That statement I would disagree with, the data stored on the common pc is an extremely juicy target that is a very high priority for criminals...
It wouldn't be a bad idea to show the user that type of information, how many users have clicked allow/deny, I like it. Generally it does give...
I think this is why whitelisting and AE tech by itself is fairly useless, if the user has no information, how are they to make a decision?...
Good article, but consider that the source has a revenue stream that depends upon you believing that whitelisting isn't a more effective...
They are focused on prevention, but they are still very much behind the ball and constantly playing catch up. The coolwebsearch example is a good...
I think I see your point, meaning for example an html file becomes malicious in one way or another? There are only so many avenues to execute...
Real world example? This would only hold true if the solution in question looked for certain file extensions to block.
You're correct, I believe it had to do with assuming network drives and shares are safe sources by default. In the real world, those two sources...
That's exactly how I think when I look to test out a product. When I'm testing out a sandboxing/AE/whitelisting solution, I know it's going to be...
That is a good point, we do depend on the user to make decisions occasionally on code execution and we can't control the human element that's...
Thanks for testing things out and sharing this, great info. We will have self protection within a week or so, it was put on the back burner as...
Good point. Most of the "vm aware" threats out there that I'm aware of are designed to shut themselves down to prevent reverse engineering of...
I hate to tell you but reading is only going to take your knowledge so far in the security industry. I'm sure if you read the marketing...
Yes and that one bothers me the most. Informing a user that a threat has been prevented when clearly several executables are sitting running code...
If you're afraid to try new solutions, how will you ever advance your knowledge? Personally, I get my hands dirty with several products a week....
I'm not sure how else to explain it guys. NIS 2010 does not prevent unknown code from executing. Period. BluePoint does. We do not allow code...
No problem Hugger, thanks for giving us a try! As jmonge mentioned, BluePoint runs best as a standalone (the only real-time protection product on...
Good info
Hugger, Did it just block them or did it remove them? Sometimes it'll report high risk if the item appears suspicious but it shouldn't actually...
Yikes! That's a bit harsh.
No. This is just as impossible as guaranteeing that someone can maintain a 100% complete and accurate blacklist. Here's a quick breakdown of how...
One of them was a recompiled version of our test keylogger, simple modifications were made to evade heuristic detection.
Simply put, NIS 2010 is not based upon an AE/Whitelisting security model, BluePoint is. Very different methodologies, Symantec appears to be...
Hugger, Glad to hear you're kicking the tires. We haven't received any reports of interaction problems with Prevx or DefenseWall. As always,...
A few people have mentioned that the scanning has frozen or won't complete. Keep in mind we utilize the cloud to analyze files, it may take quite...
Separate names with a comma.