Defensive computing: Difference between revisions

Content deleted Content added
Line 20:
Anti-malware works by scanning files a network connections for known signatures. Those signatures can never be up to date. To be able to scan network connections, encryptions (SSL/TLS) need to be bypassed or even broken by anti-malware software. When monitoring emails anti-malware opens all attachments for analysis, a bug in this scanner can be used as a starting point for malware. Attackers just need to send malware to a mailbox that is scanned automatically.
 
It is questionable if malware scanners are even useful at all. Ex Mozilla developer Rober O'Callahan writes in his blog that anti malware software should be disabled (except windows defender)<ref name="nine">[{{Cite web |last=Robert |title=Disable Your Antivirus Software (Except Microsoft's) |url=https://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html https://robert.ocallahan.org/2017/01/disable|access-yourdate=2023-antivirus04-software-except.html] Disable Your Antivirus Software (Except Microsoft's)26}}
</ref>