InvestorsHub Logo
Followers 5
Posts 2515
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Sunday, 09/02/2018 5:30:15 PM

Sunday, September 02, 2018 5:30:15 PM

Post# of 248728
Avast Users Having Internet Issues & Malwarebytes Conflicts After Upgrade

https://www.bleepingcomputer.com/news/security/avast-users-having-internet-issues-and-malwarebytes-conflicts-after-upgrade/

This week users of Avast's antivirus product have reported Internet problems after performing an upgrade of a product. If users also have Malwarebytes installed, reports are coming in that Avast is causing conflicts with that program as well.

Unfortunately, at this time in order to get both programs working properly together, you will need to disable a protection module from one of the programs in order to avoid the conflicts.

Avast 18.6.2349 causing connectivity problems

After upgrading to Avast 18.6.2349, numerous users on the Avast Forums have started to complain about not being able to browse web sites. When users attempted to diagnose the issue they found that this is not a total loss of connectivity as they could ping IP addresses, but could were able to not access web sites via a browser.

When disabling the Avast WebShield component, which protects users from browsing to malicious sites or scripts, users reported that they were once again able to browse the web as normal.

In one support forum post, a Avast employee named Filip Braun stated that this problem could be caused by a failed update that left old Avast drivers behind.

Avast forum regulars are suggesting that users perform a clean install of Avast to see if that resolves the issue.

Avast causing conflicts in Malwarebytes

To make matters worse, Malwarebytes users who have Avast installed are also reporting numerous problems this week as well after upgrading Avast. Some of the issues being reported include being unable to open the program's dashboard, errors using Malwarebyte's support tool, Malwarebytes crashing, or the inability to keep real time protection enabled.

Some users have reported that they can get Malwarebytes working again by disabling the program's Web Protection component, which protects users from malicious sites. Others have reported that they can Malwarebyte's Web Protection component again if they disable Avast's similar "Real Site Protection" feature.

According to a post by a Avast developer on the Malwarebytes forum, this issue is supposedly a conflict between the two program's web protection modules. The developer further indicates that Malwarebytes is not performing UDP filtering using a MS recommended solution.

While this could be one cause of conflict, there is obviously something else going on as users on the Avast forums have indicated that they are having problems after the 18.6.2349 even when they do not have Malwarebytes installed.

For now, according to Malwarebytes support engineer Devin Collins, if you are a MBAM user and wish to continue using their Web Protection module, you need to disable Avast's "Real Site Protection". Collins further stated that Malwarebytes is working with Avast/AVG to resolve these issues.

Bleeping Computer has contacted both Malwarebytes and Avast for comment, but had not heard back at the time of this publication.

much more at the link -
================================================================
Sounds like it is time for business users of antivirus (like Avast) to upgrade to a better product like Wave Endpoint Monitor. Now all we need is a little marketing. imo.
================================================================
https://www.wavesys.com/malware-protection

Software can’t always detect malware

The big problem with malware is that antivirus software doesn’t always detect it. Anti-malware software is based on signatures of known bad software. However, there always needs to be a patient 0 that discovers he is infected, for the rest of the world to benefit from it. In the case of APTs (Advanced Persistent Threats), your organization may be the only target for the specific strand of malware. In that case, the signature detection process will not protect you. Modern anti-malware and other software packages that promise cyber security or protection from APTs would use various heuristics and "AI" (Artificial Intelligence) to detect malware based on a predefined set of behavioral parameters. A sophisticated attacker is able to fine tune the behavior of the malware he is writing against various known anti-malware software solutions, so that it can evade detection for long periods of time.

A further challenge for anti-malware software is that it commonly works at the OS level. It isn’t very good at seeing deeper into the system, where some malware lives. Malware can hide from anti-malware by feeding it false results as it lies lower in the stack.

=================================================================
https://www.wavesys.com/products/wave-endpoint-monitor


Detect attacks before it’s too late

Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage.

Antivirus software can’t detect rootkits and other malware; it works at the level of the OS and isn’t very good at seeing deeper into the system. For example, it can’t tell whether the boot record is lying. The Wave alternative is to work with the Trusted Platform Modules (TPMs), or security chips, embedded in your devices. By using the TPM to attest to the security of the device each time that device boots, Wave looks below the operating system and can help detect threats lurking there. Every time a device boots up, Wave Endpoint Monitor makes a comparison against previous boot values, and if anything deviates from the norm, it alerts you immediately.

An open standard means Wave works with everything

Wave Endpoint Monitor works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on many laptops and is now working its way onto mobile devices. We’re talking about those TPMs. We just don’t think that expensive new equipment and vendor lock-in are great selling points.

Be proactive on compliance

No new regulations here—yet. But government agencies recognize malware as a growing threat. In 2011, NIST published guidelines for basic input/output system (BIOS) integrity measurement, the BIOS being what initializes a computer when it boots up. When this critical system is malware’s target, the consequences are big. The guidelines describe what’s needed to establish a chain of trust for the BIOS: Has it been tampered with? NIST actually looked to Wave for feedback on this document (see the acknowledgments). We know what’s needed, because Wave Endpoint Monitor is already doing it.

Key Features:

Easy security compliance
• Comports with NIST guidelines for BIOS integrity

Data protection
Ensures that you can trust the integrity of your measurements for central analysis
Real-time alerts for zero-day detection of APTs
• Get Windows 8 Malware protection now—WEM covers previous versions of Windows

Simplicity
• Uses standards-based security that’s in every PC you own
Measurement notifications and reports can be customized for your processes and work flows
Centralized, remote activation and management of your TPMs
E-discover which PCs in your organization are enabled for endpoint monitoring

No compromises
• Ensure host integrity—without expensive hardware or excessive administrative overhead

Windows 8 Tablet Compatibility
• Get the same device integrity assurance on Windows 8 Pro & Enterprise tablets that you want for your enterprise PCs - with Wave Mobility Pro - Tablet Edition



Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.