McAfee Artemis Claims Protection Online, On-the-Fly 107
Seems like McAfee has created a new Internet-based service to provide active protection on the fly when a PC gets hit by malicious computer code. "[Artemis] is a lot faster than traditional methodologies and it closes the gap between when a piece of malware is written, discovered, analyzed and protected against ... Artemis is available at no charge as part of McAfee VirusScan Enterprise or McAfee Total Protection Service for small and medium-sized businesses. Artemis is also available for McAfee's consumer products, where the functionality is called Active Protection."
This is why you read the fine print... (Score:5, Informative)
TFA basically states that anything behaving "suspiciously" on your PC will be automatically back to McAfee for analysis. There's no mention at all of possible privacy risks.
Sheezus.
This is why you read the preview. (Score:3, Insightful)
TFA basically states that anything behaving "suspiciously" on your PC will be automatically *sent* back to McAfee for analysis.
Re:This is why you read the preview. (Score:4, Interesting)
Re:This is why you read the fine print... (Score:5, Funny)
No, this is why *you* read TFA and summarize it for us. Real slashdotters can't be bothered, you insensitive clod!
Re: (Score:2, Insightful)
Sounds like a service for McAfee. This should speed up identification and protection for the customer, but ultimately, what if the customer doesn't want to participate in your R/D?
Re:This is why you read the fine print... (Score:5, Informative)
I've actually spoken with McAfee about this at length. If a suspicious file is found (not going into what is deemed suspicious out of professional courtesy) a fingerprint (hash) of the file is sent back to McAfee to see if it matches a known malware sample. If it matches, then the file is deleted or quarantined, or whatever the default behavior is. This only takes place if the malware doesn't trigger one of the other protection pieces in place.
There are settings in both the corp and home editions that let you decided if you want to send samples back to McAfee or just turn the feature off. It's a surprisingly cool thing to come out of one of the big players.
Re: (Score:2)
So if it isn't acting maliciously like a virus, but there are other reasons that it may be a virus and it may not, it gets a local scan and an individual scan from McAfee's private online database?
That's actually quite cool. It introduces a new level of threat rating between safe and deadly, and ensures that emerging threats are protcted against before needing to do a full local virus database update.
Re: (Score:1, Informative)
If only a hash is sent back to McAfee it seems like it would be trivial to code a virus (or other malware) that will go unnoticed. All you would need to do is add a few extra bytes in the file and fill them with random data when the machine is infected. Because the hash depends on this random data it is not likely to match another hash from the same virus on a different machine, so the virus will go unnoticed.
Re:This is why you read the fine print... (Score:5, Informative)
You're reinventing the wheel here. Viruses that did that were common back in the early 90s.
First, the more stupid AV programs would use a hash. The virus writers countered that simply by including an infection counter. The counter would increase with every infection, modifying the hash.
Then the less gifted AV program writers would hash just certain parts. The virus writers countered that by having the first instruction of the virus be a jump to where the virus was, and the actual virus block being moved at random within a bigger block whenever a new infection occurred.
So then the AV writers scanned for identifiers without looking at the location. The answer from the virus writers was to insert NOP statements at random inside the code, and shuffle these around at every new infection.
Incidentally, my own antivirus program (VScan) would in its deepest mode disassemble the code and emulate the actions of it without executing it, to see whether the result of the code would perform certain actions which only OS routines and viruses would ever do. This foiled some attempts at stealth, like adding numbers to generate an offset, or mutating the registers being used, and also allowed for finding new viruses that used the same techniques but not the same code as older viruses.
Then came XOR'ing the virus, then self-extracting compression, then actual encryption -- and the race is still on.
Re:This is why you read the fine print... (Score:4, Interesting)
Couldn't they just send the list of hashes of malware to your PC and it could be checked locally? It would be a long list and always growing, but not growing fast enough to put any kind of burden on a PC's memory or network capacity. (Suppose 100 new bad programs are identified every day and you need an SHA-256 hash of each one: that's still only about three kilobytes per day.)
The only way their system makes sense is if you send the whole lump of code back for analysis, not just a hash. A hash can just as well be checked locally.
Re: (Score:1)
I believe they call this virus definitions files and yes they do this already.
