Who Is Best?

by | Jun 11, 2021 | Video

Topics Covered Click a topic for similar articles

Traditional antivirus packages are pattern matching. A virus file will come in and it will have certain characteristics in that file. And your antivirus will look at it. Look at the first, 10, 20, 40 bytes of that file and say it matches this virus, I’m going to quarantine that. And that will catch, probably 95% of viruses.

But viruses, antivirus, and things like that, have been around, crikey, now 40 years. But a lot of the people who are writing viruses nowadays are writing viruses that mutate, do something called obfuscate themselves. You wouldn’t see those bytes every time that the virus comes out to you.

We now need to look at running that virus in a, sort of inside like a fortress, it’s what’s called a sandbox, and look at those characteristics, what it’s trying to do, and if those characteristics match behaviours that look like it’s gonna be a virus, we then quarantine it. That would be the 95% up to 99%.

Related Articles

What is a CRM and how can it help your business?

What is a CRM and how can it help your business?

What is a CRM and how can it help your business? Regardless of the size of a business or the industry it operates in, the key to a business’s growth is its customers. For a business to be successful it needs to manage their customers effectively and efficiently. For a...

Business Intelligence: 5 ways businesses use Power BI

Business Intelligence: 5 ways businesses use Power BI

As businesses become more technology reliant for day-to-day operations, they collect and create massive amounts of data. Visualisation and analysis of this data can transform the way businesses make strategic decisions. However, the sheer amount of data can pose a...

Double Zero-Day in Chrome and Edge

Double Zero-Day in Chrome and Edge

If you use Google Chrome or Microsoft Edge on your computer, stop what you're doing and update your browser. As reported by security blog Sophos Security, Google announced that a zero-day exploit has been found in Google Chrome that could allow hackers to perform...