime.

      • by IamTheRealMike ( 537420 ) on Sunday August 17, 2014 @08:40AM (#47688295)

        I guess it's time to start punishing those who are unable or unwilling to keep their computers secure.

        But as most people just use the tools they're given and can't control how secure those tools are, in practice that would mean punishing computer programmers.

        If you want the usage of C and C++ to be considered equivalent to suicide then this would be a great policy to bring about such a world.

        • You already know that unsecure use of these languages can lead to serious security breaches throughout the system. We have several methods to deal with this kind of insecurity - but they cost, either in development time or needing more people or more process or simply not being able to do certain things. All of which suck.

          Honestly, at this point, I really don't see much choice other than putting most of the web on lockdown. We've built our libertarian utopia and due to the intrusion of the real world, it's

      • by Ol Olsoc ( 1175323 ) on Sunday August 17, 2014 @09:48AM (#47688523)

        Yes, that means punishing the victim.

        That's what Symantec and McAffee are for.

  • Sandboxing (Score:5, Interesting)

    by OpenSourced ( 323149 ) on Sunday August 17, 2014 @06:05AM (#47687951) Journal

    I'd say security in the future will converge on three lines:

    a) Sandboxed browsers/apps: Different browsers for mail access, general browsing and sensitive browsing (banking, using credit card, etc). All browsers revert to base state after closing, or allowing just a limited set of changes (bookmarks, cookies). The browsers are possibly stored in a USB stick with a physical write protection switch for part of the storage.

    b) Trust structure: The OS will only execute programs with a certain signature, based in a chain of trust. You can choose who to trust or not.

    c) Closed devices: (See Apple iPhone and iPad, but with paranoid-mode).

    Well implemented, these strategies can reduce the malware threat, and they are implementable with current technology. I really don't see the anti-virus surviving much. It's an after-the-fact tech that was born as a patch for systems unprepared for a new threat. The playing board is now set and the structure of the systems must change to reflect that.

    • by AmiMoJo ( 196126 ) *

      c) Closed devices: (See Apple iPhone and iPad, but with paranoid-mode).

      That sounds horrible. We need to find a way to have security and openness, so that people can control their own devices. Personally I like Cyanogen. It gives you very fine grained control over app permissions and allows you to take or leave interaction with Google.

      • Re:Sandboxing (Score:5, Insightful)

        by Opportunist ( 166417 ) on Sunday August 17, 2014 @07:07AM (#47688063)

        That is actually the problem. You cannot have both.

        EITHER you only allow execution of programs that are explicitly whitelisted by some authority. Whatever authority that may be. A corporation, the state or you (respectively whoever happens to be your admin). Then you can be certain that only stuff that had the dead chicken waved over will run.

        OR you allow the user to determine what to run. Then there is literally NOTHING any security concept can do to avoid a disaster. I'm all for this approach, believe me, but what blame could you put on the OS when it keeps telling the user that it's NOT a smart idea to run happy_funny_kitten.avi.exe and the user insists?

    • by dbIII ( 701233 ) on Sunday August 17, 2014 @06:33AM (#47687989)
      I saw similar posts before the web existed, let alone Slashdot. A policy of "allow all" was seen to be easiest so the malware problem persists despite all the lessons of the past and good advice like the above.
      Java was supposed to be sandboxed entirely with zero chance of malware getting to anything other than it's own litter tray. Look how that turned out when it was seen as all too hard and compromises were made. Then there's the opposite that was born stupid, things like Active-X from MS that were such a stupid idea that a librarian (not a programmer) was telling me how stupid it was before launch. Then things like allowing execution of arbitrary code in images, another case of MS fucking up in a truly astonishing way - how the hell do things like that end up as anything other than SF novel plot points in a large corporation that is supposed to be competantly managed?
      The answer as always is to learn from the lessons of the past instead of throwing together a pile of bits that look software shaped and rushing it out the door.
      • by NoNonAlphaCharsHere ( 2201864 ) on Sunday August 17, 2014 @07:10AM (#47688069)
        Much as I despise posts that start with "this", I have to agree. Until Microsoft loses their fascination with whizzo shit like displaying (i.e. running) unexamined/foreign stuff as "previews" and confusing that with "interoperability", the problem will persist. They've never gotten it through their heads that all this "seamless" wonderfullness that looks so great as 2-minute demos in developer conference rollout keynotes cause unending grief for decades to come. Sometimes other companies fall prey to this kind of thinking (Firefox toolbars), but they learned it all at the feet of the masters, with Outlook previews and Word macros, and Explorer running code from .bmp files when you visit the directory... And then, of course there's IE, the crack whore of the industry, who'll have unprotected sex with ANYTHING.
      • Java was supposed to be sandboxed entirely with zero chance of malware getting to anything other than it's own litter tray. Look how that turned out when it was seen as all too hard and compromises were made.

