You are right, the detection and removal of malware, such as spyware and rootkits, is more involved than that of viruses. Because of this, the response times providing malware signature updates are longer. While viruses, once released, propagate on their own and survive or die out based on their payloads, malware can be updated and modified after being released by its creator. This is why it changes its activities and modes of infection...
Antivirus companies can usually update their antivirus signatures within 24 hours if a new virus or varient of an existing virus is discovered. A malware signature update takes approximately 72 hours, if not longer. This time difference is do to various factors. First, a virus can be sent for inspection and analysis. Second, it is self-contained and includes the code necessary to reproduce itself. This provides a unique signature, which can be used to definitively identify and deal with it. On the other hand, malware is neither self-contained nor completely identifiable. Unless the active content that deposits malware on a computer is caught in the act, a source of infection must be found before you can begin the comparison process, which is needed to identify what it does and what it changes. You must then work through the file replacements, updates or deletions necessary to remove the infection. It can be very difficult to create a methodology that safely removes malware from all possible computer configurations. This is particularly true of kernel rootkits where the only certain cure is to erase the entire infected hard drive and reinstall the operating system from scratch.
Because of this delay, some vendors are trying to prevent malware from running in the first place by analyzing program behavior and trying to recognize and block any dangerous behavior. Each type of malware is trying to achieve a particular goal even if it uses a different method. For example, a Trojan always sends files and a dialer always dials. Two programs using this approach are a-squared Malware-IDS available at www.emsisoft.com/en/software/ids and Principal Antivirus at www.resplendence.com/antivirus. One of the leading products that uses a threat database is Sunbelt's CounterSpy, which is also offered in a centralized, policy-based Enterprise edition. CounterSpy receives updates from thousands of users participating in Sunbelt's ThreatNet community, as well as new spyware definitions from Microsoft. More details are available at www.sunbeltsoftware.com/CounterSpy.cfm.
Dig deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Michael Cobb
Users in the enterprise may unknowingly be exposed to 'Gchat' security risks. Expert Michael Cobb discusses Internet application security best ...continue reading
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it.continue reading
Do you know some of the best third-party patch deployment tools? See expert Michael Cobb's recommendations on which tools would work best for your ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.