<div dir="ltr">On Thu, Oct 24, 2013 at 12:13 PM, Pinkerton, Eric (AU Sydney) <span dir="ltr"><<a href="mailto:Eric.Pinkerton@baesystemsdetica.com" target="_blank">Eric.Pinkerton@baesystemsdetica.com</a>></span> wrote:<br>
<div class="gmail_extra"><div class="gmail_quote"><br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-AU" link="blue" vlink="purple"><p class="MsoNormal">
Your realising what almost everyone in the security industry has known for years, that A/V solutions relying on blacklisting has been a broken concept for years because it is a very trivial task to take some malware, and pass it through a packer/obfuscator which will make it unique. <br>
</p></div></blockquote><div><br></div><div>Absolutely. The best analogy for A/V is the old game Kerplunk (for those who remember). Put marbles (malware) in, it fights it's way past the sticks (signatures), and eventually falls through anyway :-) Change the configuration of the sticks, and a new array of opportunities for getting past them, presents itself.</div>
<div><br></div><div>+1 for application Whitelisting. Not the silver-bullet, but a step in the right direction.</div><div><br></div><div><br></div><div>Chris.</div></div></div></div>