I feel terrible asking such an elementry question but here goes...
Suppose I allow a Jave update to install, however, it is fake. Since I allowed the update, will Webroot still catch this and intercept the install? I know in the previous years, if a user allowed an install, the security program would ignore the potential risk because the user allowed it. :manfrustrated:
I've always wondered to what extent security breaches can be eliminated if users allow the install.
--
Rob
Page 1 / 1
For one always download from http://www.oracle.com/technetwork/java/javase/downloads/index.html and in your theory if it is a known threat WSA would block it but if it is unknown then WSA keeps a eye on it until it's classified bad in the cloud then it can rollback to before the infection please see here: http://community.webroot.com/t5/Webroot-Education/If-Webroot-quot-Misses-quot-a-Virus/ta-p/10202
HTH,
TH
HTH,
TH
Well said, TH.@ wrote:
For one always download from http://www.oracle.com/technetwork/java/javase/downloads/index.html and in your theory if it is a known threat WSA would block it but if it is unknown then WSA keeps a eye on it until it's classified bad in the cloud then it can rollback to before the infection please see here: https:///t5/Webroot-Education/If-Webroot-quot-Misses-quot-a-Virus/ta-p/10202
HTH,
TH
The same applies to fake Flash updates that are circulating the web as well.
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.