This relies on the user *always* making the right decision. An impossibility!https://twitter.com/taviso/status/708719788302831616 …
-
-
@zh4ck@ryanaraine All av is about equal in how good it is at doing it's job, and how bad it is at enabling trivial remote root. -
@zh4ck@ryanaraine That's what I mean by "you're missing the point".
End of conversation
New conversation -
-
-
@taviso@zh4ck@ryanaraine you don't need an AV to enable targeted attacks. -
@taviso@zh4ck@ryanaraine a really advanced actor will have an RCE 0day against any of the popular products + an EOP for your OS. - 2 more replies
New conversation -
-
-
@taviso@ryanaraine more than 99% of the attacks are opportunistic untargeted attacksThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@taviso@ryanaraine but I agree, there are some organizations and computers where the use of AV is not recommended.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.