30 October 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

522 | posts 1,329,203 | views 59 | comments

The Role of Antivirus Software

16 August 2014  |  1943 views  |  2

The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software).

AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as phishing attacks, worms, Trojan horses, rootkits and more.

How does AV software work?

  • It will first scan (either on automatic timer that the user selects or manual) the computer’s files to seek out any viruses that fit the description that’s in a virus dictionary.
  • Using a method called heuristic analysis, it will also try to detect suspicious activity from any program that might seem to be infected.

Antivirus programs come in different flavors, but the common denominator is that they seek out viruses and other malware, and neutralize them.

The computer’s hard drive and external drives are also included in the scanning process.

What’s really important is that you make sure that your AV software is set for automatic updates—and on a daily basis at that—so that any new viruses or malware can be quickly pounced upon and rendered disabled.

Cybercrimes are more prevalent than ever, says the McAfee Threat Report. Check out some findings:

  • Fairly recently (first quarter of 2013) was a time that was the most active, ever, for the entire gamut of malicious software generation.
  • More than 14 million new samples were identified by McAfee.
  • Malware is evolving, becoming savvier. An example is the Zeus malware that gets spread when the user unintentionally downloads it (from being tricked into doing so), or, when the user opens an attachment in an e-mail, not knowing it’s poised to infect his computer. This malware is smart because it evades anti-spam software by presenting as graphics instead of text in the e-mails.
  • Every month means about six million new botnet infections.
  • Between the first and second halves of 2013, new phishing websites doubled in number.
  • Sixty percent of the leading Google search terms returned malicious sites just in the first 100 search results alone.

The key is simply to have antivirus installed, let it run its updates automatically and pay for the annual license. As long as you have it, it will prevent most infections.

 

TagsSecurity

Comments: (4)

Boris Taratine - visa - London | 17 August, 2014, 14:38

I am wondering if the author aware that the modern most devastating malware attacks are specifically designed to circumvent antimalware defences?

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano - IDTheftSecurity.com - Boston | 17 August, 2014, 14:53 Yes Boris. The author is aware. Did you read it? Or do you just like to wonder?
Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Boris Taratine - visa - London | 17 August, 2014, 18:54

Great, we are on the same page then! So, if we both are aware and agreed on the fact that the modern most devastating malware attacks are specifically designed to circumvent antimalware defences, I am not sure I see how would the recomendation to "simply have antivirus installed, let it run its updates automatically and pay for the annual license. As long as you have it, it will prevent most infections" be "the key" to resolve the problem which causes the most concerns? In situation where not an infection per se but adversary's objectives is what causes the pain, not the quantity of those stoped matters, but the quality of those missed. Do not you think? And that is not clear from the arcticle.

 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano - IDTheftSecurity.com - Boston | 17 August, 2014, 20:46 Agreed. But this post isn't about the Stuxnets. Generally, most devices connected to the internet are consumer. For them, AV is essential. Including Android mobiles. The majority of infections aren't designed to shut down AV and AV will prevent most of them.
Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Steps to Manage a secure online backup

29 October 2014  |  440 views  |  0  |  Recommends 0 TagsSecurity

5 ways Criminals hack your PC

25 October 2014  |  1127 views  |  0  |  Recommends 0 TagsSecurity

2 Ways to Prevent Military Identity Theft

24 October 2014  |  604 views  |  0  |  Recommends 0 TagsSecurity

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  769 views  |  0  |  Recommends 0 TagsSecurity

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  639 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love
Mike McCormack