It is almost impossible to get rid of a Hacker's k
Post# of 82672
In an article pasted below, they could not imagine and so cannot tell you that Hackers are now using software so sophisticated in reading what you type that they know when you are going to run an anti-virus program, after all the article was written in 2005. Why is this of important to us? Well the keylogging software that we have to deal with today can now execute a simple shut down and reboot using one of the thousands of IP addresses that it has in it's program files giving it the capability of never being caught by an anti-virus program again AS IT CAN SHUT DOWN AND REBOOT WITH A NEW IP EVERY 5 MINUTES OR 10 MINUETS, GET THE POINT?. (remember, anti-virus is dead)
And there is more !!! The hackers can install in your system a keylogger that can wall itself off on your hard drive. WHAT ??? Yes it is true. You can wipe your hard drive clean and reload the operating system and guess what, the spot that was walled off and where the keylogger is hiding ... well it did not get wiped and it simply reinfects your system. So if you work in the Medical community, buy a new computer from Best Buy and have to be HIPAA compliant, you have the computer wiped and install just the operating system. This needs to be done because the new computers come loaded with keyloggers. I had a tech work on my new computer as I was having issues with GuardedID working smoothly and after examining my computer he found and removed a number of keyloggers. Unfortunately he was unable to get them all and I contend with them to this day. I'm not worried though, I have GuardedID and it works fairly smooth now. So what do we all need to keep in mind ..... in order to be truly compliant for HIPAA, we would need to use GuardedID and or MobileTrust depending on the device in order to keep any and all of our information safe.
THE ONLY WAY YOU CAN PROTECT YOUR INFORMATION THAT WORKS ... IS TO USE STRIKEFORCE'S REAL TIME PROTECTION ... GUARDEDID AND MOBILETRUST.
This is why FirstData/BofA, DSS, AJ Gallagher and we are going to see more .... are all requiring the use of GuardedID and MobileTrust or EndPointLock as we know it from ACS. This is also why the Secure eTraveler Program is going to be a huge success.
Enjoy this old ARTICLE:
You Can’t Depend on Antivirus Software Anymore
Malware has become too sophisticated.
Enjoy the following old article and know that Hackers have come a long way since this was written.
In 2005, Panda Software reported that a new strain of malware was discovered every 12 minutes. In 2016, the cybersecurity company McAfee says it found four every second.
And those were just the strains the companies could detect. For malware—the umbrella term for parasitic software like viruses, worms, and Trojans that infiltrate and interfere with computer functions—hasn’t only proliferated: It’s evolved to better evade detection.
Faced with this tsunami of sophisticated malware, antivirus software like McAfee, once practically synonymous with personal cybersecurity, has struggled to keep pace. In 2014, a senior vice president at Symantec (the company that created McAfee competitor Norton Antivirus) went so far as to publicly say he thought that antivirus software was “dead.” At the time, he estimated that the technology only caught about 45 percent of cyberattacks.
Antivirus software is struggling to keep up because the primary strategy on which it relies—signature detection—is based on the outdated assumption that the malware you saw yesterday will look the same today. Generally speaking, when a cybersecurity company sees a new type of malware, it will analyze and create a detection signature for that specific strain. Like the immune system recognizing a pathogen it has seen before, antivirus software uses these signatures to scan files for known threats. This strategy worked reasonably well when viruses were mostly made by amateur hackers. But in 2003, according to McAfee, we saw the first real for-profit malware and since then, the growth of organized cybercrime has brought forth a series of innovations that allow malware to rapidly change its appearance. If the viruses of the early 2000s were the common cold, sophisticated malware of today is like HIV, able to change its protein coatings to avoid detection.
One of these innovations is a process called “crypting,” which allows a developer to transform the appearance of a piece of malicious code using encryption tools and test it against antivirus software until it is undetectable. Similarly, developers can also use polymorphic code to turn malware into a chameleon, capable of changing its appearance every time it runs. One 2013 analysis found that 82 percent of malware disappears after an hour, and 70 percent of malware only exists once. This short lifespan means just a small percentage of antivirus detection signatures—0.34 percent in one analysis—catch active threats. The rest just hunt ghosts. Though some companies have introduced new strategies to combat these adaptations, they haven’t been enough to fully keep up with fast-moving threats.
