Facebook iconTwitter icon
Sandboxing is not as secure as many people think
Sandboxing is not as secure as many people think
Time icon 4 December 2013, 9:15 am
The battle against cybercriminals is like the arms race of the big nations during the cold war, but this war is already in place and is no longer cold. Security specialist are developing new innovative security setups, only to get a fast answer with new threats that are able to avoid these new setups.

A good method to secure your systems is the sandboxing-technique, that moves suspect files into a quarantine area, where those files are hold back until they are identified as harmless or dangerous. With this technique all other files were save. But the answer were new attackers that includes timers before activating the dangerous codes. With this code they were able to be set up in the system before they were activated.

Security systems were updated to handle this risk too and so it goes on again. New threat software is using a new way now. They try to create an overload with triggering the security system to check harmless files, while the dangerous coding could be implemented in the background. Mastercodes for this could be found on the website pastebin.com and could be included by copy and past to own malware, what is frightening.

Due to Websense analyses the best way to deal with this danger is to use sandboxes in the cloud, because the cloud has dynamic scalable resources and is always up to date. The security solution Websense TRITON is using more than 10,000 analyses from a special security network that is always updated.