FileHippo News

The latest software and tech news

Your computer is only as safe as the antivirus software you put in place. What happens when those protections are hacked? As any good... Hacking The Fortress Of Antivirus Software

Your computer is only as safe as the antivirus software you put in place. What happens when those protections are hacked?

As any good 13th century Viking horde knows, you can’t pillage the town without breaking through the village’s defenses, which often started with a giant stone wall and a massive gate. Wall and gate technology actually made serious technological advances throughout history (hello? burning oil from the top of the parapets?) as pillaging raids evolved. But what if the enemy had secretly replaced your village’s wall with massive stone-like blocks made from styrofoam? It would be a whole lot easier to conduct that raid. That’s the scenario that techxperts are predicting for millions of computers protected with some top names in antivirus software.

antivirus software

In true crime-fiction fashion, can we envision a situation in which software programmers and the researchers behind commercial antivirus titles are held hostage for their security information? Depending on the fish that hackers are hoping to catch, having a little reluctant inside help could come in very handy.

But as one tech reporter has stated, what if that inside help isn’t so reluctant? Internal data breaches are increasing in occurrence, thanks to the potential payoffs involved. Rick Robinson for brought up an interesting point: your antivirus is only as good as the developer who wants to keep your content safe:

“But who will guard the guards themselves? As this Latin proverb suggests, the security challenges of safeguarding protective systems are not new. In fact, they are inherent in the nature of security measures.

“Security guards need passkeys, which means that one way for the bad guys to get hold of those keys is to steal them from a guard. In the same way, security software needs to have access to high-level permissions. In fact, most of the familiar Hollywood tricks for getting past the guards have their cyber equivalents, from simply taking out a guard (disabling the software) to dressing up in a guard uniform and issuing fake instructions (abusing the software’s system permissions).”

That’s why Robinson and other techxperts are looking for alternatives to the way we currently protect our computers and networks from attack. Unfortunately, we’re still in a climate where convincing users to even have those antivirus protections in place is still a problem, so getting them install updates, patches, and other bug fixes may be even harder.