{"id":42665,"date":"2014-05-12T12:00:26","date_gmt":"2014-05-12T11:00:26","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=42665"},"modified":"2015-05-05T21:35:00","modified_gmt":"2015-05-05T20:35:00","slug":"antivirus-software-is-dead-says-security-expert-at-symantec","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/05\/antivirus-software-is-dead-says-security-expert-at-symantec\/","title":{"rendered":"Antivirus Software Is Dead, Says Security Expert at Symantec"},"content":{"rendered":"<p><em>Information chief at Norton developer says software in general misses 55% of attacks and its future lies in responding to hacks.<\/em><\/p>\n<div id=\"attachment_42666\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/05\/bug-antivirus.jpeg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-42666\" class=\"wp-image-42666 size-medium\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/05\/bug-antivirus-300x180.jpeg\" alt=\"Hackers are said increasingly to use novel methods and bugs in the software of computers to perform attacks. Photograph: Dale O'Dell\/Alamy\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/05\/bug-antivirus-300x180.jpeg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/05\/bug-antivirus.jpeg 460w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-42666\" class=\"wp-caption-text\">Hackers are said increasingly to use novel methods and bugs in the software of computers to perform attacks. Photograph: Dale O&#8217;Dell\/Alamy<\/p><\/div>\n<p>Antivirus software only catches 45% of malware attacks and is &#8220;dead&#8221;, according to a senior manager at Symantec.<\/p>\n<p>Remarks by Brian Dye, senior vice-president for information security at the company, which invented commercial antivirus software in the 1980s and now develops and sells Norton Antivirus, suggest that such software leaves users vulnerable.<\/p>\n<p>Dye <a target=\"_blank\" href=\"http:\/\/online.wsj.com\/news\/articles\/SB10001424052702303417104579542140235850578\" >told the Wall Street Journal<\/a> that hackers increasingly use novel methods and bugs in the software of computers to perform attacks, resulting in about 55% cyberattacks going unnoticed by commercial antivirus software.<\/p>\n<p>Malware has become increasingly complex in <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/politics\/2011\/may\/30\/stuxnet-attack-cyber-war-iran\" >a post-Stuxnet world<\/a>. Computer viruses range from relatively simple criminal attacks, where credit card information is targeted, to espionage programs that spy on users and data but can easily be upgraded into cyberweapons at the touch of a button, according to security expert Eugene Kaspersky, founder of Kaspersky Lab, which also sells antivirus software.<\/p>\n<p><strong>From protect to &#8216;detect and respond&#8217;<\/strong><\/p>\n<p>That failure to detect issues is forcing Symantec, which has a turnover of about $1.6bn (\u00a3590m) and an 8% global antivirus marketshare \u2013 <a target=\"_blank\" href=\"http:\/\/www.opswat.com\/about\/media\/reports\/antivirus-january-2014#worldwide-antivirus-vendor-market-share\" >according to data from the enterprise software company Opswat<\/a> \u2013 to diversify its products, moving into the \u201cdetect and respond\u201d sector rather than the simple &#8220;protect&#8221; segment.<\/p>\n<p>The switch to the detect and respond paradigm means tracking data leaks, hacks and other intrusions and preventing further repercussions from stolen data. For users, that means changing passwords, but for businesses that often means stopping access to accounts and services that have been subject to data loss or infiltration, as well as tracking the source of the intrusion and shoring up cyberdefences \u2013 something governments have been doing with new cyber response teams.<\/p>\n<p>Antivirus still accounts for 40% of the company\u2019s revenue, however, and while other security companies such as Kasperky and Intel\u2019s McAfee have already moved in that direction, Symantec lags the movement.<\/p>\n<p><strong>\u2022 Eugene Kaspersky: it\u2019s no longer a case of whether a <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/technology\/2014\/may\/01\/eugene-kaspersky-major-cyberterrorist-attack-uk\" >major cyberterrorist attack on the scale of that portrayed in Die Hard 4<\/a> will occur but when<\/strong><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/technology\/2014\/may\/06\/antivirus-software-fails-catch-attacks-security-expert-symantec?CMP=EMCNEWEML6619I2\" >Go to Original \u2013 theguardian.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information chief at Norton developer says software in general misses 55% of attacks and its future lies in responding to hacks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[],"class_list":["post-42665","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/42665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=42665"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/42665\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=42665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=42665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=42665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}