Malware Bytes Scan

  • Thread starter Thread starter Dave Cohen
  • Start date Start date
FTR,

Do you imagine, in the scenario described above, either entity
functioning well enough to make it to that point?

You would have to have the entire staff from both companies really,
insanely out of their heads for this to happen; and actually go live. :)
 
From: "FromTheRafters" <[email protected]>



| Of course, virus (or malware) description language is not a
| programming language.

::oD

| Butt's programs work reasonably well even though the data files
| describing the malware are stolen from the actual people doing the
| research to create them (the "engines" consuming that data are
| probably stolen as well, by this has not been demonstrated as well as
| the other aspect has).

| If you recall the "other" thieves (from China?) - they actually gave
| the same malware name (marker) in the alert, probably because the
| engine (maybe even the GUI) is stolen as well.


Yes, IObit's theft of the Malwarebytes database is an excellent
example.

Those who decrypted the IObit database and the Malwarebytes database
have *NO DOUBT* of this theft.

Hard to have doubt when it's line for line, character for character.
Hell, iobit modified their software to support our definitions! <G>
 
Often, that is indicative of a program update as opposed to just a
definitions update. I'm not sure if Malwarebyte's Anti-Malware shares
this nature so familiar with the AV programs.

No. Our engine update consists of a new version installation. We do not
presently do things the way some, but not all antivirus companies do.
 
Dustin Cook said:
@news.eternal-september.org:


No. Our engine update consists of a new version installation. We do
not
presently do things the way some, but not all antivirus companies do.

Thanks for the info Dustin.
 
Back
Top