Re:This is why you read the fine print... (Score:5, Insightful)
But a fingerprint used as a unique identifier isn't safe. What's the guarantee that MacAffee won't keep rainbow tables of everything that has turned out to not be viruses, but someone else might find interesting?
What stops e.g. the government or MPAA (but I repeat myself) from demanding to be told of everyone who have files matching a certain fingerprint? The first justification for this might be child porn. How about fingerprinting all known child porn images, and have the AV software notify the servers whenever there is a match? Undoubtedly that will be very effective! No pesky 4th amendment considerations either!
Then, once it's used for that purpose, how about fingerprinting word documents describing how to make pipe bombs? Undoubtedly useful. And how about the communist manifesto? And, since it works against browser caches too, why not check who has browsed a certain page?
I'm sorry, but I see a lot of problems with this.
Re: (Score:1)
I believe Blizzard's anti-cheating component for WoW did the same thing. People defended "it's only a hash," but there are a lot of static files/programs out there which could easily be hashed and identified. For example: MPAA could just go to Pirate Bay and hash all media files, as you noted. Too much room for abuse. There is no need to send the hashes across the internet.
Re: (Score:1)
$ steg-media-injector popsong.mp3 /dev/random 12%
... or something like that should do the trick.
Flawed methodology (Score:5, Insightful)
Using anti-virus to "protect" your computer is like trying to avoid collisions by studying your rear-view mirror. By definition, it only "catches" compromises AFTER THEY ARE SUCCESSFUL.
Then, we have to trust that:
1) The compromise is one of the known viruses, or falls into the realm of "suspsicious activity".
2) The compromise was successfully noticed.
3) All aspects of the virus are known and can be removed.
4) You (the end user) have sufficient system permissions to remove the virus.
5) You (the end user) have all updates applied.
The whole system is woefully fragile and ineffective. Most estimates today seldom put A/V effectiveness above 50% effective, despite the considerable resources consumed by the software. It may be better than poking yourself with a sharp stick, but not by much!
And here's a good example of this: My kids' computer. It's an Athlon XP 3400 with a GB of RAM and an 80 GB HDD. I got sick of reloading the !@#@$ computer every 3 months when it got all horked with god-knows-what so I did the nasty, this time.
I installed ALL O/S patches while hooked up to a private network. I installed AVG antivirus. I let the kids only use the computer as the most limited user available: guest. I installed FF and made it the default browser, along with Open Office and a few legal games. (not warez!) I set WinXP to self-update every single day, and not ask about it. The Windows firewall was on, and the computer is on a NAT network, connected to another highly firewalled DMZ.
Despite all this hassle and inconvenience, the system is STILL behaving rather poorly, 6 months later. Bought me 3 months, but only three more.
Compare/contrast with the Mac. Same kids. Same amount of usage. Same type of usage for the same purposes. Blogging, MySpace, games, homework. All else the same, but I never bothered with antivirus. Yet it works fine! No bogging down. No strange behavior. Same thing with my Linux laptop, which after some 10 years is still using the same /home partition.
Good security isn't something you "band aid", it's something you design from the beginning.
Re: (Score:1, Insightful)
Bullshit. You must be a retard if you trust anything your kids say. They may be surfing the same sites, but they're downloading and executing ZOMG U MUST SEE THIS!!1 shit on the PC which isn't compatible with any other OS.
I haven't seen a virus on my PCs since my 286, which came preloaded with them, and my own deliberate HPAVC collection from the BBS days.
Re:Flawed methodology (Score:5, Interesting)
Here here.
I usually run on a DMZ. No firewall local or at the router.
I even have a dynamicDNS directed to my main computer.
I scan regularly. And haven't been infected in over 8 years. (which was my fault for opening an attachment without thinking.)
My current windows install is about 2 years old with LOTS of use. The computer is 5 years old and it's time to junk it. It's also still suffering from a 4 year old Norton uninstall that seems to have never completed and is getting worse. Norton was the worst thing that ever happened to one of my computers and I still haven't completely purged it.
What junks up my Windows PCs aren't the illicit viruses that get installed without my permission. It's all the crap that comes along with little freeware worthless pieces of crap that I need to use once to convert some file or another.
