

“If a application doesn’t have a user interface (UI), or if it’s entering autorun and also accessing your Outlook address book, those are things that could be suspicious,” Blake said. In the new 2012 version, the list of behavioral rules used by NIS has grown to about 500. In these sorts of exploits, interlopers use networks such as WiFi, cable, 3G/4G, and Bluetooth to exploit vulnerabilities in browsers and browser plug-ins and take control of users’ devices.Įven before NAV kicks in, NIS 2012 uses network intrusion prev ention technology to analyze software behavior for abnormal activities and to block malicious Web sites such as phishing sites.

For example, Symantec classifies about 50 percent of all cyberattacks today as “network intrusions.”

“The world has shifted, introducing new risks and threats,” he contended. More and more, though, antivirus software alone isn’t enough to protect PCs, accoridng to Blake.
