<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>WEE News (Posts about antivirus)</title><link>https://news.wiseeyesent.com/</link><description></description><atom:link href="https://news.wiseeyesent.com/categories/antivirus.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2026 &lt;a href="mailto:admin@wiseeyesent.com"&gt;Admin&lt;/a&gt; &lt;a href="/LICENSE.txt"&gt;Koplyleft- Some rights reversed&lt;/a&gt;</copyright><lastBuildDate>Sat, 03 Jan 2026 19:12:22 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Check Yo Sigs</title><link>https://news.wiseeyesent.com/posts/2017/04/check-yo-sigs.html</link><dc:creator>Admin</dc:creator><description>&lt;p&gt;Received an &lt;a class="reference external" href="https://arstechnica.com/security/2017/04/av-provider-webroot-melts-down-as-update-nukes-hundreds-of-legit-files/"&gt;interesting report&lt;/a&gt; from a colleague today. Apparently &lt;a class="reference external" href="https://www.webroot.com/"&gt;WebRoot&lt;/a&gt; released a &lt;a class="reference external" href="https://community.webroot.com/t5/Announcements/W32-Trojan-Gen-False-Positive-Fix-April-24/td-p/290198"&gt;false positive signature&lt;/a&gt; which totally borked Windows and legitimate applications in a substantial volume. I haven't used their software in a while as I've been on &lt;a class="reference external" href="https://www.avast.com/"&gt;Avast&lt;/a&gt; for the last decade or so.&lt;/p&gt;
&lt;p&gt;Malware scanning itself is something highly selective and rather difficult to perform, particularly due to the usually randomized nature of the malware itself. When I was working in security, I performed a significant number of application level cleanings and found that RegEx was usually the most beneficial, coupled with selective file searching based on ctime &amp;amp; OS reported file type (got a JPEG reported as an ASCII text file? May wanna take a look at it). The DHS &lt;a class="reference external" href="https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf"&gt;Grizzly Steppe report&lt;/a&gt; also includes a sample signature of theirs on page 5. Worth a read if you haven't looked at it.&lt;/p&gt;</description><category>antivirus</category><category>avast</category><category>grizzly steppe</category><category>internet</category><category>malware</category><category>news</category><category>outage</category><category>webroot</category><guid>https://news.wiseeyesent.com/posts/2017/04/check-yo-sigs.html</guid><pubDate>Tue, 25 Apr 2017 14:55:57 GMT</pubDate></item></channel></rss>