https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: How Effective an Antivirus is & Maintenance of ANTIVIRUS

How Effective an Antivirus is & Maintenance of ANTIVIRUS

 

How Effective an Antivirus is & Maintenance of

ANTIVIRUS

The use of ANTIVIRUS is quite widespread on home computers and, on corporate computers, users are familiar with the updates that are periodically executed, but do we take advantage of all the possibilities that antivirus offers us? This article reviews the main characteristics of this type of protective 'software' that it is necessary to know to take advantage of all its advantages.

When are Antivirus born?

The history of antivirus is linked, of course, to that of computer viruses or 'malware'. Before the 1980s, there had been experiments with programs that could be transmitted automatically from one computer to another, but it is in this decade that the first viruses that erased data or rendered systems useless were created and released. Shortly afterwards, the first commercial antivirus appeared with the aim of protecting users. One of the pioneering companies was the German GData , which in 1987 created antivirus 'software' in order to safeguard Atari computers. And in the same year, McAfee released its first version of the popular Virus Scan 'antimalware'.

How does an antivirus work?

Antivirus has the main mission of detecting and removing 'malware' (or 'malicious software) from computers and devices before they have even infected the system.

For the identification of 'malware', the antivirus perform a continuous analysis that compares the files present in the computer's operating system with a database that contains the identifying characteristics (or 'signatures') of different examples of 'malware' found with anteriority. This database must be updated frequently with the signatures of the new types of 'malware' that appear every so often. Some antivirus also have the ability to detect threats by identifying patterns in files , locating system alterations and analyzing strange behavior of computer components.

Current antivirus therefore has two essential functions: to scan the files of the computer one by one for risks using the threat database and to monitor the device to detect any unusual activity.

Contrary to what you might think, having more than one antivirus installed on the same device is counterproductive. This is because one antivirus can mistakenly detect another as 'malware' and they can try to block each other, leaving the devices unprotected.

What threats does ANTIVIRUS defend us against?

Antivirus prevents various types of 'MALWARE':

·         The viruses are malicious programs that camouflages in user files. They are designed to access computers without the consent or knowledge of the users and usually aim to steal information, delete documents or change settings.

·         Computer worms are programs capable of executing and propagating themselves through the network, with the aim of collapsing computers and computer networks. One of the best-known worms attacked in 2000, infecting 50 million computers, causing losses of more than about 5,000 million Euros. It accessed the teams through an 'email' with the subject "ILOVEYOU" and included a file called "LOVE-LETTER-FOR-YOU. TXT.vbs ". When it was run on the computer, it ordered its forwarding to all the user's email addresses, in this way it was able to spread around the world in just 24 hours.

·         The viruses that we know as ’Trojans’ are a type of 'malware' that hides behind the appearance of a legitimate program that works correctly, but when executed, it grants the attacker access to the computer, even allowing it to be controlled remotely.

·         The 'spyware' is, as its name suggests, a program that is hosted on spy equipment and devices and can collect all kinds of information about you: your habits, your personal information, banking information, etc. One type of spyware is the 'key logger': a malicious program that installs itself on the computer or device and records all the keystrokes made by the user. It is a widely used technique to steal credentials.

·         The 'ransomware' is a type of virus that hijacks the information contained in the computer, encrypting the files, and asks its rightful owner for an economic amount in exchange for its release. The most famous 'ransomware' was launched in 2017, known as WannaCry. It infected thousands of computers in more than 100 countries and had costs estimated at more than 200 million Euros.

How can a computer or device be infected?

The most common method of spreading viruses today is email. It is enough for the user to download an attached file or to install a program that they have accessed through a link to infect their computer with malicious code. To evade this it is extremely significant:

·         Do not lower your guard against suspicious emails (from unknown senders, emails that are not expected, 'emails' whose content denotes urgency, which contains misspellings and strange wording).

·         Activate the 'antispam' filters for spam or harmful email and be especially careful if you are going to open an email marked as such.

·         Think twice before downloading attachments.

·         Make sure before clicking on links included in emails. It is preferable to hover over it to check the address it redirects to.

It is also easy to infect devices when programs are downloaded and installed that come from unofficial sources, that appear in pop-up windows or advertisements, or that are included in emails from unknown senders.

 

Another common way of contagion is the one that occurs when other external devices such as 'pen drives' or hard drives that have been previously connected to other devices, of which the origin is unknown or that have been provided by other people, are connected to the computer . And also the reverse: when devices are connected to unknown external sources such as public chargers.

How effective are Antivirus Software?

To datethere is no 100% effective methods that protects against all the 'malware' that circulates on the internet. Cybercrime is a very lucrative industry that evolves rapidly and forces antivirus to update their databases and reinvent their detection algorithms quickly to be able to detect new threats that constantly emerge.

Despite having an antivirus installed, it is necessary to continue to maintain safe behaviors and not lower your guard against social engineering attacks such as ' phishing ' –through email– or ' vishing' –which is executed through calls. Telephone numbers. In short, an antivirus cannot protect against the deception techniques used by social engineering.

On which devices is it advisable to install an Antivirus?

Every day users have more objects, devices and appliances connected to the internet, and therefore exposed to being infected with some type of 'malware'.

In addition to installing an antivirus on fixed computers and laptops, it is highly recommended to do so also on mobile devices such as smartphones and tablets, and on objects connected to the internet. There are already antivirus that analyze the data traffic of the home network of the home protecting cameras, 'SmartTVs', printers, consoles, etc.

Which Antivirus to choose?

There are many antivirus on the market, many of them are free and others are paid. The Internet Security Office has an extensive free antivirus analysis with a detail of its specifications to be able to choose the most appropriate one for the user's needs. Most of these free antivirus have a paid part that includes additional features such as password manager and automatic program updates , among other features. In addition, paid antivirus products do not include advertising.

On the other hand, the user can consult rankings of the best antivirus according to the results they have obtained in technical tests. An example of these rankings is the one prepared by the specialized magazine Virus Bulletin or the Trusted Antivirus Review website,  which also collects the opinion of users.

In case you need more generic advice on the maintenance of computers, tablets and smartphones, the American non-profit organization Privacy Rights Clearinghouse , offers a comprehensive guide on protecting privacy on its website .

And finally, what maintenance does an antivirus need?

The only maintenance that an Antivirus needs is its periodic updateNew threats in the form of viruses appear every day in many places on the planet and as soon as they are detected and analyzed, they are included in the antivirus in order to be able to effectively protect our computers, devices and objects connected to the internet.

In conclusion, antivirus programs are becoming more sophisticated and provide a very high level of security: they are undoubtedly the best ally for users to avoid 'malware' and its consequences. But let's remember that the first link in the security chain is still the person.

On the occasion of the International Information Security Day (DISI), which will take place on November 30, BBVA celebrates a week especially dedicated to raising awareness about the risks of the digital world.

No comments:

Post a Comment