{"id":516,"date":"2015-01-14T16:13:13","date_gmt":"2015-01-14T16:13:13","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=516"},"modified":"2025-06-17T15:58:01","modified_gmt":"2025-06-17T10:28:01","slug":"weakness-conventional-security-unknown-threats","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/","title":{"rendered":"The Weakness of Conventional Security: Unknown Threats"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-518\" style=\"margin-bottom: 16px;\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\" alt=\"catching malware\" width=\"650\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg 654w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-300x199.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-225x149.jpg 225w\" sizes=\"(max-width: 654px) 100vw, 654px\" \/>Most organizations have faced data breaches at some, with the number of victims growing daily. It does not matter how big or small the organization is, everyone is now a target.<\/p>\n<p>In recent years, enough high profile retailers have been compromised that almost every American has either been a victim of <strong>identity theft<\/strong> or needed to replace current cards to avoid being a victim. The main reason is due to the excessive dependence on security tools that simply cannot address all threats. Conventional security has lists of known valid files and files known to be threats. They can deal with the known good and known bad files appropriately. Unfortunately, there will always be files that are unknown to the system. Some of these files will in fact be threats. That is the great flaw in most security, dealing with the unknown threats<\/p>\n<p>Every day hackers release new malware into \u201cthe wild&#8221;, as many as 50,000 new threats each day. There is simply no way an <a href=\"https:\/\/antivirus.comodo.com\/\">antivirus<\/a> systems can update its threat list fast enough. There will always be some gap between time a threat starts spreading across the internet and the time that vendors update their list known as signature file. Signature file or blacklist. During that gap period the malware is an unknown file and you are defenceless against it with most security systems.<\/p>\n<p><strong>Factors that can help handle unknown threats: <\/strong><\/p>\n<p><strong>Install an antivirus software to deliver and employ robust <em>virus removal<\/em> methods &#8211;<\/strong><br \/>\nDealing with <a href=\"https:\/\/enterprise.comodo.com\/security-solutions\/unknown-threats.php\" target=\"_blank\" rel=\"noopener\">unknown threats<\/a> requires a sandbox.\u00a0Some <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-8\/\">Windows 8 Antivirus<\/a> provide a sandbox, but only Comodo <a href=\"https:\/\/www.comodo.com\/website-security-platform\/cwatch.php\" target=\"_blank\" rel=\"noopener\">Internet Security Software<\/a> implements <a href=\"https:\/\/enterprise.comodo.com\/blog\/what-is-virus-removal\/\" target=\"_blank\" rel=\"noopener\">virus scanning <\/a>and auto sandboxing technology. This means it is not entirely up to the user to decide what should or should not go in the sandbox for safe keeping. (<a href=\"https:\/\/poshsushi.com\/clonazepam-klonopin-online\/\">https:\/\/poshsushi.com\/<\/a>) <\/p>\n<p><strong>Use of Firewall &#8211; <\/strong><br \/>\nA <a title=\"firewall\" href=\"https:\/\/personalfirewall.comodo.com\/\" target=\"_blank\" rel=\"noopener\">firewall <\/a>monitors network traffic and can deal with threats before they infect your computer.<\/p>\n<p><strong>Isolate infected drives &#8211; <\/strong><br \/>\nInfected drives should be first isolated, scanned and then repaired.<\/p>\n<p><strong>Points to Remember after installing an antivirus program<\/strong><br \/>\nIt\u2019s not a matter of just installing antivirus software onto your system. It\u2019s all about maintaining the updated version of the antivirus software which helps you to protect your system from the latest viruses and hence aid in <strong>virus removal<\/strong>. Scan the system on a regular basis, hence maintaining virus free files on your system.<\/p>\n<p><strong>Update your computer OS and backup your files<\/strong><br \/>\nThe operating system that you are working with, also shares a significant role. Hence update your system&#8217;s operating system once the new version is released.<\/p>\n<p>Comodo <a href=\"https:\/\/enterprise.comodo.com\/security-solutions\/endpoint-protection\/\" target=\"_blank\" rel=\"noopener\">Endpoint Security Solutions<\/a> offers centralized security management protection by incorporating <a title=\"Antivirus\" href=\"https:\/\/antivirus.comodo.com\/\">Antivirus<\/a>, <a href=\"https:\/\/personalfirewall.comodo.com\/what-is-firewall.html\" rel=\"noopener\" target=\"_blank\">Firewall<\/a> with Default Deny Protection, Auto-Sandboxing, Host Intrusion Prevention and much more. It also mitigates administrative efforts.<\/p>\n<p><a href=\"https:\/\/one.comodo.com\/signup?afid=9356\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1771\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2015\/01\/CES.jpg\" alt=\"Endpoint Security\" width=\"650\" height=\"250\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2015\/01\/CES.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2015\/01\/CES-300x115.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2015\/01\/CES-225x87.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most organizations have faced data breaches at some, with the number of victims growing daily. It does not matter how big or small the organization is, everyone is now a target. In recent years, enough high profile retailers have been compromised that almost every American has either been a victim of identity theft or needed [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Weakness of Conventional Security: Unknown Threats<\/title>\n<meta name=\"description\" content=\"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Weakness of Conventional Security: Unknown Threats\" \/>\n<meta property=\"og:description\" content=\"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-14T16:13:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T10:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/\",\"name\":\"The Weakness of Conventional Security: Unknown Threats\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg\",\"datePublished\":\"2015-01-14T16:13:13+00:00\",\"dateModified\":\"2025-06-17T10:28:01+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg\",\"width\":225,\"height\":170,\"caption\":\"What is Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Weakness of Conventional Security: Unknown Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Weakness of Conventional Security: Unknown Threats","description":"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/","og_locale":"en_US","og_type":"article","og_title":"The Weakness of Conventional Security: Unknown Threats","og_description":"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2015-01-14T16:13:13+00:00","article_modified_time":"2025-06-17T10:28:01+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/","name":"The Weakness of Conventional Security: Unknown Threats","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg","datePublished":"2015-01-14T16:13:13+00:00","dateModified":"2025-06-17T10:28:01+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"With 50,000 new malware every day, there is simply no way an antivirus systems can update its threat list fast enough. You will have unknown threats","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-Copy.jpg","width":225,"height":170,"caption":"What is Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/weakness-conventional-security-unknown-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Weakness of Conventional Security: Unknown Threats"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=516"}],"version-history":[{"count":31,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/516\/revisions"}],"predecessor-version":[{"id":21921,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/516\/revisions\/21921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/521"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}