Dons Deals

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 7 August 2012

Traditional antivirus software is useless against military malware | TechRepublic

Posted on 09:08 by Unknown

Traditional antivirus software is useless against military malware

By Michael Kassner
August 6, 2012, 7:13 AM PDT

Takeaway: Antivirus programs are obsolete. In that case, what are we supposed to do? Learn what the security community has to say.

Do not go on the Internet unprotected. If you do, you’ll regret it. Advice like that is common everyday fare. What follows is not:

“What this means is that all of us had missed detecting this malware for two years, or more. That’s a spectacular failure for our company, and for the antivirus industry in general.”

That’s from “Why antivirus companies like mine failed to catch Flame and Stuxnet,” a recent post by Mikko Hypponen, Founder and Chief Research Officer of F-Secure — a significant player when it comes to protecting digital equipment.

Statements like that aren’t normal for Mikko (his TED talk); the well-regarded computer-security guru is typically upbeat about things digital. I contacted Mikko asking if he had any further thoughts:

“Regular antivirus works fine for the regular malware out there. It doesn’t work well against government-funded super-malware. How likely is it you may be targeted by super-malware? I guess it depends on what you’re doing.

Bullet-proof vests and helmets work fine against a street robber who is out to get anyone he can find. They don’t work well against a government assassin who is out to get you and only you. How likely is it that are you may be targeted by a government assassin? I guess that also depends on what you’re doing.”

Mikko is referring to the new family of stealthy malware (military malware and super-malware are names I’ve found) that include Stuxnet, DuQu, and Flame. In gathering facts for this article, I found this was not the first time people questioned traditional antivirus programs.

I’d like to introduce Paul Schmehl, Senior Information Security Analyst at the University of Texas-Dallas. Paul, a fine writer, penned “Past its Prime: Is Antivirus Scanning Obsolete?” for SecurityFocus. The lead paragraph:

“The title and topic of this article is clearly controversial. It is guaranteed to get a strong reaction from the antivirus industry, which is firmly convinced it sees clear sailing ahead. So, is antivirus scanning obsolete? In a word, yes, but don’t throw out your scanner.”

It seems Mikko is not alone and not the first. Paul wrote that 10 years ago.

The final person I’d like to introduce is Bruce Schneier. Bruce is highly regarded when it comes to any kind of security. To see what I mean, check out Bruce’s new book, Liars and Outliers. In 2009, Information Security Magazine carried “Is Antivirus Dead?“, a point/counterpoint discussion between Bruce and Marcus Ranum. Bruce had this to say:

“Yes, antivirus programs have been getting less effective as new viruses are more frequent and existing viruses mutate faster. Yes, antivirus companies are forever playing catch-up, trying to create signatures for new viruses. Yes, signature-based antivirus software won’t protect you when a virus is new, before the signature is added to the detection program. Antivirus is by no means a panacea.”

To be fair, all three feel antivirus applications have their place, but the methodology signature-based antivirus programs subscribe to appears less than adequate.

Playing catch-up

Read More...
http://www.techrepublic.com/blog/security/traditional-antivirus-software-is-useless-against-military-malware/8203?tag=nl.e036

Well... I'm not going to make a silly little snide remark here. Like, Go Linux or Go Home. Because... the kind of Code that they are talking about here. I'm sure, could be and has been written to Penetrate any Operating System...:(

Don

Hot Discussions

  • 37
    Windows 8 infographic: Pros and cons at a glance
  • 76
    First look: Microsoft's newest email client Outlook.com
  • 159
    Dump Gmail for Outlook.com? Four reasons you might
  • 12
    Wireless Emergency Alerts: Legit service or spreading fear and panic?


