31 July 2016
Robert Siciliano

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

730Posts 1,808,377Views 62Comments

The Role of Antivirus Software

16 August 2014  |  2203 views  |  2

The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software).

AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as phishing attacks, worms, Trojan horses, rootkits and more.

How does AV software work?

  • It will first scan (either on automatic timer that the user selects or manual) the computer’s files to seek out any viruses that fit the description that’s in a virus dictionary.
  • Using a method called heuristic analysis, it will also try to detect suspicious activity from any program that might seem to be infected.

Antivirus programs come in different flavors, but the common denominator is that they seek out viruses and other malware, and neutralize them.

The computer’s hard drive and external drives are also included in the scanning process.

What’s really important is that you make sure that your AV software is set for automatic updates—and on a daily basis at that—so that any new viruses or malware can be quickly pounced upon and rendered disabled.

Cybercrimes are more prevalent than ever, says the McAfee Threat Report. Check out some findings:

  • Fairly recently (first quarter of 2013) was a time that was the most active, ever, for the entire gamut of malicious software generation.
  • More than 14 million new samples were identified by McAfee.
  • Malware is evolving, becoming savvier. An example is the Zeus malware that gets spread when the user unintentionally downloads it (from being tricked into doing so), or, when the user opens an attachment in an e-mail, not knowing it’s poised to infect his computer. This malware is smart because it evades anti-spam software by presenting as graphics instead of text in the e-mails.
  • Every month means about six million new botnet infections.
  • Between the first and second halves of 2013, new phishing websites doubled in number.
  • Sixty percent of the leading Google search terms returned malicious sites just in the first 100 search results alone.

The key is simply to have antivirus installed, let it run its updates automatically and pay for the annual license. As long as you have it, it will prevent most infections.

 

a member-uploaded image TagsSecurity

Comments: (4)

Boris Taratine
Boris Taratine - visa - London | 17 August, 2014, 14:38

I am wondering if the author aware that the modern most devastating malware attacks are specifically designed to circumvent antimalware defences?

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano
Robert Siciliano - IDTheftSecurity.com - Boston | 17 August, 2014, 14:53 Yes Boris. The author is aware. Did you read it? Or do you just like to wonder?
Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Boris Taratine
Boris Taratine - visa - London | 17 August, 2014, 18:54

Great, we are on the same page then! So, if we both are aware and agreed on the fact that the modern most devastating malware attacks are specifically designed to circumvent antimalware defences, I am not sure I see how would the recomendation to "simply have antivirus installed, let it run its updates automatically and pay for the annual license. As long as you have it, it will prevent most infections" be "the key" to resolve the problem which causes the most concerns? In situation where not an infection per se but adversary's objectives is what causes the pain, not the quantity of those stoped matters, but the quality of those missed. Do not you think? And that is not clear from the arcticle.

 

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Robert Siciliano
Robert Siciliano - IDTheftSecurity.com - Boston | 17 August, 2014, 20:46 Agreed. But this post isn't about the Stuxnets. Generally, most devices connected to the internet are consumer. For them, AV is essential. Including Android mobiles. The majority of infections aren't designed to shut down AV and AV will prevent most of them.
Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)

Latest posts from Robert

32 Million Twitter Pass for sale Add two-factor NOW

21 July 2016  |  2545 views  |  0 comments | recomends Recommends 0 TagsSecurity

Phone Account of FTC Chief Technologist hijacked

14 July 2016  |  2311 views  |  0 comments | recomends Recommends 0 TagsSecurity

Viruses as Cyberweapons for sale

12 July 2016  |  3154 views  |  0 comments | recomends Recommends 0 TagsSecurity

TeamViewer Clients Victims of other Hack Attacks

08 July 2016  |  4328 views  |  0 comments | recomends Recommends 0 TagsSecurity

Can Two-Factor Authentication actually fail?

06 July 2016  |  2661 views  |  0 comments | recomends Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Raul Thomas
Ketharaman Swaminathan
Lee Mughal
Balasubramaniam Gd
Dirk Kinvig