If you insist on running untrusted executables and refuse to fix that problem, then you're screwed and antivirus doesn't change that. It's plausible AV will increase the amount of time your system is usable between reinstalls, but that is not security.
-
-
So "don't use antivirus" does have a place in these guides, right above the explanation of how trust works with executables.
-
This Tweet is unavailable.
- 6 more replies
New conversation -
-
-
But "don't run random untrusted executables" falls apart when <person you know> emails you a word doc with a DDE exploit dropper in it.
-
That requires different advice, like keeping software updated and reducing attack surface. Neither of those can be replaced with antivirus either.
- 3 more replies
New conversation -
-
-
I'd argue that there is a problem with the education of the average computer user. Experts should be able to know whether they trust a file or not. Normal users even with training will struggle. Plus you have to consider booby trapped exes you may trust. E.g Putty/CC etc
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I know plenty of people who would run untrusted executables even when told not to. Installing antivirus on their computers makes a lot of sense. Same thing with corporate settings where such people are likely to exist.
-
Tavis is referring to restricting this behavior in enterprise environments with application whitelisting
End of conversation
New conversation -
-
-
and if you're opening looking-trusted documents, or visit trusted websites (who decided to use untrusted ad networks or simply got hacked)?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Don’t go porn hunting and agree to every link you see?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.