研究人员为了防止威胁实施控制措施

2013/10/09

Control measures malware is in full swing, researchers are trying to develop anti-spam tool, in addition to other programs can also help them avoid threats. An attacker is more complex than ever before, the recent ADOBE hacker is an example, they not only get to over 2 million user profiles and passwords, credit card and debit card details, but also to steal a variety of primary products company has the source code. Experts believe that when they visit the source itself, they can actually create all types of notorious malware, and difficult to detect, because they look like legitimate ADOBE product, users will regularly use them.

Earlier, companies rely on static analysis of binary code to detect whether there is malicious software. Spam is another issue, has been anti-spam software solutions under control, but the attackers become more sophisticated in this day and age, they are easy to circumvent security measures into the core areas of the computer to upload their malicious code. Sometimes such behavior is a very subtle way, people who use computers hardly know it has been infected, continue to take their daily work non-stop. The proposed solution against such use is very complex, the authors write different code and create more programs to attempt to exploit the vulnerability, almost every set of codes have been lost in the malicious software in the hope that one or other help to eliminate it. Automatic analysis no longer effective because the attack was designed to avoid such subtle measures.

Like how companies create antivirus software and anti-spam tools and sold to users are better protected as a well-trained attackers are developing malware development kits continue between developers and attackers come up with new attacks package, bypass vulnerability. The hardest part is to be like a legitimate company, these sellers also released patches and fix the code, whenever a particular vulnerabilities to be repaired will be to continue to provide customer support. This service is provided rogue developer and familiar typical security settings. Measures to counter the ongoing fight against the virus, will soon begin to protect users.

Write a comment

Name
Comment