Windows PCs and Macs get used very differently. Having run both of them I used them very differently myself--largely because there just isn't the world of little crappy apps available.
I'm with parent. Your comparison is apples to oranges.
Re: (Score:1)
Norton actually has a "Removal Tool" for peeling their crap off a system.
http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 [symantec.com]
It knows about all the regkeys, services, and files their various products employ. Might be worth a shot.
Re:Flawed methodology (Score:5, Interesting)
He's not trusting what his kids say, he's seeing the results for himself. And who cares what his kids download? They had limited user accounts, it SHOULD NOT HAVE MADE A DIFFERENCE what they downloaded.
Some windows users love closing their eyes to the results and stammer and sputter about marketshare and all that crap - but the fact is that Windows has more attack vectors for whatever reason. Like your parent said, security is a bandaid on windows, not built in. I don't know the entire reasons for that, I heard that in unix, services run as a normal user account, sandboxed away from causing damage while in Windows many services run as root - meaning only one has to be compromised for something malicious to gain control.
There are probably other reasons and the OP may have well talked about Ubuntu instead of a Mac -- but your sample size of one is unconvincing from every angle. You're obviously not the average computer user, nor do you anticipate the truly stupid shit some people do and how kids play with their computers.
Running as root would be just as stupid (something Ubuntu does not have one do by default but I believe Mac does?) but having extensive contact with the administrators in my old school - they let the macs be while the Windows based systems are set to be reimaged every night simply because it's too much of a pain to keep Windows clean for more than a week among groups of students. Default UAC in Vista might have finally changed that, but their machines still run the cheapest form of XP (without UAC) and it also does not get rid of the services issue.
Re: (Score:3, Interesting)
What does limited user accounts have to do with anything? User separation protects users from each other and the system from users but it doesn't protect the user from himself, on any desktop OS.
It was built in from the beginning in the NT line. The security system in the kernel is better than any other desktop systems, it's only in userspace that
Re: (Score:2)
"Linux is "immune" because installing software that didn't come from the vendor's own repository is basically impossible for normal people. Hell, most users probably couldn't figure out how to make anything they download executable. That will change if/when Linux gets popular - users will demand the ability to use 3rd party programs."
Linux has this capability through a recent innovation called a "package management system." A recently development is RPM, which is less than 20 years old. In fact, most web
Re:Flawed methodology (Score:4, Insightful)
Right... we'll talk about this again when Myspace is full of RPMs and DEBs.
Users will enter passwords on command like good little trained monkeys, so nothing has changed.
Password protection only saves you from, eg. browser exploits installing backdoors without your knowledge. Most Windows malware/crapware is installed deliberately at the request of the user, no raindance or blood sacrifice ritual can stop that without turning "their" computer into a black box appliance.
The OP already said they were running as Guest, so that's precisely what happened.
You can install standard RedHat RPMs into your own home directory? And find/install updates automatically, resolve dependencies in your private space, etc? Awesome!
Regardless, it seems we've now established that running/installing software as a normal user, in areas writeable by normal users is acceptable, right? What kind of brain damage is preventing you from seeing how this is not more than enough access for malware/crapware mischief?
Run me through your thought pattern, because I can't understand where you're coming from and how you can possibly you arrive at a non-exploitable conclusion. As far as I can tell, it goes like this: user downloads omgponies.rpm from Myspace and either installs it to ~/omgponies or enters the system password for a root install. The first thing it does is run a post install script which then inserts spyware, crapware toolbars, or whatever into every dotfile orifice in the user's directory, or for a root install every damn where. User doesn't even have to run the program that was in it.
Right? Congratulations, welcome to having an operating system that someone other than nerds gives a shit about. How is this different from what is happening on Windows?
Privilege separation is a red herring on the desktop - administrative access is simply not necessary for most crapware to function. The main reason to run as Admin is purely defensive, to disable anti-virus and/or install hidden drivers, etc. so that the user can't get rid of it, rarely is Admin actually needed to perform its primary purpose. And should it ask for the Admin password, the user will supply the password because you, oh Lord of the System, have been training them to do it.
Complete bullshit.
