Premium Content

Access "Is it the end of the line for antivirus signatures?"

Published: 13 Oct 2012

One fact leaps out of the Symantec Intelligence Report for July 2011: The sharp rise in “aggressively polymorphic” malware delivered by email over the last six months. This form of malware adopts a range of techniques to disguise itself to avoid detection, even changing its code each time it starts up. “This new aggressive approach to distributing generic polymorphic malware on such a scale should be concerning for many businesses, particularly those who rely solely on more traditional security countermeasures, which this type of malware is designed to evade,” Symantec wrote in the report. The report’s author, Paul Wood, a senior intelligence analyst at Symantec, concludes: “Technology cannot rely on signatures and heuristics alone, and must also take into account the integrity of an executable based on knowledge of its reputation and circulation in the real world.” It is a problem that has been bubbling up over several years, but the surge in recent months is worthy of note. Polymorphic malware accounted for 23.7% of all email-borne malware intercepted in ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The IT challenges facing an independent Scotland
    CWE_160914_ezine_24p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, as Scotland goes to the polls to vote on independence, we assess the IT challenges the country would face. We look at...

  • How cloud is saving lives
    CWE_090914_ezine_22p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big ...

  • Security issues in Vanets
    Security issues in Vanets.jpg
    E-Handbook

    This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of ...