Despite its diminishing effectiveness, a startling number of users still use antivirus software as their first, or only, line of defense. According to a 2015 Google study comparing digital practices of security experts and nonexperts, 42 percent of nonexperts said antivirus software was among the most important steps they took protect themselves online. The response topped the list of measures taken by nonexperts, even ahead of “using strong passwords.” But, tellingly, it didn’t even crack the top five among those who work in the cybersecurity field.
This knowledge gap is significant and worrying, because modern malware attacks can be devastating. One type of attack that has grown dramatically in recent years is ransomware, which encrypts one’s files and holds them for ransom. In 2016 alone there were 4,000 ransomware attacks a day, according to IBM. As we store more and more personal information on our computers—home videos, photos, financial information—the cost of infection only grows. So how can the typical user keep up their cyberhealth in a post-antivirus age?
While the staggering progress of malware is frightening, comparing digital threats to infectious diseases provides some context to the risk internet users face. Each day, we all encounter millions of germs. Yet most of us stay healthy most of the time thanks to a combination of our immune system and preventive health measures such as washing our hands, exercising, and getting plenty of sleep. To preserve your cyberhealth, you must similarly strengthen your defenses by supplementing antivirus software (think of it as your imperfect cyber immune system) with a diversity of preventive digital tools and habits that can help keep malware and hackers from reaching you in the first place.
First, antivirus software can still play an important role. No matter how much you wash your hands, some infection will inevitably get through. While other security practices can help you avoid malware and prevent hackers from breaching your online accounts, no other consumer tool will recognize malware in downloads and emails. In 2013, Microsoft said that unprotected computers are 5.5 times more likely to be infected than those that run real-time antivirus protection. Most well-known brands provide both real-time monitoring and malware removal.
Premium products like Norton Security Deluxe, McAfee Total Protection, and Kaspersky Total Security may provide a higher level of customer service, but free products from brands like AVG and Avira provide a similar level of overall protection. While Windows users can use Microsoft’s native antivirus software, Mac users will need to find a third-party product (although Macs are generally at lower risk of infection due to Apple’s smaller market share). Whatever solution you choose, it is essential to turn on automatic updates. According to a 2014 study by Microsoft, having expired or out-of-date antivirus software is nearly as bad as having none at all.
With all its flaws, however, people need to take other steps to ensure a robust digital defense. This is the wash your hands, eat nutritious foods, and get enough sleep part that, like a parent, cybersecurity experts (and Future Tensers) like to nag users about. Among them: Install updates for all of your software—not just antivirus programs. In 2016, a Sophos researcher reported that nearly half of malware attacks involving Microsoft Office target a vulnerability Microsoft patched in 2012. Get a password manager. (If you are on a budget, it is better to use your limited funds on a password manager than on premium antivirus software.) Set up two-factor authentication, use unique passwords for each account, encrypt your computers and phones, and please, please create backups of your devices. Though these tools alone won’t keep you safe from malware, they will help protect your personal data should a virus breach your defenses.
Healthy digital habits also make a big difference for individual protection. The simplest advice for online safety comes via cybersecurity journalist Brian Krebs: First, if you didn’t go looking for it, don’t install it. Second, if you installed it, update it. Third, if you no longer need it, get rid of it! Mostly, use common sense: You wouldn’t eat a piece of candy off the ground. Yet in 2008, a U.S. soldier sparked one of the largest data breaches in military history by using a USB stick he found in the parking lot outside his base.
Antivirus may not be dead yet, but it’s probably time to call hospice. While this calls to mind the old joke that the best way to secure a computer is to pull the plug, giving up is not an option for most of us. If you haven’t previously taken your cybersecurity seriously, now is a great time to start. For the quantity and intimate quality of the information we trust to our devices is transforming our relationship to data. In some important ways, we no longer simply own our information. We are our information.
Zerify Inc (ZRFY) Stock Research Links
Never argue with stupid people, they will drag you down to their level and then beat you with experience.
Get .... PrivacyLok https://cyberidguard.com/
Try SafeVchat: https://cyberidguard.com/
My comments are only my opinion and are not to be used for investment advice.
Please conduct your own due diligence before choosing to buy or sell any stock.