News 08-07-12


iGoogle
Linux Today - MSH Autoresponder 0.8 is now available
MSH Autoresponder
Linux Today - Microsoft mum on reasons for secure boot
Microsoft mum on reasons for secure boot
Linux Today - How to get your Linux feet wet with UNetbootin
How to get your Linux feet wet with UNetbootin | ITworld
NASA reveals Curiosity descent video and new Mars photos - SlashGear
NASA - SlashGear
Search result for Mars+curiosity - SlashGear
NASA - Curiosity's First Color Image of the Martian Landscape
Knock lock balks knock, uses CapSense without shock - Hack a Day
Southwest tour: OhmSpace in Oklahoma City, Oklahoma - Hack a Day
Edison’s Cradle is a bright idea - Hack a Day
How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab | Wired.com
How to Find Out What is Causing Problems on Your Windows 7 PC
8 Tons of Kids' Lunch Wraps Recalled Over Listeria
Hospital Chain Inquiry Cited Unnecessary Cardiac Work - NYTimes.com
Wade Page Is Suspected Sikh Temple Killer - NYTimes.com
Curiosity's Descent - YouTube
Replicopy| Custom Printed and Duplicated USB Drives
Weather chasers have IP-video, PoE network built into GMC Yukon - Cabling Installation & Maintenance
How CCTV advancements can help smaller IP video installations - Cabling Installation & Maintenance
PoE-based sensor adds security to wireless access point enclosures - Cabling Installation & Maintenance
Webinar to probe intersection of cabling, IP surveillance systems - Cabling Installation & Maintenance
TranSwitch to sell select telecom patents - Cabling Installation & Maintenance
But Mr. President, you didn't build that
President signs executive order affecting nation's communications networks
[Hacker Dojo] Renovations Kickstarter - Hack a Day
'Wall of Shame' exposes 21M medical record breaches - Computerworld
Breaches Affecting 500 or More Individuals
Microsoft blocks Windows 8 Start button, boot-to-desktop hacks - Computerworld
Job Search Results on Sologig.com
Traditional antivirus software is useless against military malware | TechRepublic

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • ZigBee - a specification for a suite of high level communication protocols used to create personal area networks built from small low-power digital radios
    ZigBee From Wikipedia, the free encyclopedia Jump to: navigation , search ZigBee ...
  • Open Sorce Hardware - The Wandboard is a low cost board based on the i.MX6 multicore ARM Cortex-A9 family of processors. In consists of a core module based on the EDM standard and a simple to extend baseboard
    Here's an Open Source Wandboard - Freescale i.MX6 ARM Cortex-A9 Opensource Community Development Board. The Wandboard is a low ...
  • 1967 Chevy Camaro Complete Rebuild - Videos, HowStuffWorks Videos "NAPA Videos"
    Video Playlist - West Coast Customs Shop, Completely Tears Down a 1967 Chevy Camaro and then does a Complete Rebuild...
  • Installing and Updating GRUB 2 in Fedora Linux
    This Page has allot of info on Installing, Updating and Trouble Shooting Grub 2 in Fedora Linux. There are some good How To's for...
  • Dynaco Stereo 400 Power Amplifier - Dead Channel Fix - Dynaco Repairs For PC-28 Amplifier Boards
    My Dynaco Stereo 400 Amp... The Page Below these e-mails with Kevin Boales. Looks like the one that I found. Back in ...
  • Open source PLC's - PLC (programmable logic controller)
    Here's some Great Looking Open source PLC Projects. The OSPLC Small & Large Bricks are open-source PLC (programmable logic ...
  • NetProMax PC with Motherboard P5PE-VM ASUSTeK
    Here are some links to info on the NetProMax PC with Motherboard P5PE-VM ASUSTeK ... Don ASUSTe...
  • Running a PXE Boot Server in Parted Magic
    Here's some good info on Running PXE Boot Server in Parted Magic... Don PXE – Parted Magic PXE PXE: the "classic" way ...
  • Americas Health Care - Obama Care - Key Features of the Affordable Care Act - Health Care and Education Reconciliation Act
    Finally! Some real info, as in... This is the date that the Affordable Care Act, goes into effect. Open enrollment in the Heal...
  • Building a Brushless Motor Controller using an ATmega Chip - by Davide Gironi
    Here's a very in depth Article on Building a Brushless Motor Controller using an ATmega Chip - by Davide Gironi... Do...

