{"id":3816,"date":"2015-04-09T20:25:29","date_gmt":"2015-04-09T20:25:29","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3816"},"modified":"2020-12-16T12:36:27","modified_gmt":"2020-12-16T17:36:27","slug":"antimalware-technologies-terms-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/antimalware-technologies-terms-explained\/3816\/","title":{"rendered":"Antimalware Technologies: terms explained"},"content":{"rendered":"<p>Every security vendor has a portfolio of advanced \u201canti-malware technologies\u201d that make its products good and even better than all the rest. However,\u00a0sometimes it\u2019s useful to explain the exact meaning of certain terms, such as \u201cHeuristic analysis\u201d and \u201canti-malware.\u201d This post isn\u2019t meant to be an encyclopedia or dictionary; rather an attempt to explain the terms simply.<\/p>\n<p><strong>It used to be called \u201cantivirus\u201d<\/strong><\/p>\n<p>First, what is \u201cmalware\u201d? \u2013 It\u2019s the shortening of \u201cmalicious software\u201d. Years ago, it was\u00a0mostly \u201cviruses\u201d \u2013 a piece of code that makes your PC (or server) behave strangely, destroy data, or malfunction in some way.<\/p>\n<p>Virii are actually the old case. Even \u201cworms\u201d are, although ten years ago they were plaguing \u00a0the World Wide Web on a pretty\u00a0regular basis. They are still around, but hackers today rely mostly on other tools\u00a0\u2013 Trojans, backdoors (although there\u2019s a bit of confusion with this particular term \u2013 as explained <a href=\"https:\/\/business.kaspersky.com\/knocking-on-a-backdoor-whats-behind-the-graphic-cybersecurity-term\/2245\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>), exploits, etc. As long as those are the pieces of code, that\u2019s malware.<\/p>\n<p>Antimalware, or, rather, security solutions\u00a0<em>are actually\u00a0<\/em>both antiviruses, and <a href=\"https:\/\/business.kaspersky.com\/death-of-av\/1768\" target=\"_blank\" rel=\"noopener nofollow\">much more than that<\/a>.<\/p>\n<p><strong>What about technologies?<\/strong><\/p>\n<p>There\u2019s a handful of them today. The oldest is \u201csignatures\u201d \u2013 i.e. a signature-based method of malware detection. Imagine a police dog trained to sniff out drugs \u2013 she recognizes the smell of certain chemical compounds, even if the illegal substances are hidden in something quite odorous on its own (oranges, for instance).<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Antimalware Technologies: terms explained #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F1NvU&amp;text=Antimalware+Technologies%3A+terms+explained+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Malware pieces mostly have certain unique \u2013 signature \u2013 features by which they are recognized: ex ungue leonem. This method is computationally cheap and effective, but there\u2019s just one drawback: The signature must be already known. The dog must be already trained. A brand new unique malware never seen before would make the signature-based method stumble.<\/p>\n<p><strong>For such bad cases there are other aces<\/strong><\/p>\n<p>Since new malware programs today come in droves (325,000 new samples are detected per day), there are such wise things as \u201cHeuristic analysis\u201d, \u201cBehavioural analysis\u201d and \u201cAllowlists\u201d as the ultimate measure.<\/p>\n<p style=\"text-align: center\"><em>Check out our latest <\/em><a href=\"https:\/\/kas.pr\/4xT2\" target=\"_blank\" rel=\"noopener\"><em>\u201cHow-To\u201d Guide<\/em><\/a><em> to keep your business secure from cyberthreats.<\/em><\/p>\n<p><strong>Heuristic analysis<\/strong> identifies known malicious instructions rather than a specific code \u2013 a specific code of malware. Code may be different, but the nefarious deeds it performs are pretty much the same. So it\u2019s similar to\u00a0the signature method, but more advanced. This method allows detection of yet-unknown baddies.<\/p>\n<p><strong>Behavioral analysis<\/strong> monitors behavior of every piece of code and the way it interacts with the computer, tracking its activities across different sessions, as well looking at how it interacts with other processes on the computer. In the manner of \u201cI am the eye in the sky, looking at you\u201d.<\/p>\n<p>Finally, there\u2019s an ultimate way to block malware from getting in: <strong>Allowlists<\/strong>. It\u2019s not about marking the bad software and preventing it from launching. It\u2019s about branding all of the known legit software, and checking anything new against the known list of malware, and then putting everything that doesn\u2019t budge into either category, into the \u201cgrey area\u201d, which is then scrutinized using the aforementioned methods.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Good on their own, #security\u00a0technologies\u00a0best working together.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F1NvU&amp;text=Good+on+their+own%2C+%23security%C2%A0technologies%C2%A0best+working+together.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>And that\u2019s all?<\/strong><\/p>\n<p>Not exactly. There is also Vulnerability scanning, which does the good job of detecting flaws in the legit software. And it is indeed an anti-malware technology, since malware mostly exploits the errors whether they are popular or not, but still legitimate software.<\/p>\n<p>There are cloud-based <strong>Reputation services <\/strong>which\u00a0allow near real-time protection from newly-discovered threats. In simple terms, metadata about any program ran on a protected computer is uploaded to the vendor\u2019s cloud-based computers, where its overall reputation is assessed (i.e., Is it a known good, known bad, an unknown quantity, how often has it been seen, where has it been seen, etc.) The system operates like a global neighborhood watch, monitoring what is being ran on computers around the world and providing protection to every protected computer if something malicious is detected.<\/p>\n<p><strong>All together now<\/strong><\/p>\n<p>An efficient security system requires both a handy choice of antimalware solutions, as well <a href=\"https:\/\/www.kaspersky.com\/blog\/multilayered-defense-against-cybercrime\/15028\/\" target=\"_blank\" rel=\"noopener nofollow\">as other technologies and approaches<\/a> that allow businesses to stay afloat in the stormy sea of everchanging cyberthreats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every security vendor has a portfolio of advanced &#8220;anti-malware technologies&#8221; that make its products good and even better than all the rest.<\/p>\n","protected":false},"author":209,"featured_media":15711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[798,36,1083],"class_list":{"0":"post-3816","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-anti-malware","10":"tag-malware-2","11":"tag-technologies"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/antimalware-technologies-terms-explained\/3816\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/antimalware-technologies-terms-explained\/3816\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/antimalware-technologies-terms-explained\/3816\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/anti-malware\/","name":"anti-malware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3816"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3816\/revisions"}],"predecessor-version":[{"id":38106,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3816\/revisions\/38106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15711"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}