Signature-Based Antivirus Bypass Threats

Signature-Based Antivirus Bypass Threats

Antivirus (AV) software has generally been regarded by businesses as the best and simplest defense to keeping data and systems secure. That somehow, it is nearly unconquerable. In reality, while AV products are certainly a must-have in your security solutions suite, they do not provide 100% protection against threats.

Traditional signature-based antivirus software is fairly simple. It generally uses a database of virus signatures composed of previously identified viruses found in attacks. If signatures are detected within a user’s systems, they are blocked or quarantined, depending on the established rules. These lists are maintained by the security community, and whenever a new virus is discovered, the antivirus provider is informed, and a digital signature or hash of the virus is created and added to the database.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.