Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Alert

This is disturbing . . .

Aug 19, 2012 7:12AM PDT

Discussion is locked

- Collapse -
Wayne, Hasn't It Always Been That Way...?
Aug 19, 2012 8:15AM PDT

First, because antivirus programs are playing "catchup" against malware and vulnerabilities, they always seem to be a little behind.. And second, because "vulnerabilities" within the operating system are frequently not addressable by antivirus programs, it takes the user of the computer AND Microsoft to correctly patch the machine before the malware can be effectively blocked.

It brings to mind the serious problems my government employer had, years ago, with the Blaster worm.. Once Microsoft correctly patched the "hole" AND each department patched their computers, the worm became a non-issue. At the time, I was the IT person for our department, I stayed ahead of the game, and I had our computers patched BEFORE the Blaster worm was released. As a result, our department ran smoothly while others had temporary stoppage till their computers could be fixed.

Hope this helps.

Grif

- Collapse -
Hmmm
Aug 19, 2012 8:17AM PDT

I suppose what that says is......
If you don't keep your machine patched don't count on your anti-products to keep your "chestnuts out of the fire"

- Collapse -
9 of 13 Fail Exploit Test
Aug 19, 2012 8:24AM PDT

Of the thirteen, two of the industry-leading a/v solutions also failed to protect themselves from being completely disabled in the NSS test.

--CA (Computer Associates)
--Microsoft Security Essentials

Apparently no self-protection module for either program is in place/or is built well enough, to prevent a simple "kill" command issued by rogue exploit malware, from turning them off completely. This, of course, means additional malware can be downloaded without detection by protective mechanisms. An user would be completely unprotected in this scenario.

If an a/v cannot resist attack, then this is a complete failure to perform as expected by an user.

- Collapse -
whats a
Aug 19, 2012 8:34AM PDT

regular non tech person supposed to do? We have our antivirus (in my case Avast free ), use Firefox with WOT and have Windows Defender turned on. We run the recommended tools such as malwarebytes and super anti spyware as well as all of the windows updates. I don't know anything about patching. Should we be patching?...Digger

- Collapse -
Thank you Carol
Aug 20, 2012 2:41AM PDT

I have read the articles but, when these guys started talking about patching it kind of took me off guard. All of my updates are in place as of yesterday when I did a clean install of windows, didn't know we were patching....Digger

- Collapse -
You're welcome Digger
Aug 20, 2012 3:33AM PDT

I'm extremely judicious about keeping on top of things. I still run Secunia's Online scan, every now and then to make sure everything is "as it should be".

Keep up the good work..
Carol

- Collapse -
Scary
Aug 20, 2012 12:15AM PDT

Pretty scary scenarios out there, makes you want to run for cover or go to Mac or Linux systems. It is really difficult for the average Windows user to deal with, so many vulnerabilities and bad things lurking out there in the cyberworld. MSE and Defender, well, I won't go there, IMO much ado about nothing.