2010年3月15日 星期一

FW: NEWSBANK: More Anti-Virus Fail


-------------------------------------------
From: Ivan Macalintal (RD-US)
Sent: Tuesday, March 16, 2010 10:54:13 AM
To: Ryan Flores (AV-PH); Paul Ferguson (RD-US); Eva Chen (CEO)
Cc: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail
Auto forwarded by a Rule


And more importantly in my perspective is the SPN "glue" that binds the three together.
 
And that special glue should not only be limited to the technologies behind the three, or to the binding technology behind SPN, but to all aspects and factors behind SPN (technology, organization, resource, etc..)
 
Just my 2c,

Regards,

Ivan


 


From: Ryan Flores (AV-PH)
Sent: Monday, March 15, 2010 7:50 PM
To: Paul Ferguson (RD-US); Eva Chen (CEO)
Cc: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail

If I am allowed my 2 cents…

 

SPN is the collaboration of our three areas of expertise: File Reputation, Email Reputation and Web Reputation.  If any of the three fails or “sucks”, then SPN is not performing well.  For me, the bottom line is, we need to be good on all three to make SPN the best.

 

Ryan R. Flores |  TrendLabs Forward Looking Threat Research    
TrendLabs HQ, Trend Micro Inc. 
Office: +63 2 995 6200 loc. 5280 | Mobile: +63 917 3291274     


From: Paul Ferguson (RD-US)
Sent: Tuesday, March 16, 2010 4:31 AM
To: Eva Chen (CEO)
Cc: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail

 

Mea cupla. :-)

 

-ferg

 

 

From: Eva Chen (CEO)
Sent: Monday, March 15, 2010 1:26 PM
To: Paul Ferguson (RD-US); Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail

 

Paul: very good sharing. But, just one correction, please, I had never said :”AV is Dead”, I said “AV industry suck, because we compete on something that is irrelevant to real customer problem, such as AV detection rate!”.

 

I actually also said:”Av is forever young industry”, so, AV will never dead, unless, we suicide by going to the wrong direction, and let hacker win all..

Eva

 

From: Paul Ferguson (RD-US)
Sent: Sunday, March 14, 2010 11:26 PM
To: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail

 

…and before anyone gets confused by that, allow me to explain.

 

I came to Trend Micro in 2006 in a wave of security professionals that *did*not*have* a background in Anti-Virus, in an effort to help Trend Micro move in a different direction – away from a sole reliance on AV technology to address the security threats in the “new” Internet.

 

We have been wildly successful – in most regards – but we have a *long* way to go.

 

As Eva as said publicly, “AV is Dead”.

 

Please understand what this means.

 

It doesn’t mean that AV doesn’t play a role – it does, but it is not a panacea. The threat are multifaceted, and that is the entire back-story into why we started the Smart Protection Network, not just as a story, but as a technology.

 

We in threat research have been working overtime to make sure that we (Trend Micro) succeed where everyone else fails.

 

$.02,

 

-ferg

 

 

From: Paul Ferguson (RD-US)
Sent: Sunday, March 14, 2010 11:18 PM
To: Joahnna Hipolito (AV-PH)
Cc: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail

 

Good thing we’re not an AV company, right?

 

-ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

From: Joahnna Hipolito (AV-PH)
Sent: Sunday, March 14, 2010 11:17 PM
To: Newsbank
Subject: NEWSBANK: More Anti-Virus Fail

 

http://www.informationweek.com/blog/main/archives/2010/03/more_antivirus.html;jsessionid=5IL4ZJYMXQFCRQE1GHPCKHWATMY32JVN?cid=RSSfeed_IWK_ALL

 

More Anti-Virus Fail

Posted by George Hulme, Mar 13, 2010 10:06 PM

By focusing on threats, rather than vulnerabilities, those who rely on anti-virus software to stop rapidly evolving attacks are simply asking for their systems to be owned.

If you're looking for a nail to drive into the coffin of traditional anti-virus software, you need to look no further than the latest report from NSS Labs which found that only one anti-virus application out of seven the independent testing firm evaluated caught multiple exploits and payloads that targeted the vulnerability used to attack Google late last year in the so-called "Operation Aurora" incidents. The vulnerability in those attacks was a flaw in Microsoft Windows Internet Explorer known as CVE-2010-0249.

For its testing NSS Labs created variants of the Operation Aurora attack and tested the anti-malware software to see which of the seven products stopped the exploits and malicious code payloads.

The tested applications include AVG Internet Security, version 9.0.733; ESET Smart Security 4, version 4.0.474.0; Kaspersky Internet Security 2010, version 9.0.0.736; McAfee Internet Security 2010 with SecurityCenter, version 9.15.160; Norton Internet Security 2010, version 17.0.0.136 (Symantec); Sophos Endpoint Protection for Enterprise – Anti-Virus version 9.0.0; and Trend Micro Internet Security 2010, version 17.50.1366.0000.

The only anti-malware application to catch multiple attacks aimed at the vulnerability was the McAfee product. Here's what NSS Labs had to say about their results in their statement:


Given the level of visibility of the attack and the time that has passed since its initial discovery, it was thought that most, if not all, of the products would cover the vulnerability. However, only one out of seven tested products correctly thwarted multiple exploits and payloads, demonstrating vulnerability-based protection (McAfee).

This afternoon, Vikram Phatak, CTO at NSS Labs discussed the testing and demonstrated the Operation Aurora exploit during the BSidesAustin event held at the Norris Conference Centers. "There are many ways to possibly exploit a vulnerability, and rather than focusing on every attack method, vendors need to focus on [shielding] the vulnerability itself," he said.

Makes sense, whenever possible, doesn't it? Why create specific shields to block every attack variant when it's possible to create one shield that blankets a vulnerability from all attack variants aimed at it.

NSS Labs full report and test results is available here.

 

沒有留言: