More bad news on malware: it knows where you hide the door key

Anti-virus products miss malware attacking via alternate routes

By  

In an August report on endpoint security, NSS found that most anti-virus products also don't identify attacks or exploits even after knowledge of them has been public for weeks or months.

Typically that means the vendor will add a patch to identify the first appearance of a virus or exploit, but fails to follow up with virus signatures that make it possible to identify variants or alternate attack routes for that flaw, the report said.

Here's the list of products tested:

  • AVG Internet Security Business Edition
  • ESET Smart Security Enterprise
  • F-Secure Client Security for Business
  • Kaspersky Business Space Security with Internet Security
  • McAfee Total Protection for Endpoint
  • Norman Endpoint Protection
  • Panda Internet Security (Enterprise)
  • Sophos Endpoint Security and Control
  • Symantec Endpoint Protection
  • Trend Micro OfficeScan Plus IDF Plug-in.

Kevin Fogarty writes about enterprise IT for ITworld. Follow him on Twitter @KevinFogarty.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question