MalwareBytes Anti Exploit: Digital Ninja
Surprise attacks are often the most devastating, both in terms of damage they can do to individuals and the number of victims who are attacked. The online world has it own version of such attacks, in the form of drive-by downloads and zero-day exploits. But there's a new security tool that promises to provide ninja-like protection from these threats. Read on to learn more…
Chuck Norris Might Be Jealous...
MalwareBytes Anti-Exploit BETA is a free tool that puts a virtual martial arts expert between your computer and the bad guys. It was released recently by the makers of MBAM (MalwareBytes Anti-Malware) a program I often recommend to root out infections that are already present on your system. It’s compatible with Internet Explorer, Chrome, Firefox, Opera, and all of the plug-ins for these browsers.
Internet security pros use the term “zero-day exploits” because a) they exploit hidden vulnerabilities in software and Internet protocols that are discovered by bad guys but not yet known to the good guys, and b) people get exactly zero days’ warning of impending attacks.
Malware that relies on zero-day exploits spreads "fast as lightning," infecting thousands or millions of computers overnight. (For some reason, this song just came into mind.) Once a vulnerability becomes known to anti-malware developers, it can take days or weeks to develop an effective defense and distribute it to users of their products. Getting the latest defenses rapidly is one reason you should leave your antimalware program’s automatic-update feature enabled.
Sometimes the developers of application software are slow to patch holes discovered in their products. This response lag time leaves a window of opportunity for the bad guys, and they send their malware jumping through as many open windows as possible as fast as it can.
Just Drive On By...
There are also attacks that give no warning and do not rely on a self-spreading virus program to find victims. Many rogue Web sites bear hidden code that inspects visitors’ browsers and computers for zero-day vulnerabilities. When a security hole is discovered in a visitor’s system, the site invisibly downloads to it a payload of malware. Rogue sites may have arsenals of different malware bombs designed for different vulnerabilities, and download one or more based on what hole(s) they find in a visiting system. These destructive downloads are called “drive-by downloads” because Web surfers drive by a site and are attacked as they pass through.
MalwareBytes Anti-Exploit BETA protects browser components that are frequently attacked, including Java, Flash, Shockwave and Acrobat. Popular apps such as Microsoft Word, Excel, PowerPoint, Adobe's Acrobat Reader, and Windows Media Player are also targets for malware creators, so MalwareBytes Anti-Exploit shields vulnerable or unpatched applications you have installed.
An effective defense against unknown and unpredictable malware cannot rely on signature files, the databases of identified malware for which patches have been written that is downloaded to most anti-malware programs regularly. It must rely on instantaneous recognition of threatening behavior by a site or software download, and instantly block the threat… rather like Bruce Lee or Chuck Norris on a dimly-lit street, facing down dangers unknown.
MBAM Anti-Exploit uses very few system resources and runs quietly. It's designed so as not to interfere with other anti-malware tools, and doesn't require any tinkering. It's compatible with Windows XP, Vista, Windows 7, and Windows 8.
Keep in mind that “BETA” means a program does what it is designed to do, but it's still in a final testing stage. It may not be entirely free of bugs that can produce unintended consequences such as crashes, false positives, and interference with other programs. Try MalwareBytes Anti-Exploit BETA at your own risk. I have tried it for several days now, and have not noticed any problems. A stranger sitting down at my machine would never guess that I had a ninja guarding it.
Your thoughts on this topic are welcome! Post your comment or question below...
This article was posted by Bob Rankin on 18 Oct 2013
|For Fun: Buy Bob a Snickers.|
Microsoft Security Essentials: EPIC FAIL
The Top Twenty
Avoid Cable and Phone Company Money Grabs
There's more reader feedback... See all 27 comments for this article.
Post your Comments, Questions or Suggestions
Free Tech Support -- Ask Bob Rankin
Subscribe to AskBobRankin Updates: Free Newsletter
Copyright © 2005
- Bob Rankin - All Rights Reserved
Article information: AskBobRankin -- MalwareBytes Anti Exploit: Digital Ninja (Posted: 18 Oct 2013)
Copyright © 2005 - Bob Rankin - All Rights Reserved