Blog Archive

  • ►  2013 (354)
    • ►  December (12)
    • ►  November (33)
    • ►  October (23)
    • ►  September (46)
    • ►  August (52)
    • ►  July (36)
    • ►  June (45)
    • ►  May (17)
    • ►  April (38)
    • ►  March (19)
    • ►  February (22)
    • ►  January (11)
  • ▼  2012 (145)
    • ►  December (27)
    • ►  November (31)
    • ►  October (14)
    • ►  September (15)
    • ▼  August (48)
      • Grid Compass Computer - Pioneering the Laptop
      • Radio Shack TRS-80 was Tandy Corporation's desktop...
      • Kororaa 17 (Bubbles) Released - Fedora 17 Linux Remix
      • OpenCandy - Given that any Software App that Scans...
      • Ever get an e-mail like this one?
      • Let me Google that for you
      • Probably the Best Free Security List in the World ...
      • Britec Tech Tips - Reviews & How-To Videos for Win...
      • Hisense Finds A Pulse In Google TV - WebProNews
      • Philip K. Dick, Writer - Robot
      • A simple RFM12 433Mhz Wireless Transceiver
      • Hacked Panasonic GH1 & Ryan Connolly and Canon DSL...
      • Tech noir (Movies)
      • AT&T ThreatTraq - Should You Be Worried About Mat ...
      • The Internet, In the Beginning - AT&T Archives - T...
      • Your Brain Can Now Be Hacked For Under $300 - WebP...
      • These Guys Want to Launch a Reality Show on Mars i...
      • The Loch Ness Monster and More Species Genetic Odd...
      • Texas Employs Aerial Spraying to Combat West Nile ...
      • Everyday Linux User - MacPup LINUX
      • 96 Saturn Electric Door Locks Running Battery Down...
      • Wyman Meinzer's West Texas - Pictorial music slide...
      • Should Linking To Copyrighted Material Be Illegal?...
      • Migraine Headaches - Migraine is a chronic disorde...
      • How to Build an Outdoor Shower Enclosure • Ron Haz...
      • TI-84+ bluetooth-capable using an RN-42 module and...
      • The History of Sci-Fi and Real Robots, goes back m...
      • How to Use the Keyboard to Move or Resize a Window...
      • Roomba 4000 Series Teardown - HACK A WEEK
      • Roller Coasters - Would You Entrust you Child's li...
      • “The GLL" aka “The Bill & Ted License” - Lunduke.com
      • Video's - NASA's Morpheus spacecraft explodes on f...
      • New Human Species identified from Kenya Fossils
      • Area 51 Declassified - National Geographic Documen...
      • The Open Source Powder Printer - Pwdr Open source ...
      • The Government Is Putting Fair Use In Danger - Web...
      • Traditional antivirus software is useless against ...
      • Are your Medical Records Safe? - Download Breaches...
      • Giant Walking Spider Machines - Mondo Spider and ...
      • CPSC's Recall RSS Feed and Subscription List widget
      • Flushmate Recalls Flushmate III Pressure-Assisted ...
      • NASA Cams, Ustream.TV - Mars Rover Curiosity Landi...
      • Dynaco Stereo 400 Power Amplifier - Dead Channel F...
      • NASA picks 3 private firms to develop space Taxis ...
      • 3D Printer Creates “Magic Arms” For Young Girl | W...
      • Meningococcal vaccine is a vaccine used against Me...
      • Woz (Steve Wozniak) Prints and Spends His Own $2 B...
      • How To Clean or Replace The (potentiometer or "pot...
    • ►  July (10)
Powered by Blogger.

About Me

Unknown
View my complete profile