{"id":2064,"date":"2004-10-19T00:00:00","date_gmt":"2004-10-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/19\/traditional-anti-virus-cant-meet-new-threats\/"},"modified":"2021-12-30T11:40:34","modified_gmt":"2021-12-30T11:40:34","slug":"traditional-anti-virus-cant-meet-new-threats","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/19\/traditional-anti-virus-cant-meet-new-threats\/","title":{"rendered":"Traditional Anti-Virus Can&#8217;t Meet New Threats"},"content":{"rendered":"<p>The need to defend networked electronic gear like PDAs and smart phones will drive anti-virus defenses away from the signature-based techniques of today and toward next-generation behavioral-based tactics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The need for security is expanding beyond the PC,&#8221; wrote Jonathan Singer, an analyst with the Yankee Group, in an e-mail to TechWeb.  &#8220;Mobile devices such as smart phones and PDAs, which are often used for business purposes without security integration, are opening new avenues for malicious code,&#8221; he added.<\/p>\n<p>Early efforts by hacker to engage these devices were relegated to using them as entry points for viruses and worms delivered via e-mail, but as networked handhelds proliferate, tactics have changed.  As other devices become networked&#8211;such as printers and copiers&#8211;and as voice over IP (VoIP) hardware grows in popularity, they&#8217;ll be targeted too, or used to launch additional attacks.<\/p>\n<p>&#8220;Look for these types of attacks to become pervasive in the next 12 to 24 months,&#8221; Singer said.<\/p>\n<p>Behavioral-based anti-virus protection doesn&#8217;t rely on one-to-one signatures to match against known malicious code, but examines possible malware for characteristics common to viruses and worms.  Among their advantages are a theoretical ability to recognize unknown viruses&#8211;thus providing a defense against so-called &#8220;zero-day&#8221; attacks&#8211;less frequent updating, and smaller size.<\/p>\n<p>&#8220;In the next two to four years, anti-virus software will migrate from signature recognition to a hybrid of signatures and behavioral recognition,&#8221; predicted Singer.<\/p>\n<p>Enterprises should set policies on PDA and smartphone use, said Singer, to protect the network first, make handhelds productive second.<\/p>\n<p>http:\/\/story.news.yahoo.com\/news?tmpl=story&#038;ncid=1211&#038;e=10&#038;u=\/cmp\/20041020\/tc_cmp\/50500906&#038;sid=95609566<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":4551,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2064\/revisions\/4551"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}