antimalware_software
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| antimalware_software [2025/08/28 13:38] – ultracomfy | antimalware_software [2025/09/24 20:43] (current) – ultracomfy | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| {{page> | {{page> | ||
| </ | </ | ||
| - | ~~Title:Artificial Intelligence~~ | + | ~~Title:Antimalware Software~~ |
| <WRAP centeralign> | <WRAP centeralign> | ||
| - | <fs xx-large> | + | <fs xx-large> |
| An antimalware program is a type of software used in the detection of and defense against malicious programs and exploits. | An antimalware program is a type of software used in the detection of and defense against malicious programs and exploits. | ||
| Line 55: | Line 55: | ||
| ===== 4. Behavioral Detection ===== | ===== 4. Behavioral Detection ===== | ||
| - | Behavioral detection is what truly distinguishes good products from terrible ones. It is, however, also the hardest to get right, if you get it working at all. Of course we as humans don't care about cybersecurity in terms of software or code. As a company, | + | Behavioral detection is what truly distinguishes good products from terrible ones. However, it is also the hardest to get right, if you get it working at all. Of course we as humans don't care about cybersecurity in terms of software or code. As a company, what you care about is to prevent data exfiltration, not the semantics used to get there. The malware sample used to do nefarious things is just that - a sample used to do nefarious things. |
| When Signatures, Static Analysis and Sandboxing all return negative, it probably is time to let the program execute. But, behavioral detection keeps watching. If a program acts up and starts doing funny things - for example if it starts encrypting files - it will notice and shut that program down. If a program suddenly starts deleting a bunch of shit, or gives orders to another program to delete a bunch of shit - shut it down. If a program does funny things with your boot configuration, | When Signatures, Static Analysis and Sandboxing all return negative, it probably is time to let the program execute. But, behavioral detection keeps watching. If a program acts up and starts doing funny things - for example if it starts encrypting files - it will notice and shut that program down. If a program suddenly starts deleting a bunch of shit, or gives orders to another program to delete a bunch of shit - shut it down. If a program does funny things with your boot configuration, | ||
| - | The cool thing about behavioral detection is that it works entirely independently and does not discriminate. Even the most trusted corporation on the planet might one day get hacked | + | The cool thing about behavioral detection is that it works entirely independently and does not discriminate. Even the most trusted corporation on the planet might one day make a mistake |
| - | The advantage of this approach is that, regardless of whatever program you throw at it - known or not, popular or not, new or not, published by a trusted source or not, system online or not, downloaded from a shady website or not, ran from an unknown USB drive or not - behavioral detection can spot them all (while non-malicious programs are fine). Additionally, | + | The advantage of this approach is that, regardless of whatever program you throw at it - known or not, popular or not, new or not, published by a trusted source |
| The downside is that behavioral detection is //hard//. To understand which system operations exactly are // | The downside is that behavioral detection is //hard//. To understand which system operations exactly are // | ||
| Line 67: | Line 67: | ||
| ====== How protection doesn' | ====== How protection doesn' | ||
| ===== 1. Common Sense ===== | ===== 1. Common Sense ===== | ||
| - | Common sense is the single most frequent advice that can be found on the internet. And it's true - human judgement can be a good and sometimes even the most effective layer of protection against threats of all kind. But.. who doesn' | + | <WRAP box right centeralign 18%> |
| + | {{:: | ||
| + | You are perfectly right, humans are the biggest threat to their PC. Therefore, we should not trust humans with keeping a PC safe. Not this guy, not your mom, not you - regardless of good you think you are. Get proper antimalware. | ||
| + | </ | ||
| + | Common sense is the single most frequent advice that can be found on the internet. And it's true - human judgement can be a good and sometimes even the most effective layer of protection against threats of all kind. But.. who doesn' | ||
| With heavy and potentially dangerous machines, operator training and safe handling standards are one half of the equation. The other half sits in the design department with skilled and knowledgeable people who recognize that even the most knowledgeable and experienced operator will make a mistake. Just a lapse of judgement. A brief moment of distraction, | With heavy and potentially dangerous machines, operator training and safe handling standards are one half of the equation. The other half sits in the design department with skilled and knowledgeable people who recognize that even the most knowledgeable and experienced operator will make a mistake. Just a lapse of judgement. A brief moment of distraction, | ||
| Line 75: | Line 79: | ||
| Risk management, a proper science that would //never// even //think// about suggesting something as ridiculous as this, is about minimizing risks at every stage of the process - at the human level, sure, but also at the mechanical level. That's why 50% of the resources of product design go into researching how humans could possibly fuck up using the product, and then minimizing the ways in which it can happen in the first place or how to minimize the potential damage. | Risk management, a proper science that would //never// even //think// about suggesting something as ridiculous as this, is about minimizing risks at every stage of the process - at the human level, sure, but also at the mechanical level. That's why 50% of the resources of product design go into researching how humans could possibly fuck up using the product, and then minimizing the ways in which it can happen in the first place or how to minimize the potential damage. | ||
| - | And that still doesn’t cover risks beyond your control. Supply chain attacks, insecure devices on your network, careless family members, colleagues, or even vendors whose own security might be weak—all are threats you cannot fix with judgment alone. The digital landscape has countless entry points far beyond simply “not downloading shady files", | + | And that still doesn’t cover risks beyond your control. Supply chain attacks, insecure devices on your network, careless family members, colleagues, or even vendors whose own security might be weak, remote code execution vulnerabilities, |
| - | ===== 2. What not to rely on: Windows Defender? ===== | + | ===== 2. Windows Defender? ===== |
| - | There is a pervasive myth that common sense plus Windows Defender are enough to keep you safe. Or that Windows Defender is as safe or safer than other products on the market. | + | There is a pervasive myth that common sense plus Windows Defender are enough to keep you safe. Or that Windows Defender is as safe or safer than other products on the market. |
| - | And... I don't know, maybe? Funnily enough, despite arguing against it, that particular combination //is// what I rely on((And even that only because I can't disable Defender without some drama from the operating system.)). How much risk is acceptable risk for you? Either way, the reason I don't like that claim is because Common Sense is terrible | + | Maybe. In fact, that’s the setup I personally |
| - | The truth is that the people who say " | + | For years, Defender was a failure. Keeping a signature list of known malware |
| - | For the longest time, Defender | + | Now, Defender |
| - | In those old tests, Windows | + | Even so, Defender still has major shortcomings. Its scanning |
| - | + | ||
| - | One annoying part about this now is that Defender has actually been catching up over the years. It now passes the well known and infamous malware test like any other respectable product, and even its general detection rate is beginning to get to where other products are and, frankly, should be. 95% I think? There or thereabouts. The annoying thing about this is that the people are still thinking in their wrong and simplistic ideas of how the world works. The started out being utterly wrong, but over time the facts have begun to shift into aligning with some of what they say. So, now their wrong calculation just happens to spit out the right result, but they' | + | |
| - | + | ||
| - | The reality is that Defender, despite having caught up as a cheap antimalware product that has a register of signatures, doesn' | + | |
antimalware_software.1756388328.txt.gz · Last modified: by ultracomfy
