Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Windows Defender vs Ransomware! (Shocking Results?)
Message
<blockquote data-quote="ForgottenSeer 109138" data-source="post: 1082328"><p>Because normal users download a folder full of ransomware and run an automated script to execute them correct?</p><p></p><p>Which is my point, still very much on topic. Route of infection has a lot to do with how security will respond to threats, in how the security is designed and at what stages its bolstered at to help negate the infection from happening. </p><p></p><p> I bet he had to disable the security to build those zip files full. What does that tell you. How do I know, I used to test, and had to disable windows security in order to build a folder to test with. </p><p></p><p>Now add in the fact that users could simply look at the files, realize they do not look right, and decide to verify before executing, and again, the system would not be infected. Even if they did accidentally execute something of the nature, having system images and personal items backed up externally would rectify the locked system. </p><p></p><p>Now before I get hit again with "it wont stop leaked data" I can attest to you, I have seen many security suites stop infections as such, but much too late as the sample had indeed already connected outbound to the command and control. All you can do in that instance is damage control. Nothing is 100% but learning to be aware, and use habits will help users. These "look at me videos" that are not performed real world style "route of infection" do not help users, as they are not accurate. "No offense meant to the creator" although I'm sure you understand exactly what I'm saying.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 109138, post: 1082328"] Because normal users download a folder full of ransomware and run an automated script to execute them correct? Which is my point, still very much on topic. Route of infection has a lot to do with how security will respond to threats, in how the security is designed and at what stages its bolstered at to help negate the infection from happening. I bet he had to disable the security to build those zip files full. What does that tell you. How do I know, I used to test, and had to disable windows security in order to build a folder to test with. Now add in the fact that users could simply look at the files, realize they do not look right, and decide to verify before executing, and again, the system would not be infected. Even if they did accidentally execute something of the nature, having system images and personal items backed up externally would rectify the locked system. Now before I get hit again with "it wont stop leaked data" I can attest to you, I have seen many security suites stop infections as such, but much too late as the sample had indeed already connected outbound to the command and control. All you can do in that instance is damage control. Nothing is 100% but learning to be aware, and use habits will help users. These "look at me videos" that are not performed real world style "route of infection" do not help users, as they are not accurate. "No offense meant to the creator" although I'm sure you understand exactly what I'm saying. [/QUOTE]
Insert quotes…
Verification
Post reply
Top