Home » Anti-Virus



  • Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.  

    Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats.
    Signature-Based Antivirus Software

    Signature-based detection is the use of footprints to identify malware. All programs, applications, software and files have a digital footprint. Buried within their code, these digital footprints or signatures are unique to the respective property. With signature-based detection, traditional antivirus products can scan a computer for the footprints of known malware.

    These malware footprints are stored in a database. Antivirus products essentially search for the footprints of known malware in the database. If they discover one, they’ll identify the malware, in which case they’ll either delete or quarantine it.

    When new malware emerges and experts document it, antivirus vendors create and release a signature database update to detect and block the new threat. These updates increase the tool’s detection capabilities, and in some cases, vendors may release them multiple times per day.

    With an average of 350,000 new malware instances registered daily, there are a lot of signature database updates to keep up with. While some antivirus vendors update their programs throughout the day, others release scheduled daily, weekly or monthly software updates to keep things simple for their users.

    But convenience comes at the risk of real-time protection. When antivirus software is missing new malware signatures from its database, customers are unprotected against new or advanced threats. 
    Next-Generation Antivirus

    While signature-based detection has been the default in traditional antivirus solutions for years, its drawbacks have prompted people to think about how to make antivirus more effective. Today’s next-generation anti-malware solutions use advanced technologies like behavior analysis, artificial intelligence (AI) and machine learning (ML) to detect threats based on the attacker’s intention rather than looking for a match to a known signature.

    Behavior analysis in threat prevention is similar, although admittedly more complex. Instead of only cross-checking files with a reference list of signatures, a next-generation antivirus platform can analyze malicious files’ actions (or intentions) and determine when something is suspicious. This approach is about 99% effective against new and advanced malware threats, compared to signature-based solutions’ average of 60% effectiveness.

    Next-generation antivirus takes traditional antivirus software to a new level of endpoint security protection. It goes beyond known file-based malware signatures and heuristics because it’s a system-centric, cloud-based approach. It uses predictive analytics driven by ML and AI as well as threat intelligence to:

    Detect and prevent malware and fileless attacks

    Identify malicious behavior and tactics, techniques and procedures (TTPs) from unknown sources

    Collect and analyze comprehensive endpoint data to determine root causes

    Respond to new and emerging threats that previously went undetected.

    Countering Modern Attacks

    Today’s attackers know precisely where to find gaps and weaknesses in an organization’s network perimeter security, and they penetrate these in ways that bypass traditional antivirus software. These attackers use highly developed tools to target vulnerabilities that leverage:

    Memory-based attacks

    PowerShell scripting language

    Remote logins

    Macro-based attacks.

    To counter these attackers, next-generation antivirus focuses on events – files, processes, applications and network connections – to see how actions in each of these areas are related. Analysis of event streams can help identify malicious intent, behaviors and activities; once identified, the attacks can be blocked.

    This approach is increasingly important today because enterprises are finding that attackers are targeting their specific networks. The attacks are multi-stage and personalized and pose a significantly higher risk; traditional antivirus solutions don’t have a chance of stopping them.

    Explore IBM Security QRadar Solutions  
    Endpoint Detection and Response

    Endpoint detection and response (EDR) software flips that model, relying on behavioral analysis of what’s happening on the endpoint. For example, if a Word document spawns a PowerShell process and executes an unknown script, that’s concerning. The file will be flagged and quarantined until the validity of the process is confirmed. Not relying on signature-based detection enables the EDR platform to react better to new and advanced threats.

    Some of the ways EDR thwarts advanced threats include the following: 

    EDR provides real-time monitoring and detection of threats that may not be easily recognized by standard antivirus

    EDR detects unknown threats based on a behavior that isn’t normal

    Data collection and analysis determine threat patterns and alert organizations to threats

    Forensic capabilities can determine what happened during a security event

    EDR can isolate and quarantine suspicious or infected items. It often uses sandboxing to ensure a file’s safety without disrupting the user’s system.

    EDR can include automated remediation and removal of specific threats.

    EDR agent software is deployed to endpoints within an organization and begins recording activity on these endpoints. These agents are like security cameras focused on the processes and events running on the devices. 

    EDR platforms have several approaches to detecting threats. Some detect locally on the endpoint via ML, some forward all recorded data to an on-premises control server for analysis, some upload the recorded data to a cloud resource for detection and inspection and others use a hybrid approach. 

    Detections by EDR platforms are based on several tools, including AI, threat intelligence, behavioral analysis and indicators of compromise (IOCs). These tools also offer a range of responses, such as actions that trigger alerts, isolate the machine from the network, roll back to a known good state, delete or terminate threats and generate forensic evidence files. 
    Managed Detection and Response

    Managed detection and response (MDR) is not a technology, but a form of managed service, sometimes delivered by a managed security service provider. MDR provides value to organizations with limited resources or the expertise to continuously monitor potential attack surfaces. Specific security goals and outcomes define these services. MDR providers offer various cybersecurity tools, such as endpoint detection, security information and event management (SIEM), network traffic analysis (NTA), user and entity behavior analytics (UEBA), asset discovery, vulnerability management, intrusion detection and cloud security.

    Gartner estimates that by 2025, 50% of organizations will use MDR services. There are several reasons to support this prediction:

    The widening talent shortage and skills gap: Many cybersecurity leaders confirm that they cannot use security technologies to their full advantage due to a global talent crunch.

    Cybersecurity teams are understaffed and overworked: Budget cuts, layoffs and resource diversion have left IT departments with many challenges.

    Widespread alert fatigue: Security analysts are becoming less productive due to “alert fatigue” from too many notifications and false positives from security applications. This results in distraction, ignored alerts, increased stress and fear of missing incidents. Many alerts are never addressed when, ideally, they should be studied and acted upon.

    The technology behind an MDR service can include an array of options. This is an important thing to understand when evaluating MDR providers. The technology stack behind the service determines the scope of attacks they have access to detect.

    Cybersecurity is about “defense-in-depth” — having multiple layers of protection to counter the numerous possible attack vectors. Various technologies provide complete visibility, detection and response capabilities. Some of the technologies offered by MDR services include:



    Endpoint protection platform

    Intrusion detection system.

    Extended Detection and Response

    Extended detection and response (XDR) is the next phase in the evolution of EDR. XDR provides detection and protection across various environments, including networks and network components, cloud infrastructure and Software-as-a-Service (SaaS). 

     Features of XDR include:

    Visibility into all network layers, including the entire application stack

    Advanced detection, including automated correlation and ML processes capable of detecting events often missed by SIEM solutions

    Intelligent alert suppression filters out the noise that typically reduces the productivity of cybersecurity staff.

     Benefits of XDR include:

    Improved analysis to help organizations collect the correct data and transform that data with contextual information

    Identify hidden threats with the help of advanced behavior models powered by ML algorithms

    Identify and correlate threats across various application stacks and network layers

    Minimize fatigue by providing prioritized and precise alerts for investigation

    Provide forensic capabilities needed to integrate multiple signals. This helps teams to construct the big picture of an attack and complete investigations promptly with high confidence in their findings.

    XDR is gaining in popularity. XDR provides a single platform that can ingest endpoint agent data, network-level information and, in many cases, device logs. This data is correlated, and detections occur from one or many sources of telemetry.

    XDR streamlines the functions of the analysts’ role by allowing them to view detections and respond from a single console. The single-pane-of-glass approach offers faster time to value, a shortened learning curve and quicker response times since the analysts no longer need to pivot between windows. Another advantage of XDR is its ability to piece multiple sources of telemetry together to achieve a big-picture view of detections. These tools are able to see what occurs not only on the endpoints but also between the endpoints.  
    The Future of Antivirus Software

    Security is constantly evolving, and future threats may become much more dangerous than we are observing now. We cannot ignore these recent changes in the threat landscape. Rather, we need to understand them and stop these increasingly destructive attacks.

    The post The Evolution of Antivirus Software to Face Modern Threats appeared first on Security Intelligence.

  • Anti-Virus

    Kaspersky vs Avast

    by MalwareTips Forums
    by MalwareTips Forums

    I’m looking for a free AV to install on a friend’s new laptop. I’m thinking about either Avast free or Kaspersky free. I have not used both products in a while so I’m wondering do they display add/popups? And can this be disabled for either of them? Thanks!

  • Knowing the whole family is protected online is a great feeling–that they’re safe from online scams, inappropriate content, and people stealing or collecting their personal data. But online protection looks a little different for everyone, because everyone goes online a little differently.

    With that, we’re introducing our McAfee+ Family plans, online protection that protects each family member with their own login, all based on their online risks and activities.

    Like so many things in family life, a one-size-fits-all approach doesn’t always do the trick. For example, a movie night with an award-winning film that’s “R” rating may be fine for mom and dad but not for the kids. And music? CoComelon works great for playdates, but not for dinner dates. Yet everyone in the family wants the same thing. To enjoy themselves. It just looks different from person to person.

    The same goes for online protection.

    We all need protection when we go online. Yet different family members may need different kinds of protection depending on their age, interests, and what they do online. So, staying safer calls for a personalized approach, one that’s tailored to the things they do online.

