Skip to main content
I feel terrible asking such an elementry question but here goes...

 

Suppose I allow a Jave update to install, however, it is fake. Since I allowed the update, will Webroot still catch this and intercept the install? I know in the previous years, if a user allowed an install, the security program would ignore the potential risk because the user allowed it. :manfrustrated:

 

I've always wondered to what extent security breaches can be eliminated if users allow the install.

 

--

 

Rob
For one always download from http://www.oracle.com/technetwork/java/javase/downloads/index.html and in your theory if it is a known threat WSA would block it but if it is unknown then WSA keeps a eye on it until it's classified bad in the cloud then it can rollback to before the infection please see here: http://community.webroot.com/t5/Webroot-Education/If-Webroot-quot-Misses-quot-a-Virus/ta-p/10202

 

HTH,

 

TH
@ wrote:

For one always download from http://www.oracle.com/technetwork/java/javase/downloads/index.html and in your theory if it is a known threat WSA would block it but if it is unknown then WSA keeps a eye on it until it's classified bad in the cloud then it can rollback to before the infection please see here: https:///t5/Webroot-Education/If-Webroot-quot-Misses-quot-a-Virus/ta-p/10202

 

HTH,

 

TH

Well said, TH.

 

The same applies to fake Flash updates that are circulating the web as well.

Reply