Have you even used Windows in the last 10 years at all? Especially in a corporate environment, Windows' security features are substantially better than other desktop OSs, the only issue is actually implementing them. Few will, because users scream bloody murder when they're told "you're not allowed to do that any more." But replace Windows with Linux and tell them instead that "it's not compatible," they'll accept it.
Re: (Score:2)
Thank you. This kind of comment is spot on.
While technically all desktop operating systems have technically equivalent security, there are cultural differences. You allude to them yourself: users of other systems are more likely to accept programs that break when upgrading. Windows users, on the other hand, expect backwards compatibility at almost any cost, and in accommodating them, Microsoft has left security holes open. (Also, security patches tend to be pushed when available for other operating systems;
Re: (Score:1)
Re: (Score:2, Informative)
Running as root would be just as stupid (something Ubuntu does not have one do by default but I believe Mac does?)
What Macs and newer Linux distros, Ubuntu included, do is make the first user created on the system a "computer administrator". Only such a "computer administrator" can install software outside the home directory or change system settings and all such activities are password prompted. Unless that password is supplied for administrative actions, these users have no more privilege than regular
Re: (Score:1)
A nasty could run in the background as that user and silently sniff for that password
gksudo 'grabs' the keyboard- no other programs can get the keystrokes. You could, however, make an imitation dialog that takes the user's password, and then uses it to sudo.
Only windows let you do it. (Score:4, Interesting)
Bullshit. You must be a retard if you trust anything your kids say. They may be surfing the same sites, but they're downloading and *executing* ZOMG U MUST SEE THIS!!1 shit on the PC which isn't compatible with any other OS. {note:emphasis mine}
Yes, you have a point about the "compatible" part. But you missed something fundamental.
The major flaw that the parent wanted to point is that, because of the sloppy design of Windows XP (partly inherits from its NT ancestrors which had some privileges restriction but never really used it, partly inhertis from its DOS/Win9x inspiration where every software does whatever pleases it),
you *can* download and execute code trivially in the first place.
In Linux, downloading and executing random bit of code isn't trivial, on purpose. Before executing, the use must first manually grant execution rights to the piece that was downloaded (i.e.: "+x" chmod isn't activated by default), and then, the code only runs with the privileges it inherits from the user (non administrative privileges. All the juicy bits like sending raw network packet, deploying a root-kit, etc. aren't accessible).
The only real canonical way to install a software in Linux is going through the package manager and install it from one of the (trusted) repositories. (you can "apt-get", "yum", "YaST", etc. to install additional software)
in short : in linux, you can't download and run a random exe. you can only install an exe from a repository, otherwise you have to do special steps (downloaded material isn't runnable by default).
in windows every idiot could download and run whatever at a simple click.
only the most recent version Vista has an UAC that asks the user to confirm its intent to run foreign code. But, most users either disable UAC because it's too bothersome, or have developed a spinal reflex to "Ok-Yes-click-thru" any thing on the screen as a habit they got from all the repetitive "cancel or allow ?".
Re:Flawed methodology (Score:5, Funny)
Good security isn't something you "band aid", it's something you design from the beginning.
Yes, but that still doesn't work. You'd have to remove the human element. Enough nuking from orbit should remove both the virus creator and the hapless user, so as long as you protect the actual computer from the EMPs during the bombardment that's probably the safest way to go.
Re: (Score:1)
You need to look into Windows Steady State. In combination with some additional storage on another drive or thumb-drive so the kids can store their personal data, your burden will be significantly lessened.
Windows Steady State. Check the show notes over at www.grc.com, Steve and Leo did a show on it.
Re: (Score:3, Funny)
"By definition, it only 'catches' compromises AFTER THEY ARE SUCCESSFUL."
So if I download "leetwarez.rar" from the intertubes and my AV program flags it as a known trojan, at which point was my system compromised? Was it BEFORE or AFTER I didn't run the infected program?
Re: (Score:2)
The only reason your AV program flagged it was because somewhere, some computer was already infected with it. By relying on AV you're just relying on luck - being lucky enough to only be exposed to bad things a while after the AV company found them.
