Sign up to our newsletter
Don’t expect antivirus alone to protect you from everything.
Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but be aware that there is a lot of fake security software out there. This means that you need to take care to invest in reputable security solutions, not malware which claims to fix non-existent problems, or toolbars that are designed to divert you away from the sites you want to visit and towards the ones that generate revenue for adware providers.
That apart, even the best protection might not protect you as well as common sense and caution does: there is no silver bullet in protection in malware, which is why we always advocate multi-layering or defense-in-depth. Specifically, don’t fall for the “I can do anything and click on anything because my antivirus will protect me” trap. There seems to be a temptation for people to cluster at one of two extremes.
The danger in both scenarios is that the individual is tempted to substitute one partially successful solution for another. (Some marketing departments may overstate the effectiveness of a product, but that isn’t a problem restricted to anti-malware, or even the security industry!)
The trick is not to rely solely on one solution at all: a diverse spread of partially successful solutions may be more successful… However, note that word diverse. For most people, half a dozen antivirus packages on a single desktop machine is likely to cause more problems than it solves… By multi-layering, we mean using a diversity of product types: using multiple antivirus products may catch more specific malicious programs, but the increased detection may not be worth the additional strain on resources and risk of program conflicts, false positives and so on.
Please bear in mind also that malware gangs spend a lot of development time tweaking binaries so that they will evade specific scanners. The more effective a scanner is, the likelier it becomes that it will be targeted in this way. Of course, we monitor these tricks closely and enhance our own detection accordingly, but there is always a risk that such a tweaked binary will reach you before we’ve received a sample and updated our detection.
For this reason, we’re always grateful to receive samples of malware (or indeed false positives) that have evaded our products. For details on how to do this take a look here.
Author David Harley, ESET