February 21, 2011

Things just got much better and even more to come

We have taken a look at the way the most companies work with antivirus software today. We realized that it does not work. The fact is that Malware is produced at a faster rate then research departments can produce new signatures. In short, the current approach to antivirus detection and removal does not work.
More and more security experts agree on this.

We feel that it is time to go back to the drawing board and see how we can work to get better at our core business, namely: detecting and removing virus, spyware and malware. We need to be smarter, faster and more intelligent. To get there signature based detection is good, but not good enough. You need to combine it with other methods where 1+1+1 equals 4 or maybe even more.

The current version of digital defender will show you some of the interesting functionality integrated into the software, but much more will come. Go to www.digital-defender.com and download the latest version of our antivirus. You will see the first signs of how antivirus really should work.

February 16, 2011

Sorry for the absence but we have been busy

New releases planned. New programs in the pipeline. New functionality. Lots of interesting stuff going on. Stay tuned.

December 12, 2010

Some security issues in 2011 that we will be following

As the year comes to an end we summarize our learnings and look forward to new challenges in 2011. Some thing we believe will important issues in 2011 are:

Mobile Malware and the removal of it
The propagation of tablets and smartphones will very soon create a big enough platform that malware makers will start to target it. Also many people want to use their private tablets in company networks and this will post a further threat.

Social networks
Some companies encourage the use of social networks and some ban it. We feel that social networks can be a great way to communicate, but the potential to spread malware and other unwanted applications is very big. How to handle this on a corporate and private level will certainly be a big issue in 2011.

On a personal note
This also relates to a previous blogpost. USB-keys now are so small with such a big capacity that they look like normal keys and can fit 4GB data or more. The volume of data that can be transported and the potential accompanying threats they can contain can cripple entire networks.

2011 will be an interesting year in computer security.

December 01, 2010

Why signature based antivirus is going away

A representative from a large security company recently commented on the fact that most forms of antivirus software as we know it today will be rendered ineffective in the future. We believe this to be true as well. It is a well known fact that even the largest security firms in the world with huge research departments still can't keep up. What's the future then? One might ask! We feel that needs to be a change in the way antivirus software detect, analyze and remove malicious software. However which route the industry will take is yet to be seen.

November 30, 2010

Staying safe in the holiday season


The Holiday Season Computer Security Manual

The shopping season is arriving quickly and many people are getting more and more of their Christmas presents online. These are some good tips from our partner Virusbuster on how to stay safe online.

How to achieve a secure computer environment?

First of all, use an antivirus program! Viruses have become an unavoidable part of everyday computing. In order to combat them effectively, it's essential to have an antivirus program. But this is not enough. Every day, 20,000 to 30,000 new viruses pop up around the world. In order to remain protected, you should always use the latest version of your antivirus program, and keep its virus database updated.
Apply the following simple security rules to improve the effectiveness of your antivirus system, and to reduce the risk of infection!
  • Boot virus infections can basically be avoided by changing the boot sequence in your CMOS settings so as not to boot from a floppy disk primarily. In this way, booting will also be faster. Whenever you need to boot from a floppy disk, you can always reset the settings.
  • Before putting your floppy disks in an alien computer, make them write protected. If you have to write on them, check them with an antivirus program before using them on your machine.
  • Avoid the exchange of Word documents and Excel worksheets. Most macro viruses are stored in these files, and spread through their exchange. If you have to send a document electronically, try to avoid using the DOC or XLS formats. Convert your files into a format, which macro viruses cannot take advantage of, such as RTF for Word or CSV for Excel. If it is only text information that you need to pass on, TXT format can be the safest choice.
  • Enable macro virus protection in Microsoft Office 97 and 2000, and disable all macros, with notification in Office 2007's Data protection center. In this way, you will get a warning whenever the document you are trying to open contains macros. In Office 2000, set the level of protection to the highest in order to enable macros from reliable source only.
  • Never open e-mail attachments without scanning them! Save attachments first and open them only if virus scanning finds them clean. No matter how harmless an attachment may seem, and how close its sender is, do not trust it!
  • Infections by script viruses can be avoided by disabling the Windows Scripting Host. This script running component has been integrated into and is installed with the operating system since the release of Windows 98.
  • Set the security level in Internet Explorer at least to medium. This will block the running of dangerous scripts or ActiveX components.
Although they don't serve antivirus protection directly, the tips listed below will also help to keep your machine clean, and to maintain an efficient wok environment.
  • Hoaxes in e-mail spread almost as frequently as viruses. Most of them come from users with good intentions, who put all their contacts on the address line. However, in this way they generate nearly as much e-mail traffic as an e-mailing worm. In order to eliminate this mail volume, an organization should appoint one individual, or a small number of people as the only authentic source(s) of virus alerts. Of course only individuals knowledgeable in the field should be selected. They must be able to decide whether an alert is real or not. Whenever members of the organization receive a fake or real alert, they have to forward it to the appointed individual(s), who will then decide whether to pass it on to the whole organization.
  • Make backups of your valuable data regularly. Some viruses are designed to destroy data, while others may cause data loss due to programming errors or unexpected side effects. If you have copies of your data, the most that a disaster can take from you is the work you have done since the last backup.
  • Disable the Windows feature which hides known file extensions. This feature is abused by many e-mail worms, which spread using double extension file names. For example, Loveletter uses a .TXT.VBS extension, from which the system would hide the known VBS extension, making the worm appear to be a simple TXT file.