Re:Flawed methodology (Score:5, Interesting)
I'm pondering the following set-up:
This allows various cool stuff: incoming HTTP and IMAP connections could be scanned with ClamAV, for example. What would be really great would be to just discard changes to the main VB disk image at the end of every session. Obviously user docs + data would be somewhere else, and could potentially get infected, but that's a lot less data to periodically virus scan, or to restore if anything does get in to it.
Preliminary tests suggest that virtualized windows without on-access scanning runs quite a lot more smoothly than a bare-metal install does with it. The added bonus is that I can ssh into the underlying Ubuntu system and do admin with the rather richer toolset available there than on Windows (though greater personal familiarity with that toolset is also an issue, I admit.)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
I have some of the world's dumbest users, who click EVERYTHING, and try to install any smiley/weather/junk they get their hands on. They are set as limited users and the machines they use last years without reimaging. I honestly dont know what youre doing wrong. Perhaps your kids are outsmarting you by logging in as administrator behind your back or you didnt do a proper reimage between infections.
Re: (Score:3, Insightful)
Nor do they mention the extra bandwidth that will be used with their 100 ms updates.
Not only so, but the Wall Street Journal version of that story mentions that other malware services companies will be implementing similar models as well.
It just reminds me that the real problem is the current Microsoft hegemony on the desktop and uninformed internet users.
Artemis is available at no ADDITIONAL charge (Score:5, Informative)
"Artemis is available at no charge as part of McAfee VirusScan Enterprise or McAfee Total Protection Service for small and medium-sized businesses."
I guess enterprise editions don't come at no charge.
Re: (Score:1)
Re: (Score:1)
I guess you didn't quite get that part?
To me it means something totally different. Some products you can buy to get the base products, but if you want more advanced features you have to buy those advanced features. But in the case you already the added protection at no extra cost to you.
ugh. (Score:5, Insightful)
Re:ugh. (Score:5, Informative)
What could go wrong?
Re: (Score:2)
Yeah, I don't get it either... Slashdot is a non-profit organi... oh wait
And I bet... (Score:5, Funny)
* Requirements in Vista may be higher
Re:And I bet... (Score:5, Funny)
...it'll only take 128MB of RAM and 30% of your processor!* **
* Requirements in Vista may be higher
**Home users and other non-enterprise users may need to sacrifice a goat for acceptable performance. Please send Proof of Sacrifice to:
3965 Freedom Circle
Santa Clara, CA 95054
USA
In the event that you cannot supply a Proof of Sacrifice: Please wait for Earth to acquire a second moon and we may let your browser connect to websites, in which case you can find more about our alternative methods.
Re:And I bet... (Score:4, Interesting)
And what percent of your monthly data transfer allowance?
Re:And I bet... (Score:5, Funny)
* Customers may opt out of this offer by finding checking the disabled checkbox that says "opt out" on the hidden page on our website. WARNING: If you somehow manage to opt out, we'll take it personally.
(I'm just waiting for the day my account gets automatically upgraded to the point where it starts automatically buying shares in McAfee)
Cool ... addvertising (Score:3, Funny)
G
I guess this is the new "cool thing" (Score:5, Informative)
F-Secure Deepguard: http://www.f-secure.com/deepguard [f-secure.com]
Threatfire: http://www.threatfire.com/ [threatfire.com] (recently acquired by Symantec... so they are in the game now)
DriveSentry: http://www.drivesentry.com/ [drivesentry.com]
Prevx: http://www.prevx.com/ [prevx.com]
They *don't* do online analysis (Score:3, Insightful)
If enough is known about how the malware is behaving to know that it is suspicious, [we will] fingerprint the file and send it in the cloud to AvertLabs so we can look at it, provide people a piece of protection and send it immediately back to them.
They only match the fingerprint (probably a set of some hashes) against an online database and, if there is a match, the "fix" for that malware is downloaded and executed.
Nothing "magic" here, it's just an online signature database.
See http://www.mcafee.com/us/enterprise/products/artemis_technology/index.html [mcafee.com]
If they actually *did* online analysis, as the article suggests, just sending the alleged malware would potentially violate copyrights/NDAs/etc.
Not to mention that automated online analysis of unknown malware is a very difficult problem [wikipedia.org].
Re: (Score:2)
Tell me about it. Ya know there's some idiots who think you can optimize computer programs automatically [wikipedia.org]? Crazy I tell ya. Don't know why they waste their time.