        The big problem with Java is that it requires quite a bit of C "glue" code to interface with the underlying operating system. The glue code necessary is often quite complex too, since it has to contend with issues such as the VM rearranging objects (thus glue need to "pin" the objects), garbage collection using a mark-and-sweep (thus the glue code need to make sure objects do not "dissapear" during the call), strange memory layout, multithreading/cpu cache issues etc, etc.

        So while from the Java developer th

      • by Kjella ( 173770 )

        Then things like allowing execution of arbitrary code in images, another case of MS fucking up in a truly astonishing way - how the hell do things like that end up as anything other than SF novel plot points in a large corporation that is supposed to be competantly managed?

        Blame C, zero-terminated strings and strcpy(). That you can copy a string into a buffer that can't hold it with no sanity checking is a disaster waiting to happen. Same that you read beyond the buffer waiting forever for a terminating \0 that'll never happen. Because you don't have objects you don't have sanity checks, even with the "safe" versions you have to make sure to pass the same buffer size twice. No doubt there's code like this where you haven't defined the size through a constant:

        char *dst[512]; /

        • by fnj ( 64210 )

          Your example is one of what an amateur C hacker might do. No competent C programmer duplicates numeric literals in the same context.

          Professional standards demand e.g.:

          const size_t buffsz = 1024;
          char *dst[buffsz+1];
          strncopy(dst, src, buffsz);

          BTW, your example had a buffer-off-by-one bug even before you changed 1024 to 512. You didn't manage the terminating null.

          Your second example first of all gives a compile error:
          "error: cannot convert ‘int*’ to ‘char*’ in initialization"
          "char *b =

    • There is a lot of work being done now on behavioral analysis, with some products like Invincea and Cylance based on this idea. From the limited testing that I have done with them, they seem pretty effective. Of course, malware authors could just start changing their behaviors to avoid these tools, but if malware doesn't act like malware anymore, it stops being malware. And of course you forgot reputation services like those already being implemented by browsers and OS vendors. These force malware users to
    • Trusted apps need no censorship and away to have censorship and away to have things like user add ones.

      Do you really want games with NO user maps or plugins / mods?

      What about no more emulators? Other then the few paid ones that are very locked down and due to censorship issues can't have all games in a system.

      No more open source apps?

      NO VM's as well.

  • Stockholm syndrome (Score:4, Interesting)

    by Torp ( 199297 ) on Sunday August 17, 2014 @06:15AM (#47687965)

    Let's translate the OP's question:
    I have this insecure by design environment, while there are more secure by design environments available (yeah, probably not completely secure, but much more secure than what I'm using now). I'd like to patch my grossly insecure environment to get at least an illusion of security instead of considering the alternatives.

    • by reikae ( 80981 )

      It's likely that security isn't the OP's main concern. It rarely is.

    • by mspohr ( 589790 )

      I just don't understand why people keep using Windows... I understand the installed base problem but most Windows software has equivalents in other OSs and it's not that hard to learn a new OS.
      I've been running Linux and Mac OS for about 10 years on various computers and never installed anti-virus and never worried about virus and never had a problem. I know these are not "perfect" but they are so much better than Windows that I just don't see why people don't switch.

  • by rossdee ( 243626 ) on Sunday August 17, 2014 @06:25AM (#47687979)

    Its not dead, its just resting.

  • by davmoo ( 63521 ) on Sunday August 17, 2014 @07:08AM (#47688065)

    The most important piece of equipment for computer security is the one positioned between the chair and the keyboard. Learn to not click on stupid shit and its entirely possible to remain virus and malware free. I don't run AV software and I've never had a virus or malware on any Windows machine that I didn't purposely infect to see what happens (I work in IT, I'm expected to know that kind of stuff, so I have a machine specifically for the purpose of infecting :) ). And I run Windows almost all the time on my main daily-user machines (I run Linux on a couple of personal servers.) My just-barely-computer-literate 76 year old mother also does not run AV software, and has never had a virus or malware...and various flavors of Windows is all she's ever used.

