Skip to main content



How to Spot Fraudulent Programs

What it does: New threats always require new scanners and scanning techniques. When rootkit pests emerged, previous scanners could not detect them from a purely technical point of view. Because the AV scanner uses the usual access options of the operating system to a file. However, a rootkit could trick the operating system and make itself invisible to the system and thus also to the virus scanner. The AV manufacturers subsequently developed rootkit scanners, which they also built into their antivirus programs. Something similar happened with the advent of ransomware, which encrypts user files. In order to better recognize these pests, scanners were developed that can detect an encryption process on the system. At that moment they look for the trigger for the encryption and stop this program. There are also scanners that can scan the memory or content of a website for malicious code. The vast majority of scanners of this type were first loudly promoted by the antivirus manufacturers

Latest Posts

If the AV manufacturer has added the malware

EnlargeThe Kaspersky Removal Tool

Antivirus software for Windows 10 in the test

Apple Watch Series 8 is expected to bring a third size option

The key to more scalability and agility

Establishment of Infrastructure-as-Code (IaC)

IaC to version control to data backup

A traditional perimeter network security

IoT are technologies that aim to make machines

Blockchain technology has the latent to provide