Debunking 10 top myths about malware

Discussion in 'malware problems & news' started by ronjor, Mar 21, 2013.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,760
    Location:
    Texas
    http://lastwatchdog.com/debunking-10-top-myths-malware/
     
  2. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,219
    Some of those assumptions seem somewhat made up.

    I do not agree with all the answers, because they only answer a part of the spectrum. For example, a question - I'll know I'm infected because malware is noisy - it implies this is not true. The answer is this is ALSO true. Can be both. so it's not a myth. But it's not the WHOLE truth.

    I can safely open attachment is another - It implies you cannot. However, I think that's not a myth. It's the matter of statistics. I do safely open attachments from family. It depends what they are. When me mom sends me the pics she took at our dinner, I know what they are. But if she were to send me an exe file, that would be different, no.

    And what's with her photo ... :)

    Mrk
     
  3. Mman79

    Mman79 Registered Member

    Joined:
    Sep 19, 2012
    Posts:
    2,016
    Location:
    North America
    I think the majority of the list is crap myself. As to that last "myth", I don't believe malware is created by the AV industry, but I certainly believe they are great at scaremongering and exaggeration.
     
  4. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    "You can’t upload computer viruses to an alien spaceship from your Mac laptop,"

    Right, I'm not buying a Mac then!
     
  5. Mman79

    Mman79 Registered Member

    Joined:
    Sep 19, 2012
    Posts:
    2,016
    Location:
    North America
    I can see it now, the mothership getting infected with alien porn pop-ups. I hope the distraction doesn't cause the poor souls to crash down to Roswell again. That first time didn't go so swell for them :D
     
  6. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    Yeah but those old Roswell saucers were running Vista ...
     
  7. SirDrexl

    SirDrexl Registered Member

    Joined:
    Apr 14, 2012
    Posts:
    556
    Location:
    USA
    She claims she has heard those things, and I'll take her word for it. Of course we know they are not true, but we're not average users.
     
  8. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,671
    Location:
    Philippines
    Yeah I was thinking the same thing. Were did she come up with these myths.
     
  9. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    I was told that toilet seats are a common cause of malware (or was that syphilis?).
     
  10. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,432
    Location:
    Slovakia
    “Malware isn’t really a problem anymore ...”
    I completely agree with this "myth". It is hackers, who are really dangerous, not some automatic malware, from which you can easily protect from these days.

    “I can protect myself from malware by not going on porn/warez sites.”
    Not like you can get infected by going to porn/warez sites, unless they are fakes.
     
  11. nosirrah

    nosirrah Malware Fighter

    Joined:
    Aug 25, 2006
    Posts:
    561
    Location:
    Cummington MA USA
    They forgot my favorite myth:

    "A malware prevention test where all contenders block between 95% and 100% of samples is a good predictor of real world performance."

    and my second favorite myth:

    "All database based security application can only block malware that is known to their researchers."
     
  12. AlexC

    AlexC Registered Member

    Joined:
    Apr 4, 2009
    Posts:
    1,288
    Can you please elaborate?

    It´s a privilege to hear directly from one of the developers of one of the most successful antimalware applications these days :thumb:
     
  13. nosirrah

    nosirrah Malware Fighter

    Joined:
    Aug 25, 2006
    Posts:
    561
    Location:
    Cummington MA USA
    "A malware prevention test where all contenders block between 95% and 100% of samples is a good predictor of real world performance."

    When it comes to the crap I pull out of friends and families PCs it closely matches the crap I see most AVs miss when I go malware hunting. This is especially true for exploit drops. These have pitiful detection rates and this is expressed through the huge backlogs we see at the help forums.

    AV testing would have you believe that the industry has this issue under control. Whenever I get sample packs used for testing I see a disproportional amount of PUPs/legit adware, patched (often patched and unpatched incorrectly) files and script kiddy MSIL/VB files when compared to reality. I generically call these samples "testing fluff". Testing is just starting to move towards more real world testing but I would really like to see more pressure put on this move.

    "All database based security application can only block malware that is known to their researchers."

    The vast majority of the stuff we block we have never seen before, my assumption that to a various degree this is true for a lot of database based vendors. It is possible to create signatures that take a wide variety of factors into account and then add in a certain level of flexibility into those factors allowing the signature to deal with unknown variants and even new infections.

    Thanks :)
     
  14. AlexC

    AlexC Registered Member

    Joined:
    Apr 4, 2009
    Posts:
    1,288
    Thanks! :thumb:
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.