Antivirus programs employ heuristic analysis in order to find previously unknown computer viruses or to detect new variants of known viruses. Heuristic analysis is often performed by antivirus software by running the suspect program in a virtual machine (a separate operating system installation within the normal operating system), allowing the antivirus program to see what the suspect program will do in a controlled environment before allowing the program to run on the user’s actual computer. If the program performs any actions normally associated with malware, the antivirus will notify the user. This is also known as file emulation (also known as sandbox testing). Antivirus software can also decompile the suspected program and analyze the source code and see if it matches any known source code of known malware. Constantly changing computer viruses pose a challenge for heuristic analysis as its success depends on finding a balance between false positives and false negatives. Security professionals are improving heuristic analysis to limit the number of false positives, which can sometimes identify and quarantine non-threatening files. However, it is very valuable to keep track of known viruses and investigate possible new ones using similar, but slightly changed or mutated code (known as variants). The identification of new variants and their removal by using a single virus definition is known as generic detection.
- dorrie on Bin Laden Story Brings an Abundance of Malware
- Sean Young on Warning: New rogue antivirus – ThinkPoint
- PC Tools on Top 5 Fake Security Applications in the 1st Quarter of 2011
- Mr Zoolook on The FBI and the Case of the YouTube Crazy
- Ringman on Top 5 Fake Security Applications in the 1st Quarter of 2011
Tag Cloudanonymous antivirus black hat SEO botnet businesses capacitors computer virus cybercrime cyberwarfare economy facebook fake av foreign hackers fraud google hackers hacktivism identity theft internet security koobface law malware online shopping password security phishing politics removal guide reports rogue antivirus scams scareware search engine poisoning SEO poisoning social engineering social media social media malware social networking spam tips trends trojan Twitter virus worm zeus