How-To Geek

How Security Products Are Made; An Interview with BitDefender

Most of us use anti-virus and malware scanners, without giving the processes behind their construction and deployment much of a thought. Get an inside look at security product development with this BitDefender interview.

Over at 7Tutorials they took a trip to the home offices of BitDefender for an interview with Cătălin Coșoi–seen here–BitDefender’s Chief Security Researcher. While it’s notably BitDefender-centric, it’s also an interesting look at the methodology employed by a company specializing in virus/malware protection. Here’s an excerpt from the discussion about data gathering techniques:

Honeypots are systems we distributed across our network, that act as victims. Their role is to look like vulnerable targets, which have valuable data on them. We monitor these honeypots continuously and collect all kinds of malware and information about black hat activities.

Another thing we do, is broadcast fake e-mail addresses that are automatically collected by spammers from the Internet. Then, they use these addresses to distribute spam, malware or phishing e-mails. We collect all the messages we receive on these addresses, analyze them and extract the required data to update our products and keep our users secure and spam free.

Hit up the link below for the full interview.

How Security Products Are Made – An Open Discussion with BitDefender [7Tutorials]

Jason Fitzpatrick is a warranty-voiding DIYer who spends his days cracking opening cases and wrestling with code so you don't have to. If it can be modded, optimized, repurposed, or torn apart for fun he's interested (and probably already at the workbench taking it apart). You can follow him on if you'd like.

  • Published 03/23/12

Comments (4)

  1. Rod

    I’ve always wanted to take a computer with a unsecured OS and put it on the internet for a few days and see what happens. Like a science experiment.

  2. r

    …an interesting thing to try, but the results would be somewhat uneventful & repetitive unless your goal was to collect data on the malicious activity. Your computer would eventually get infected with something (big or small) that would stop some aspect of your system from functioning, and so you would need to clean it out before continuing on. Then this would then likely repeat itself.

  3. Sabrina

    Good to know about the How Security Products Are Made An Interview with BitDefender

  4. Citrus Rain

    I encrypted my ubuntu partiton once.
    Then my computer took a gateway defect to the everything.
    When I fixed it, Windows decided it was broken and started to fix itself. Destroying my ability to enter ubuntu.

    I had to surrender all my good data because it was encrypted. T-T

    @Rod – I don’t secure mine. Not with encryption programs like this. And both my windows and ubuntu partitions are doing just fine. – (Windows DOES have AVG installed though since it’s the less secure OS on my PC)

More Articles You Might Like

Enter Your Email Here to Get Access for Free:

Go check your email!