    Yes, Microsoft needs to do a better job on security. But saying its a Windows problem is a polite way of saying 90 percent of computer users are too embarrassed to take responsibility for their own stupidity.

    • What happens if you receive an email with malware attached that activates simply when it downloads off of the server to your mail reader application without you actually opening it? I've seen this happen before. How do you know for certain that you DON'T have a virus? It is possible for legitimate websites like CNN or The Weather Channel to develop an infection and pass it to tend user.
      • What mail reader in this day and age automatically activates malware? It's been a long time since outlook had any issues like this since Microsoft figured out that 'active content' was a very bad idea.
      • by davmoo ( 63521 )

        Unread email never touches my machines. I read email via the web. Anything I want to save is then invited on to my machine. Ad servers used by sites like CNN and The Weather Channel are blocked in my HOSTS. Anything that requires a 3rd party extension to run inside Chrome requires my explicit permission to start. And those are things even a total n00b can do.

        Oh, and here's the number one way I tell people to avoid spam and malware. I **NEVER** **EVER** install browser toolbars. In fact, when someone calls m

    • by Imrik ( 148191 ) on Sunday August 17, 2014 @08:14AM (#47688241) Homepage

      While I agree with the general sentiment, it would be more accurate to say that you've never noticed a virus or malware on the machines, rather than you've never gotten them.

      • by davmoo ( 63521 )

        Then by your statement, I would ask the same thing of people who run only Linux or OSX and swear they've never had a virus or malware. Don't tell me all Linux users check the source code, apply updates regularly, read their log files, etc etc. Because I've been in this rodeo long enough to know that the average Linux or OSX user pays as little attention to things like that as the average Windows user.

  • Ummm, not at all (Score:5, Insightful)

    by Sycraft-fu ( 314770 ) on Sunday August 17, 2014 @07:42AM (#47688139)

    Anti-virus is still extremely useful. It is not an end in and of itself, it isn't a panacea that will keep you safe from everything, but it is a useful layer of security. The only true defense that has any chance is defense in depth, layers of security. So that when one layer fails, and they WILL fail there's no perfect security, other layers stop the problem.

    AV is a useful layer. It screens for known threats and good AV gets that list updated multiple times per day. So it can flat out stop any known threat from getting on a system. It can scan things as they download, before they execute, and block known threats.

    That is useful, particularly against the kind of threats normal users face. They don't usually face highly specialized and targeted threats, they face something that sneaks in through a bad ad in a compromised ad network or the like.

    We make plenty of use of AV at work and it has done a great job cutting down on compromised systems, and cleaning up systems that do get compromised (which generally don't have AV). I certainly wouldn't rely on it as the be-all, end-all, but it is a good layer of security.

    It's also a pretty cheap one. You can have MSE for free, which has about a 90% catch rate, or for $40ish per year you can get one with a much higher catch rate (NOD32 being my preference). That's not a bad price for a useful layer of security.

    • You also mention one of the most common malware vectors: ads. Especially flash ads. Ad blocking software is security software.
  • All of these are necessary and none are a substitute for one-another. And even in concert and combination, they are not 100% effective and never can be.

    The fact is, there are people who think the ability to get beyond security measures is tantamount to the "right" to break, enter and utilize. That is the source of the trouble. And until those humans are addressed effectively, there cannot be any progress against the problem. And why isn't that happening? Should be obvious.

    With government writing themse

  • Rather then looking for and identifying bad software... look for and identify good software. White lists deal with zero days. Set up security so that all unknown code is forbidden. Obviously let the user if they have permissions exempt unknown code from the security. But anything else... no execution.

    Include scripts, etc.

  • It seems to me that anti-virus would be a waste of time in a well designed system. Binaries should be protected from modification. Applications with built-in VMs (like browsers) should be secure and with separate memory protection (like Safari). If a vulnerability is discovered in one of these puzzle pieces then the correct solution is to patch the vulnerability. The patch should be provided with the same speed as any upgrade to anti-virus signatures. And if you don't patch a major vulnerability in time...

  • by Shoten ( 260439 ) on Sunday August 17, 2014 @09:11AM (#47688401)

    There are currently two solid alternatives to traditional AV. Unfortunately, one is not suitable outside of a well-managed (i.e., corporate) environment and the other probably would not work in a full-featured computer environment.

    1. Whitelisting: Application whitelisting is really, really effective. There are ways to circumvent it, but that's true of just about any technical security control. The problem with it is twofold: one, someone needs to develop exactly *what* that whitelist is, and the average home user isn't really up to the task. Bit9 (the leader in the space) has gotten around this to some degree with a cloud-based archive of "known good" files and processes, but your standard home user will still run into a lot of things they don't recognize when they install. And what if one of those things is actually an existing infection? Then they will probably add it to their whitelist...or, on the other hand, err on the side of caution and end up breaking valid software on their systems. The odds of them hitting it exactly right are very small. And even then, they have to maintain the if they're taken in by that "YOU NEED TO UPDATE YOUR VIDEO CODEC LOL" popup window, they'll invariably end up authorizing whatever file gets downloaded ("'Trojan_video.exe'...sounds legit to me!") and infecting their system anyways.

    2. The "Walled Garden" Model: In a lot of ways, this is like whitelisting built into the underlying OS, with the OS manufacturer being the custodian of the whitelist. This is how iOS works, so it's actually a proven model. There's only been one discovered instance of malware that's slipped into the App Store, and that was easily eradicated with the press of a button back at the Apple mothership. But on the other hand, there are ancillary effects to forcing all devs to go through a single clearinghouse for software. Apple's cut of the profits, and their cut of any revenue passing through any app sold through the App Store, are obvious issues, but the antitrust risk of a PC OS with only one place to go for software is a latent...and larger risk, going forward. One court decision can break the model entirely; if Apple doesn't collect at least some money from developers, then there's no money to support the App Store and the activities around it. But if there's no central authority, then there goes the chain of trust that's necessary to maintain the safety of the OS. And there's complexity in a PC-based OS environment that you don't find in a tablet or smartphone; in the tablet/phone model, each application is an island, separate onto itself for the most part. You don't have browser plugins, underlying execution environments or interpreters (Air, Java, .NET, Python, Perl, etc.).

    Either way, the "blacklist" approach doesn't work. It's all fine to point out that other things (firewalls, IPS, etc.) need to be in place, and that's true...but malware is its own threat, and cannot be fully addressed by solutions that only focus on the attack. Applications will have vulnerabilities; railing against this hasn't accomplished anything in two decades. People will make mistakes, or be social-engineered into doing things they should not do. Supply chains will become infected (remember cameras, USB drives, etc. that have come with malware?) and sometimes those mistakes will affect people besides the mistake-maker. So there needs to be a way to address malware itself.

    There are two approaches that, while theoretical, also hold promise. The issue is that they are pretty much theoretical; there's no existing implementation of either of them on any scale, or as a deployable off-the-shelf technology today.

    3, The Managed Immunological Response: Assume that malware will exist, and somehow get onto systems. Most complex organisms hold pathogens within themselves that are harmful...and in many cases, even contain them in a symbiotic relationship. Eradicate E. Coli from a human's lower GI tract and they'll develop problems, for example...but E.

    • Your analysis seems to assume that there are apps, and that is it. But in reality there are apps that are virus hosts in themselves. VB within Excel. Javascript within browsers.

  • AV is dead. (Score:5, Insightful)

    by Deathlizard ( 115856 ) on Sunday August 17, 2014 @11:16AM (#47689017) Homepage Journal

    First, let me start off with the Notion that All Antivirus sucks. Regardless of the brand, or the Reputation, If you gave me an hour or less and a windows PC with any Antivirus app on the market on it, pay or free, I will give you an infected box. So why does this happen?

    1) Hot, Fresh, Just for you! This is not just a slogan you see on McDonalds made to order burgers anymore. Today's Virus Obfuscation techniques are so fast and random, that when you activate an payload dropper (whether it be a Flash, Java, Website, Browser exploit or even a Trojan installer) The Payload that you get will only be statistically seen only once. You and only you will get that version of the virus even though it's using a well known virus kit that would be detected if it was not obfuscated. This technique is the reason why no AV firms detect the Fake antivirus variants or FBI Warnings or cryptolockers of the past even though all of the major codebases were detected by most AV Firms.

