I have to say I agree with @munin on this. End users at home can be told in simpler terms how dangerous untrusted binary execution is. But first dual extension, right-to-left flipped extension, document exploit, or other such trickery to come along and they will fall for it.
-
-
No I agree, you can attempt inform the end user all you want. I believe my main concern is that while AV products are like any other product and present a risk themselves they also reduce the overall success of weak opsec/low maintnanced campaigns. Its not perfect but it helps.
-
It also depends on what investment of time the user is willing to put in. Do they just want to read a quick "top 5 ways to not get hacked" or an exhaustive very verbose hardening, prevention, and monitoring guide? Even then what about phishing, vishing, and watering hole attacks?
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.