    McAfee+ Family plans offer identity, privacy, and device protection for up to six people so that you know that they’re protected from viruses, fraud, identity theft, and inappropriate content in a way that’s right for them.

    Everyone gets their own identity monitoring and alerts, a VPN for more secure browsing, and unlimited device security.

    Two adults get up to $1M each in identity theft coverage and up to $25k each for ransomware coverage.

    Two adults receive credit monitoring and alerts to help protect from identity theft and financial loss, and Personal Data Cleanup to remove their info from data broker sites.

    The parents can set screen time limits so you can set some digital ground rules for your kids.

    And everyone gets their own Protection Score that shows how safe they are and offers suggestions that can make them safer still.

    Why protecting the family calls for a truly personalized approach

    The larger idea that inspired our family plans is this–you should have absolute confidence that everyone you care about has the protection they need.

    That can get a little tricky when you think it through. With the family spending so much time online, it’s tough to know what everyone’s really doing, or if they’re safe while they’re doing it. Add to that all the ways companies track our activities online and the clever phishing tricks hackers use to steal our identity, there’s plenty to be concerned about. Simply put, it’s tough to know if everyone has the right protection in place and ways to take control of their privacy and identity.

    Our family plans make sure they have it, and it can cover any loved one anywhere. That includes family still living at home, but it could also include your aunt two time zones away, the kids away at school, or an elderly mom in the next town. If it’s someone you care about, you can protect them with this plan. Up to six people in total.

    What’s in it for you: a closer look at the benefits of our McAfee+ Family plans Protection that’s “just right” for each family member.

    Personalize their protection based on each family member with their own logins and protections and is based on their risks and activities.

    Everyone gets their own Protection Score that spots weak areas and helps shore them up.

    Award-winning antivirus that protects against known and brand-new threats.

    Looks out for the family’s privacy and identity.

    Identity monitoring alerts family members if their personal info like email addresses, phone numbers, and account numbers, is found on the dark web.

    Personal Data Cleanup shows two adults which risky data broker sites are collecting and selling their personal info and helps them remove it.

    Credit monitoring keeps an eye on changes to your credit score, report, and accounts with timely notifications and guidance so you can take action to tackle identity theft.

    Gets life back to normal if identity theft occurs.

    $2M in identity theft coverage supports two adults (up to $1M per adult) if the unexpected happens to them, which covers legal fees, travel, and reimbursement of stolen funds.

    Identity restoration from a licensed pro can help them repair their credit and identity.

    Ransomware protection for two adults–up to $50,000 total (up to $25,000 each adult).

    Keeps your children safe online.

    Helps keep your children protected from inappropriate content online even when you can’t be right beside them.

    Manage screen time and see their locations so you can help your kids stay safe.

    Know that everyone in the family will get alerted if they come across dangerous or risky websites and links.

    Everyone gets the protection they need, in a way that works just for them

    That’s the idea. Everyone gets the right protection they need when they go online. Imagine ordering a pizza where each of the slices has someone’s favorite topping. That’s how our new family plan works. Your children get one set of protections made for them, your parents another, and you yet another. The result is the same, though. You’ll know everyone is safer. Because you set it up.

    I’m happy to share that our McAfee+ Family plans are available now, ready to protect the people who matter most–your people, the way they go online, wherever they are.

    The post McAfee+ Family Plans: The Right Protection for the Right People–Your People appeared first on McAfee Blog.

  • AJ Vicens / CyberScoop:Kaspersky: hacker groups are offering six-figure salaries, bonuses, and paid leaves to attract talent on dark web; some ads boast salaries as high as $1.2M/year — Despite the obvious risks, tech jobs with hacking groups can be alluring for those who need the money or want to do the work.

  • afaik all AVs have a database of signatures and all files that you scan are compared to those signatures, is there a way to extract those signatures and view them? for example, lets say I wont to view win defender’s signatures, how and where can I find them and extract them? is this even possible?

    submitted by /u/Fuck_Life_421[visit reddit] [comments]

  • Anti-Virus

    What Is A Trojan Horse Virus?

    by Cybers Guards
    by Cybers Guards

    A trojan horse virus is malicious software that can infect your computer and cause severe damage. As the name suggests, this type of virus is disguised as something benign, like a harmless application or document. Once installed, the virus can run destructive processes to steal sensitive data. If you’re concerned about your computer’s security or […]

  • I am lucky enough to be one of the winners of the VS giveaway, and I have a few questions.
    How is its combability with Kaspersky Standard?

    Is there any settings that can resolve possible conflicts between these two?

    Is there any other settings that I should use?

    I am rather new…Read more

Newer Posts


Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign