While Symantec is somewhat guarded about the “secret sauce” of its reputation ratings, the data used by the scoring algorithm includes more than...
Are you sure? Norton Internet Security 2010 contains the Brightmail anti-spam engine, which has impressive performance statistics:
If I understand correctly, anti-malware signatures (whether in-the-cloud or on-the-client) are based on malware analysis (e.g., a heuristic...
Users who are evaluating encryption software may wish to check if that software is FIPS 140-2 certified, which is the case with PGP: “FIPS 140-2...
MadMonkey, while not an exact match for your needs, one approach you may wish to examine is the use of PGP NetShare. With this tool, you can...
Raven211, the fact that reputation ratings are always used by NIS10 first before signatures in assessing potential malware suggests that...
This is true, but personally I would prefer (a) the case in which the incremental protection provided by signatures is contributing to malware...
For a product still in beta testing, these results are impressive. On a more general note, this benchmark implies that AV-Test will be...
That strikes me as a non-trivial and significant benefit. It is not uncommon to install or run software from a CD disc or flash drive, for...
Raven211, perhaps this is a ‘silly’ question, but I noticed that Symantec’s description of Quorum is limited to the case of downloaded files from...
So, to clarify, a practical lesson from this research is to always generate your own private/public keys (rather than obtaining them elsewhere),...
Thanks for the reply, Justin. Yet, I still wonder about whether intelligently manipulating ciphertext is a “theoretical” problem with...
Trjam, although both “cloud technology” and virtualization are important for security, why do you see these as “linked” to one another? In other...
Pbust, can you kindly explain the advantages/disadvantages of having generic anti-malware signatures on the client (locally) versus in the cloud...
FYI -- A nice collection of screen images for Norton Internet Security 2010 (beta) is located here.
According to Symantec’s video (located here) on Download Insight, the only information transmitted to Quorum when checking a file’s reputation is...
By the way, this is an argument for the use of an integrated security suite rather than the assembly of individual, discrete components working in...
Elapsed, that’s an interesting perspective: it’s the reliability of the anti-malware vendor’s cloud rather than the content within the vendor’s...
My understanding is that only malleable cryptographic algorithms permit an attacker to intelligently alter the contents of an encrypted file. For...
For readers of this thread who may not have visited some of (very informative) links provided in prior posts, it may be wise to briefly consider...
“Why is my cloud better than your cloud?” It’s a question sure to garner more attention as security vendors increasingly incorporate a “cloud...
FYI -- Readers of this thread may be interested in the conversation occurring here about changes in scanning in Norton Internet Security 2010. It...
Raven211, I agree that the new approach used by Symantec is very intriguing. Nonetheless, it is still the case that Symantec could misclassify a...
Markoman, if a security application truly forces an unmount of an encrypted volume with open files, there is a serious risk of corrupting the...
Fontaine, if this is an important issue for you, consider PGP Desktop. It has the option to automatically unmount an encrypted virtual disk when...
Separate names with a comma.