Ummm (Score:2)
"If enough is known about how the malware is behaving to know that it is suspicious, [we will] fingerprint the file and send it in the cloud to AvertLabs so we can look at it, provide people a piece of protection and send it immediately back to them," explained Marcus. "We've been analyzing malware for a long time so we know how it acts."
Send it "in the cloud". WTF does that mean? "Internet" maybe. What a sales drone.
"Send it immediatly back". WTF does that mean. I guess their version of "immediate" m
Re: (Score:2)
Online, on-the-fly protection by Artemis ... (Score:2, Funny)
... sounds like divine intervention to me :)
Close your eyes, praise the Gods, offer them some CPU cycles. If you're a man of moral virtue, don't tackle Eros too much and make your annual trip to the oracle (not the false ones, those that accept VISA), nothing bad will happen!
*runs in sandals with money clinging under his robes*
hmmm (Score:3, Interesting)
Active protection, as in - running "fixes" locally automatically downloaded from the InterTubes? Throw in a pinch of DNS poisoning or muxed up routes and you've got yourself a perfect rootkit injection system with the piece of protection and [sent] immediately back to them! Yeah!
Re: (Score:2)
I suppose any company stupid enough to attempt to build antivirus in the first place might be stupid enough to not know about encryption.
Except that I don't think they're actually stupid, just opportunistic. I seriously doubt they wouldn't at least sign them.
Re: (Score:2)
But not through "a pinch of DNS poisoning or muxed up routes".
Antivirus software is bullshit (Score:4, Interesting)
when a PC gets hit by malicious computer code.
A PC doesn't "get hit" by "malicious computer code" too often these days. The target unintentionally (but by their own action) runs malicious code because they're ignorant. Even running Windows (patched w/ firewall) there aren't many ways you can get pwned without clicking on the "RUN VIRUS NOW" button (admittedly recognizing the ways that button can masquerade itself is a skill.)
Trying to protect people against themselves is futile. Antivirus software is like the Maginot Line [wikipedia.org]. It only works against shit they're expecting.
There's no substitute for educating computer users about what's not to be clicked upon (and/or run as root.)
Re:Antivirus software is bullshit (Score:4, Informative)
You think you can educate the user(s) to remember to always hold down shift when inserting a CD/DVD? Yeah, good luck with that.
Re: (Score:3, Interesting)
Or you could, y'know, disable autorun. It's not particularly difficult. (Not particularly easy, either -- at one point, I could only figure out how to do it via the Registry. But not difficult.)
Now, it might be worth it to have a piece of software (a script, really) that ran around a Windows install and tightened up security across the board -- turned the firewalls on, set passwords, disable autorun, install Firefox, grab updates, etc.
While it's at it, it could tune you up -- enabling Hibernate is about the
Re: (Score:2)
Good and useful information -- thanks!
And I don't think that the "common denominator" argument holds -- in many ways, people find OS X and even Ubuntu to be more intuitive than Windows -- even when you consider that too often, "intuitive" means "just like Windows, because I already know that." But OS X and Ubuntu both come more secure out of the box than really any Windows desktop OS other than Vista. (I haven't used enough Vista to be sure, and I don't want to.)
I think that the only part of this that cause
Re: (Score:3, Informative)
That's wrong, not informative. Any modern Windows OS (XP SP2, Vista) pops up a box asking what you want to do when you insert the disk (which includes the option "Run the program"). It will not, however, automatically run anything.
Re: (Score:2)
Re: (Score:2)
No, no it can not.
Re: (Score:2)
[autorun] open=Autoplay.exe -auto icon=Autoplay\resdata\install.ico,0
With an out-of-the-box default installation of XP pro SP 2, this will bypass all user interaction.
Re: (Score:2)
Now try that on Vista.
Re: (Score:2)
Protecting people from themselves isn't even really all that hard, all you do is take away all their power.
Now, politically and philosophically, I'm a freedom lover. I want people to be free to make their own mistakes, free to try new things and free to fail or excel, but when it comes to users of my network, I'm an iron fisted tyrant. No installing. No visiting websites that we haven't pre-approved. No you cannot use your flash whatchamever. Works out pretty well actually.
