Nastiest Malware 2023
Best answer by Ssherjj 12 November 2016, 04:12
It's 2018 so I'm guessing this hasn't changed?
Understanding how Webroot works is what got me to question how it works with email, since that has been the number one attack vector at customers. The customers' emails are scrubbed at the mail server, but they still get through. Users still get tricked all to often, especially young, new employees.
Webroot's anti-ransomware is certainly novel because it can mitigate the damage from zero-day ransomware threats. However, I'm not wild about the idea of having malware emails and files lying dormant on a computer and having it become a source of infected files through email or network sharing.
Let me know if I'm missing something here, but it appears that the malware lies dormant and undetected unless the machine where it is installed attempts to execute it, and links in emails are not checked until you attempt to follow the link?
I have what I need to know. Thanks all!
>but the actual malicious executable payloads will be blocked when they are downloaded and/or executed<
Does that mean that they would be stripped from POP3 messages when they are downloaded into Outlook?
...leaving infected files and emails laying about where they can be forwarded...
Already have an account? Login
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.
© 2004 -
We have recently updated our Privacy Policies. We encourage you to read the full terms here.