Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 01 January 2013 / Published in Woo on Tech

Today’s Antivirus Software is already outgunned

A shrinking bubble of protection

A recently published whitepaper from Redwood, CA security firm Imperva reports a disturbing trend that many technology professionals already suspected: current anti-malware manufacturers can’t keep up with the pace of virus development now that malware has moved from the realm of mischief to big-time criminal enterprise. Researchers from Imperva and students from Technion-Israel Institute of Technology put together a study that pitted 80 new viruses against over 40 of the top commercial antivirus products on the market, including Symantec, McAfee and Kaspersky and found that they were only able to detect 5% of the new malware infections.

It’s important to note that the sponsor of this study, Imperva, has a material stake in future anti-malware development, as their focus has been on developing a method of protection that differs from the traditional signature detection approach used by the mainstream antivirus developers. Signature detection relies on antivirus manufacturers being able to “capture” and reverse-engineer a computer virus strain to develop ways to combat infection, a process that is entirely reactive and time-consuming. As you might have guessed, new viruses can do their damage in minutes on a vast scale thanks to the internet, so relying on protection developed after the virus has been in the wild is of no help to those already infected. Cybercriminals realize they have the advantage of surprise on their side, and are investing heavily in staying ahead of signature detection algorithms.

What this means for you:

Future security is going to rely heavily on a combination of methods: signature detection, heuristic analysis (watching for anomalous behavior), virtualization/compartmentalization and good old fashioned paranoia/preparedness. The public at large has been lulled into a false sense of security in thinking that purchasing a product off the shelf will absolve them of the need to remain vigilant. As some of my clients can personally attest, you can have the best antimalware products on the market and still get infected. Technology security is more than purchasing software and hardware – it’s a process and state of mind that must constantly be maintained. If you are uncertain how to evolve your business practices to step up your state of readiness, give C2 Technology a call – we can help!

Image courtesy of graur razvan ionut / FreeDigitalPhotos.net

  • Tweet
Tagged under: antimalware, cybercrime, heuristic analysis, kaspersky, mcafee, preparedness, security, signature detection, symantec

What you can read next

Don't get burned!
Cheap technology not always a great buy
ID-10069440.jpg
New Year, New (More Secure) You
Current encryption standards in danger?
Quantum computers could render current encryption obsolete

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Accountant working on accounting software on laptop

    What Accounting Firms Learn About Technology During Tax Season

    Tax season is the best stress test your technol...
  • Someone working on a tablet with AI

    Your Employees Are Already Using AI With Your Client Data

    You just don’t know it yet. I had a conve...
  • 3-2-1 countdown over computer language background

    The 3-2-1 Backup Rule Explained for Non-Technical Business Owners

    The 3-2-1 backup rule is one of those things th...
  • Microsoft365 vs Google

    Microsoft 365 vs. Google Workspace: Which One Actually Works for Law Firms?

    Many businesses, when trying to get their proce...
  • Backup and recovery icons for computer overlaid on people working on computers

    Your Backup Strategy Is Probably Broken (Here’s How to Fix It)

    I’ve been doing this for over three decad...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP