Antivirus tools security check revealed that the tools themselves have obvious weaknesses. CHIP will tell you how you can close vulnerabilities and protect yourself from threats posed by malware.
Symantec security experts log 13 million new variants of malware per month. Antivirus systems are designed to protect against this threat, but it is obvious that they themselves are vulnerable and subject to attacks.
CHIP checked antivirus software along with AV-Test. The result gives cause for alarm: in some cases, transmission channels are insufficiently protected, in other cases, manufacturers use unreliable program libraries. We'll show you which antivirus tools are worth recommending, how programs' defenses work and explain how you can best customize these tools.
Even if you use good anti-virus protection, you need to additionally use programs from other manufacturers. This way, you can effectively secure not only a stationary PC but also mobile devices - and at the same time, it does not matter if it is about Android or iOS.
This is how antiviruses protect
Modern antivirus applications not only protect computers from known threats but also offer tools against zero-day vulnerabilities. To do this, they use heuristic methods to constantly monitor the PC. But for programs to effectively control the system, they need extended rights.
It gets to the point that they can often control and change the OS to a greater extent than a registered user. For hackers, successful attacks on antivirus tools become the easiest solution, since through these tools they can immediately gain system access to the PC, as well as to deactivate the control function of antivirus monitors. total security software vendors fight these three anti-hacking features.
Secure Connection at Boot
The first level of protection is used already on the manufacturer's website. After all, antivirus developers no longer distribute their programs on DVD - they are mostly provided to customers as a package with a downloadable code. The advantage is that the user will always have the latest version. Some vendors distribute software over a secure HTTPS connection. The data transmission channel is encrypted, manipulations are practically excluded.
True, some companies still rely on insecure HTTP connections. In theory, in this case, hackers can intercept the data stream and slip the user into an unsafe, externally controlled version of the antivirus. AV-Test discovered such an unreliable download channel from several manufacturers. After seeing the results, the firms solemnly vowed to eliminate all deficiencies and expressed their intention to transfer data in the encrypted form very shortly.
Signature Only Updates
To ensure that only certified and signature-protected updates are downloaded to PCs for scanning files, antivirus programs use certificates, although not very consistently. With their help, the manufacturer signs individual software packages. When it arrives at the user's computer, the anti-virus tool checks the authenticity of the digital signature and installs updates.
Thus, unlawful updates are excluded. But this is done on the condition that the antivirus program works perfectly from the very beginning and has the optimal settings set by the manufacturer - unfortunately, very many applications do not meet these requirements. And you will have to act on your own - more on this on the following pages.
Hardware Protection at the Processor Level
Starting with Windows XP SP2, the Microsoft operating system supports Data Execution Prevention (DEP) protection, which runs directly on the processor. The principle of operation is relatively simple: the OS uses a special attribute NX-Bit (execution inhibit bit) for a specific area of memory where critical data is stored.
If some program, for example, when memory overflows, tries to use a processor register, DEP blocks access and sends information about this to the operating system. Today the technology is the standard, but despite this, not everyone uses it. DEP by itself does not provide 100% protection. Therefore, manufacturers use the function in conjunction with other technologies.
Memory overflow prevention software
To prevent hackers from guessing where critical data is stored in the computer's memory, ASLR (Address Space Layout Randomization) technology was developed more than ten years ago. In this case, programs receive their memory areas at random. ASLR was first used in Windows Vista. IOS 4.3 was the first among mobile systems, followed by Android 4.0. But ASLR does not provide a 100% security guarantee either. Using various techniques, hackers circumvent random distribution.
For example, through the so-called "spraying", the malware spreads throughout the drive. Thus, hackers provoke a memory overflow, thanks to which they can then perform their manipulations. So that this does not go so far, antivirus manufacturers try to ensure that only certified software is allowed on a computer.
Optimize Antivirus Programs
Especially for browser add-ons and update settings, you will need additional settings, since not all the functions of an antivirus tool are always useful for the security of your own system. Sometimes it is even better to completely disable an option.
Set an Optimal Time To Update
The effective protection of antivirus programs depends on timely updates. Security researchers assume that the publicity gaps have been actively exploited for hours. However, many antivirus programs run automatic updates only once a day, or even less frequently. Better to set the update frequency to 12 hours. This will suit most users. If you often visit unknown sites or install programs on the system, then this interval should be reduced to two hours.
Browser Toolbar
Most antivirus vendors install a browser add-on that controls the search process and the websites that are opened. The catch is that some of the web browser add-ons themselves are not reliable. Google security experts have found that, for example, the add-on activates special JavaScript APIs that are generally considered unsafe. Meanwhile, already has patches for the app.
In addition to security considerations, in the case of some add-ons, the issue of annoying ads is still acute for users - like, for example, It would seem that it is a good intention: this is how wants to show the user the most favorable online prices for products that the user sees directly in his browser using the SafePrice function. And here's what lies behind this concern for the user: with every click, the company makes money.
To alert you to dangerous sites, the tools scan all browser network traffic in the background. To enable programs to scan traffic from encrypted sites for viruses, the tools act as proxies, similar to middleman attacks. However, here, in the case of SSL proxies, security experts found weaknesses.
Among them, for example, is the famous explorer Tavis Ormandy. He considers the approach of antivirus vendors fatal since the use of proxies opens up additional opportunities for hackers to attack. And browsers themselves warn about dangerous sites - toolbars of anti-virus programs do not carry any additional protection.
Comments
Post a Comment