Avast!, AVG, BitDefender, McAfee, Norton… All these are some of the big names in the present antivirus software market. We all relax as we accept their huge announcements of providing an unbeatable protection for our systems and all the precious data on them. But at the base of it all, doesn’t a simple loophole exist? How can a software protect against something that doesn’t exist yet?
Welcome to Narrating The Dream and with the hopes that I don’t get infected as a response to this post, I am here to speak on the primary loophole of our computer security systems.
As I mentioned above, the one place where any security system stumbles is when they have to face off against an unknown enemy. After all, it isn’t the case of an adaptable human body that will build immunity over time. Sure there would always be detections in terms of similar pieces of code that imply that a computer infection is based on another known piece of code but ask any hacker (if you can find one) and the person will wholeheartedly agree with what I am about to say.
“Anonymity is the greatest weapon in the stealth business.”
So, when the public announcements of latest defense systems are made, we are all just being fooled by thinking that all would be safe. Yes, we would undoubtedly be safe from the publicly spread versions of computer viruses but that doesn’t mean it won’t be like passing through air for the specially crafted/unknown digital infections that intend to affect us. By the time someone discovers it, if someone ever discovers it, it will be too late for you to protect your data.
Like a human can learn to fight invisible training after loads of training, perhaps the computer protection will also master the different loopholes our computers have, including the hardest of the all – human behavior*. But until then, we are all vulnerable to an attack. Or maybe we already have been hacked into. Who knows?
A reference to rampant piracy and scams, etc.