Reports have claimed, in obscure terms, that SONAR is a behavioral-based technology. Neither those reports nor the help files in NAV/NIS provide...
Nevermind how well it works, does anyone even know what it is? Personally I wish Symantec downloads weren't so bulky and the installation...
I'm still trying to understand why this request is so popular; unless you people all use Advanced Rules, I see no real reason for it to be needed....
This POC overwrites the first 4kb of your hard drive. I'm not particularly familiar about FD-ISR, but from what I've read: FD-ISR apparently...
Nope, doesn't change the fact that FD-ISR, DeepFreeze etc fails to do what it claims to be able to do when faced against this trojan. So much...
Wrong. "Robodog" the password-stealing trojan forever shattered the myth of ISR software when it surfaced this September in China, successfully...
Let's each speak for ourselves, ErikAlbert. You're free to advertise your ignorance all you want, but that doesn't necessarily stand true for your...
The difference between this one and KillDisk is that this one claims to bypass ISR software, right from ring3 without having to load any drivers,...
In a word, no. This happens numerous times on a daily basis. It happened yesterday, and will happen again tomorrow, the day after tomorrow, and...
The problem with such a scenario is that using a Deny option (if there was one) instead of Quarantine will stop that one particular action that...
Just out of curiosity, what are these programs?
IMO the option to deny an action is useful only with advanced rules. When it comes to the default settings, the flagged process is either real...
I've just found a copy of this. ThreatFire has zero capability to protect against low-level write access, and fails, as expected. Returnil...
I've been trying to search for this sample for the past 3 hours... without success. If you have it, send it to me via PM, and I'll be more than...
Just for the record, I've seen users complaining of an FP on a Lotus dll component two days ago. The name Avira reported it as? TR/Gorshok.
For the same reason IBK is worried, apparently. Does anyone have any idea why this is supposed to invalidate the test?
http://www.wilderssecurity.com/showthread.php?t=188934 Also, take a look at mass-spammed Storm worms lately. The IPs of the malicious websites...
That's a moral argument, not a technical one. I don't see why this fact should discredit the testing measures as inaccurate.
Regarding Comodo and OA, how effectively they can implement whitelisting remains to be seen; especially in Comodo's case, where prompts are still...
Isn't that exactly what happens in real life? Variants of malware, which are tweaked to bypass scanners, get created.
Re: ThreatFire 3.0.13.11 relased That's the thing; there haven't been any FPs on my test machine yet on level 4. My poking around continues...
Re: ThreatFire 3.0.13.11 relased Working perfectly so far. Protection level 4 provides greatly increased defense against downloaders; I'm still...
Funny how the same can be aptly used to describe you as well. At any rate, it wouldn't be the setting of a new precedent if you were to be...
The opinions of users about Eset can be generally divided into two categories. One of them come from users who have access to, or know how to...
Just for the record, Kaspersky slaughtered explorer.exe a few days ago as well.
Separate names with a comma.