Adobe X sandboxes its self however they have a couple ways to break out already.
Switching off Adobe products is the way to go secure though obscurity isn’t the best way to go but it should stop a lot of canned attacks assuming nobody stole code from adobe and used it their pdf viewer
I have been pretty happy with security essentials it doesn’t slow the machines down and seems to pick up malware once the box is already infected lol
Also, Malwarebyte real-time (paid) version works pretty well too. All of the box copy A/Vs are so frieken bloated it’s ridiculous. AVG’s install file for 64-bit machines is 190MB…WTF?!
I’ll see if I can find that PDF video, you’d probably enjoy it. It was a bit over my head, but interesting/scary at the same time.
It now comes preconfigured for a bunch of applications.
This is huge in stopping 0day and known attacks against windows even if they manage to avoid AV detection.
:tup:
EMET 4.0 detects attacks leveraging suspicious SSL/TLS certificates
EMET 4.0 strengthens existing mitigations and blocks known bypasses
EMET 4.0 addresses known application compatibility issues with EMET 3.0
EMET 4.0 enables an Early Warning Program for enterprise customers and for Microsoft
EMET 4.0 allows customers to test mitigations with “Audit Mode”
You’re better off with a more secure system configuration disabling flash/java from auto running, don’t use Adobe reader, use EMET, a large number of registry settings you can change, Egress filtering, logging, etc
in other words, make it so that you’re machine cannot actual execute any code.
actually, you know what, you’re better off just unplugging the machine and putting in your closet.
jk, but seriously… LZ is right. Relying on AV is a fail move. It’s going to catch low hanging fruit only, at best. A secure config will be a better setup, but then you have to deal with the fact that it will most likely break functionality of things you like to do, so you need to take the time to work through those issues. Most people will just give up and ignore the problem by then.
EMET 4.0 shouldn’t break stuff along with most standard security configurations.
You start running into issues running products like Bit9 in enterprises where you have 3rd party apps that are not signed however Bit9 is a really solid product.
The hotness in enterprise networks is deep packet inspection/ssl decryption if you malicious payloads get detected trying to ex filtrate data or connect back to a C&C server its game over for the hackers.
The financial loss is real even if your a restaurant, retail store, health care, small company or fortune 100.
It’s the cost of doing business and using technology you need to build security into your networks, pc, cash registers, kiosks, etc
Security is all well and good, depending on who’s making decisions. I know a lot of people look at cost first (even though it could cost double or triple in the long haul). Another in IT is staff shortage. My department is so understaffed that sitting down to really look at security is unthinkable. Even if I was to lock down everything nice and tight it then becomes a burden in the future allowing exceptions or creating work arounds.
As far as AV goes, you have to think about it from a normal user standpoint. Does it protect against all threats…nah…not even close. Most users suck and click everything in sight, download whatever, and go to weird sites. IF there is a shinny icon down by their clock telling them it’s ok, they feel better. If it stops some of the infections it might not be bad to have.