Maybe I should set up a business f
Big Brother gets to examine all your files (Score:5, Insightful)
Here's McAfee's explanation of how it works [mcafee.com]:
In other words, every time you download a binary file, McAfee HQ knows about it and logs it. Was this dreamed up by the RIAA, the NSA, or the anti-child-porno people?
Re: (Score:3, Interesting)
In other words, every time you download a binary file, McAfee HQ knows about it and logs it. Was this dreamed up by the RIAA, the NSA, or the anti-child-porno people?
All of the above. The submissions will be spidered so the users will receive targeted ads from relevant lawyers to help settle the lawsuits.
Re: (Score:2)
If the "fingerprint" is a cryptographic checksum, you should be fine -- though you're still trusting McAfee's servers not to just start randomly quarantine-ing your good files with the bad ones.
Knowing McAfee, I wouldn't be surprised.
Re: (Score:2)
If the "fingerprint" is a cryptographic checksum...
That wouldn't be useful. Most modern attacks have at least some variation from copy to copy. "Polymorphic" viruses vary considerably. That's why signature-based recognition doesn't really work any more.
Re: (Score:2)
1. you can turn it off
2. do you know a better way to do it? Signature detection is long broken for vx, and anomaly detection has been inevitable, but held back because of much larger chances of false positives.
The code is running on the clients. Anyone who feels like it can check out what files are being reported back, and what files are not. If it starts reporting things like movies etc, you can be sure that plenty of people will be on top of that quick, and then mcafee is fucked.
It seems more like seti
Re: (Score:2)
I take it the point of all this is to catch zero-day exploits?
How about a better approach like having the client AV software update its definitions more frequently like every hour? On my mail servers I update ClamAV hourly now. Of course that means McAfee would need sufficient server resources to handle those requests, but how much did they spend developing this intrusive approach? And how much traffic will it generate if it sends a hash of every ZIP downloaded by McAfee users every day?
Sorry, but I'll p
Re: (Score:2)
If the virus signatures were distributed in a way that minimized server resource conosumption the frequent updates might not be a problem.
The trick is to only transmit changes - not the whole database.
You could even have realtime updates - clients register with a server and get a call-back when a new definition is available.
So what are we to take from "Artemis"? (Score:4, Funny)
If your computer is infected by a virus, it prays to be shot by one of Artemis's silver arrows so that it may die a swift and painless death? Is that it?
Artemis (Score:2)
This may go over the heads of non Eoin Colfer readers
Bwahahaha (Score:2)
McAfee needs to get their shit together for plain old virus scanning before they start talking about a technology that's "a lot faster than traditional methodologies." The last time I used their scanner it failed to pick up multiple 2- and 3-year-old trojans that were in my BugTraq mailing list attachment directory. Two other virus scanners had no issue. Yay, Artemis can overlook malicious code twice as fast as the competition!
The only AV suite worse than McAfee is Norton.
gone in 60 seconds (Score:3, Informative)
Really can they do that? Code Red (admittedly a worm not a virus) took what, 8 minutes, to do most of its propagation. I don't think they can do anything useful in terms of speedy. Getting out the defs a few days faster protects me from 20% more viruses. That's about meaningless. Unless you're going to knock it down a few orders, you're not helping the situation very much.
Bloat (Score:1)
I wonder how much bloat it will add? I was a loyal AVG user for years until 8.0 - bloated, and that phishing thing it adds to Google searches is annoying and SLOW (I disabled it, but then I get a warning icon saying my computer may not be safe or something). I switched to Avira at that point.
What a timely announcement (Score:4, Funny)
Spore comes out today: perfect timing!
At last I can install EA games [wikipedia.org] with confidence! And perhaps play a music CD from Sony [wikipedia.org]!
Anti-malware is losing, but malware isn't winning! (Score:2)
"If you talk to the anti-malware vendors, they are losing the battle," said Quin. "Not that malware is winning, but they can't keep up with the volume anymore."
Isn't that the definition of malware winning?
"spending karma for community feedback this time." (Score:1, Offtopic)
Re: (Score:2, Insightful)
It's a dirty job, but someone has to do it.
Re: (Score:1)