    2) I'm an Necessary App! People need me to change their search engine, hijack their DNS, spy on them, and pop up ads randomly all over the screen and websites! [] Read the Slashdot Journal link for some insight on how adware gets on people's PC. Let me make something clear here. Adware is a Virus When a customer comes into my shop and has something like Conduit searchprotect, or Wajam on their machine, I tell them that's a virus because it is. They didn't want it, they got it and it's doing things they don't want. Sounds like a virus to me, yet just about every AV Firm ignores these and lets them gleefully install because they're afraid of getting sued by one of these companies so instead they make guidelines to let them slip through. [] The first AV I find that reliably removes all Adware as well as viruses without me having to manually remove them or fallback to a removal tool (like ADWCleaner, which is now starting to miss stuff as of late) I will sell in my store.

    3) In Soviet Russia, Trojan Exploits You! [] This Journal link has been on my sig for years now, and is the primary reason why AV doesn't work anymore. This week alone I had no less then three of my customers Directly call Fake Support Scammers [] because their PC / Printer / Camera didn't work, and they called the phone number on the first link (The Ads) they saw when they searched for "(PC / Printer / Camera) Support" and if you're letting the bad guys in to physically touch your own box you're already screwed and no AV on earth is going to save you.

    Right now, I'm telling people three things:

    1) Install MSE All AV sucks, The only question is how much do you want to pay for something that sucks. MSE is free, at least blocks most of the ultra bad stuff and doesn't pop up ads of any kind so it's what I install.

    2) Install Adblock on all browsers I install Adblock Plus on any machine that leaves the store. if you're going to infect yourself chances are an Ad is going to lead you there. Blocking the ads blocks most of the infection vectors off the bat.

    3) Don't Download or Install anything. There is no safe place I can direct people to download files without getting some sort of Adware Virus. This is easier to tell users rather than pay attention to what you download. (See #3 to understand) If they protest, go to your PC, go to with your adware blocker turned off, type in any program you would think they would download (I use VLC Media player. It never fails to show me adware links) and have them pick the download link, when they get it wrong (chances are they will) download the file and send it to chances are one of the scanners will detect the Adware dropper from the fake site, Then drill it home about not downloading anything.


  • How long will it take compliance bodies etc like PCI to not require AV for scoped-in machines? Til then, AV is and will be alive and well.
  • The root cause is that the security model of Unix that everyone copied isn't compatible with the modern world. The OS never asks what resources you want to allow a given program to access, instead it ass-u-me-s that it should have full run of everything, and just trusts the program to do the right thing.

    So antivirus programs were invented to serve as a "no-fly-list" type system.... only programs on the list are stopped. This worked well until methods for changing the signature of programs got up to speed.

  • by JDG1980 ( 2438906 ) on Sunday August 17, 2014 @06:35PM (#47691173)

    One major problem with security is that the permission model on both Windows and Unix doesn't really give you the tools you need to keep yourself safe. We're still stuck in the 1970s university mentality where the user is assumed to have written or at least compiled the program themselves, and is supposed to have a good understanding of what it does. The program is assumed to be operating as an agent of the user, so it inherits all the user's permissions. On modern systems, with semi-trusted and untrusted code downloaded from the Internet, this assumption is absurd and dangerous.

    Rather than the program inheriting the user's permissions by default, a decent modern security model would instead restrict it to a sandbox unless it was explicitly given permission to get out – and even then the user should be given veto power over specific sandbox breaches. (Android used to work like this, but Google dumbed it down for reasons that are not clear.)

    By default, a program should only be able to do the following:

    • * Get input from the keyboard and mouse (only when the application has focus)
    • * Get input from game controllers (even if the application doesn't have focus)
    • * Output video and sound using the normal system APIs
    • * Read/write temporary files to a scratch directory
    • * Open and save files only through standard system dialog boxes that are under the OS's control

    Anything else – Internet access, ability to freely read and write to files/folders, ability to get keyboard input when not in focus – should require explicit user permission. And the user should have the option of unchecking any or all of these authorizations and continuing to run the app without it being able to do those things. These permissions should be as fine-grained as possible, so an application could have permission to only read certain specific folders, or could be allowed to access the Internet only through a particular API (say, for handling registration or online high scores) and only for certain domains.

"Conversion, fastidious Goddess, loves blood better than brick, and feasts most subtly on the human will." -- Virginia Woolf, "Mrs. Dalloway"