Should a 'good' virus be developed for security purposes?

Should a 'good' virus be developed for security purposes? Picture 1 In order to satisfy businesses using harmless computer viruses and worms to serve the purpose of reducing costs for network security, a leading security expert has successfully built the model. Development of 'virus can control'.

Dave Aitel, a security vulnerability researcher at Immunity, based in New York, has just released a Nematode-level test model at the recently held Hack In The Box forum. Malaysia. According to a researcher in the future, the "good" virus will be an important part of the corporate security strategy.

For years, security experts have had to argue a lot about whether to use 'good' viruses to find and destroy other dangerous viruses. Some argue that it is time we need to adopt a toxicology strategy - develop 'good' viruses that can prevent dangerous viruses or fix security bugs. However the majority of opinions are still very different.

Aitel is one of those who believe that 'virus technology' can help reduce the costs businesses invest in maintaining and securing network systems.

According to this expert, the Nematode technology model can be applied at ISPs, government organizations of large companies . will greatly reduce cost and efficiency thanks to simplicity.

On the occasion of the forum, Aitel also presented the cause of his views on developing good viruses.

4.5 ★ | 2 Vote

May be interested

  • Most antivirus programs are 'trivial'Most antivirus programs are 'trivial'
    only 3 out of 16 antivirus programs rated as 'good' by av-comparatives, the rest are medium or weak.
  • Sober is back today?Sober is back today?
    security experts around the world predict that the sober virus will return today - january 6, 2006. but is the virus really triggering a new wave of virus on the global network as it is already
  • Detect dangerous macOS virus developed by Chinese hacker groupDetect dangerous macOS virus developed by Chinese hacker group
    researchers have discovered a previously unknown macos virus. it is named gimmick and is the product of the storm cloud cyber-espionage hacker group from china.
  • How to create security questions nobody can guessHow to create security questions nobody can guess
    a problem that is very much concerned about is how to restore online accounts. a typical security option is to set up a security question. this has the ability to recover your account quickly and easily, but also requires a security responsibility from the user.
  • Error in a series of popular virus scanning toolsError in a series of popular virus scanning tools
    according to israeli security expert andrey bayora, by adding some data he called 'magic byte' to a dangerous file, an attacker could bypass many virus detection systems.
  • Virus collection of 2010 from Panda LabsVirus collection of 2010 from Panda Labs
    panda labs, panda security's security lab closed this year with an overview of the most remarkable and special viruses that have appeared in the past 12 months. the list of viruses is very long and varied, from 2010 ...
  • 'Great technique' Autorun virus removal by hand'Great technique' Autorun virus removal by hand
    first, it must be affirmed, the solution to spread the virus through windows autorun function has many ways. these practices are quite manual, but it helps implementers better understand the security and security principles of the system.
  • Self-security before Vietnamese virus outbreakSelf-security before Vietnamese virus outbreak
    since the great vietnamese virus epidemic affected hundreds of thousands of computers in our country, the security and security issues of computer systems have become more important than ever.
  • 'Self-breeding' virus is challenging security software'Self-breeding' virus is challenging security software
    'self-breeding' virus is challenging security software - the most widespread virus in 2009, to over 483,000 computers, named w32.salityvf.pe
  • 10 ways to avoid computer intrusion10 ways to avoid computer intrusion
    sometimes small loopholes in a good sense of habit also create a security hole for cyber criminals to take advantage of to exploit for malicious purposes.