In September of 2007, I wrote “The truth about viruses” and pointed out how the ubiquitous danger of viruses exists largely because of negligence. When the vulnerabilities that common viruses exploit never get fixed, and those viruses are only guarded against in a case-by-case manner using signatures-based and heuristic detection systems, new viruses that will bypass detection and still affect your computer can be created by the hundreds and thousands with minimal effort. In short, much of the reason for the ubiquitous threat of viruses is a tendency of software vendors to ignore virus-exploitable vulnerabilities, and expect antivirus vendors to pick up the slack.This is not a problem particular to viruses. In fact, a good antivirus application can protect you from viruses reasonably well most of the time. Those of us who deal with security issues professionally, or even regularly as a hobby, are understandably leery of the idea of being “reasonably well protected” from something “most of the time.” Still, it’s obvious that antivirus software is not a complete failure as a Band-Aid over a sucking chest wound.
The same problem exists outside of virus-exploitable vulnerabilities, however, and is not nearly so well addressed. As Gregg Keizer reports in “Top security suites fail exploit tests,” integrated security suites for desktop computers fare much worse across the range of threats against which they’re expected to protect you.
I’ve prepared a couple of simple bar graphs to give you an idea how much they protect you against virus threats and active attacks. I cut the number of compared vendors down to 10 in each case, because that’s the number of vendors that overlapped in the two shootouts. In both graphs, I will use the color green to show threat coverage that exceeds 50%, yellow to show threat coverage that exceeds 25% up to 50%, and red to show threat coverage no higher than 25%. In both graphs, they’re ranked from best performing vendor to worst performing.
The first example is from the June 2008 Virus.gr antivirus software shootout, and in each case where a single vendor had more than one product in the shootout, I counted only the best-performing product:
Antivirus Performance by Vendor
The second example is from Secunia’s [PDF] October 2008 Internet Security Suite test:
Security Suite Performance by Vendor
An antivirus application is expected to do well at protecting against viruses. While I wouldn’t consider anything lower than, say, 98% coverage to qualify as doing sufficiently “well” to satisfy me personally, at least nobody came in under the 50% wire.
An integrated Internet Security Suite is expected to protect one against active threats; it should include effective firewall, rootkit detection, active vulnerability defense, and at least some rudimentary kind of real-time intrusion detection. Sadly, one might have noticed I didn’t get to use my virtual yellow highlighter at all in that security suite graph. Everything came in below 25%. Even though the best was significantly better than second place for the vulnerability prooofs of concept that made up the testing gauntlet, it was nowhere near good enough to even bother.
The problem here is multifarious. A few key points include the following:
I can offer three simple pieces of advice, if you want effective defense, one to deal with each of the above problems:
source
Recent comments
16 weeks 2 days ago
1 year 21 weeks ago
1 year 21 weeks ago
1 year 25 weeks ago
1 year 35 weeks ago
1 year 38 weeks ago
1 year 38 weeks ago
1 year 38 weeks ago
2 years 1 week ago
2 years 12 weeks ago