Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Posted Nov 9, 2019 12:31 UTC (Sat) by pizza (subscriber, #46)In reply to: Way forward to on-access antivirus in Linux by Cyberax
Parent article: Filesystem sandboxing with eBPF
Ah yes, to meet the "poorly implemented rootkit that does more harm than good" market.
Posted Nov 9, 2019 20:39 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link] (9 responses)
If this changes, get ready for Linux ransomware and undetectable rootkits. There is no hardening at all in mainstream Linux distros.
Posted Nov 9, 2019 21:28 UTC (Sat)
by amacater (subscriber, #790)
[Link] (1 responses)
If, say, Amazon and the Linux components of Microsoft's Azure are too small to be regarded, please advise what you regard as important.
Posted Nov 9, 2019 21:31 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link]
> Exploitable root hole every three months? Please be so good as to look at the average Mean Time to Repair [MTTR] in Linux and common applications and compare this to the speed of comparable patching in the commercial applications.
The only thing preventing mass infections are gatekeepers in Play Store and the fact that most IoT devices don't execute arbitrary code.
Posted Nov 10, 2019 2:14 UTC (Sun)
by pizza (subscriber, #46)
[Link] (6 responses)
Neither of which are (or can be) addressed by the current "enterprise antivirus" paradigm.
Posted Nov 10, 2019 2:23 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link] (5 responses)
Posted Nov 11, 2019 7:41 UTC (Mon)
by zlynx (guest, #2285)
[Link] (4 responses)
Posted Nov 11, 2019 8:41 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link] (3 responses)
> And then Windows has to create little simulated environments for the AV so it can "watch" a pretend operating system.
Posted Nov 11, 2019 15:46 UTC (Mon)
by zlynx (guest, #2285)
[Link] (2 responses)
Posted Nov 11, 2019 15:52 UTC (Mon)
by pizza (subscriber, #46)
[Link] (1 responses)
(seriously; I just saw a thread on my employer's intermal messaging boards about how our current enterprise AV suite makes compiles take nearly 3x longer than without it..)
Posted Nov 11, 2019 16:17 UTC (Mon)
by dezgeg (subscriber, #92243)
[Link]
Posted Nov 17, 2019 5:29 UTC (Sun)
by daurnimator (guest, #92358)
[Link] (3 responses)
From https://www.pcisecuritystandards.org/documents/PCI_DSS_v3...
> 5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers)
In most corporate settings where there is card data (and unless the business is willing to convince an auditor that Linux is not commonly affected by malicious software), you have to deploy *something* antivirusy.
Posted Nov 18, 2019 23:29 UTC (Mon)
by flussence (guest, #85566)
[Link] (2 responses)
Posted Nov 18, 2019 23:34 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
Posted Nov 21, 2019 16:20 UTC (Thu)
by mathstuf (subscriber, #69389)
[Link]
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Uh, what? Most IoT and Android devices are not repaired at all, they just exist in a vulnerable state.
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Windows doesn't do anything like this. It provides official hooks for AV software in the kernel mode, but doesn't do any emulation.
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
Way forward to on-access antivirus in Linux
