{"id":7363,"date":"2017-07-11T09:43:37","date_gmt":"2017-07-11T07:43:37","guid":{"rendered":"https:\/\/hansesecure.de\/2017\/07\/deceptive-security-antivirus-and-firewall\/"},"modified":"2017-07-11T09:43:37","modified_gmt":"2017-07-11T07:43:37","slug":"deceptive-security-antivirus-and-firewall","status":"publish","type":"post","link":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/","title":{"rendered":"Deceptive security: antivirus and firewall"},"content":{"rendered":"<h3><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/firewall.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-783\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/firewall-300x200.jpg\" alt=\"\" width=\"900\" height=\"600\"><\/a><\/h3>\n<h3 style=\"text-align: center;\"><em>We are safe because we have a virus scanner and a firewall!<\/em><\/h3>\n<p><strong>This statement is often the first to fall and should therefore be finally put right \ud83d\ude09<\/strong><\/p>\n<h1>#1 Firewall<\/h1>\n<p>A firewall prevents connections to unwanted services (actually ports, but we&#8217;ll get to that in a moment).<\/p>\n<p>This is done by blocking\/closing ports which are assigned to certain services according to IANA. Some examples are:<\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/wellports.png\"><img decoding=\"async\" class=\"aligncenter wp-image-438 size-full\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/wellports.png\" alt=\"\" width=\"344\" height=\"262\"><\/a><\/p>\n<p>So you could say that you can open or close certain doors.<\/p>\n<p>This is already the problem with the classic firewall. What if I, as an attacker, tell my malware not to connect to me via an exotic port 4444, but via 80?<\/p>\n<p>Correct, a successful attack! The door with the number 80 is usually open so that websites on the Internet can be reached via http.<\/p>\n<h1>#2 Antivirus<\/h1>\n<p>There are numerous ways to mislead antivirus software. Basically, these check file contents for known patterns. We will take a closer look at how well this works in the following. I show how the malware files are modified and how this affects the detection rate of different virus scanners (see <a href=\"https:\/\/virustotal.com\/\" target=\"_blank\" rel=\"noopener\">Virustotal<\/a>).<\/p>\n<h2>#2.1 Webshell<\/h2>\n<p>The following is a standard web application backdoor file (php-compatible). If this can be uploaded to the homepage and executed, the &#8220;attacker&#8221; is able to execute arbitrary commands on the server.<\/p>\n<h3># Stage 1 default file<\/h3>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage1.png\"><img decoding=\"async\" class=\"aligncenter wp-image-432 \" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage1.png\" alt=\"\" width=\"705\" height=\"318\"><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 11\/57<\/strong><\/p>\n<h3><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage1_Scan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-433 \" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage1_Scan.png\" alt=\"\" width=\"857\" height=\"167\"><\/a><\/h3>\n<p>We note that 11 out of 57 virus scanners identify the file as malicious.<\/p>\n<h3># Stage 2 Remove Comments<\/h3>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-434\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage2-300x138.png\" alt=\"\" width=\"705\" height=\"323\"><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 5\/57<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage2_Scan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-435\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage2_Scan-300x60.png\" alt=\"\" width=\"850\" height=\"169\"><\/a>Now that the comments have been removed from the code, the malware is only detected by 5 virus scanners. This shows how trivial today&#8217;s virus scanners work. But I think there is still something \ud83d\ude09<\/p>\n<h3># Stage 3 Rename variables<\/h3>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/10\/final_avEvaed.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1032\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/10\/final_avEvaed-300x192.jpg\" alt=\"\" width=\"400\" height=\"255\"><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 1\/55<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage3_Scan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-437\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/web_stage3_Scan-300x60.png\" alt=\"\" width=\"850\" height=\"170\"><\/a>Finally, I rename the variable &#8220;cmd&#8221; to &#8220;secret&#8221; and remove the Usage output, showing how poor the protection actually is. Only 1 out of 55 virus scanners still detects malicious behavior of the file&#8230; Just let it work \ud83d\ude09<\/p>\n<h2>#2.2 Executable<\/h2>\n<p>The following detection rates show the efficiency of different virus scanners when using standard software to generate malware and use exotic files from the Internet.<\/p>\n<h3># Stage 1: Standard Executable<\/h3>\n<p>This file was created using a &#8220;hacking tool&#8221; without using any additional options or obfuscation methods.<\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 49\/62<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage1_scan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-439\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage1_scan-300x61.png\" alt=\"\" width=\"850\" height=\"174\"><\/a>Since this tool is very widespread and is used correspondingly frequently, the detection rates are correspondingly high.<br \/>\nOne question remains, however: What&#8217;s going on with the other 13 manufacturers?<\/p>\n<h3># Stage 2: File encoded<\/h3>\n<p>Here, the above file was additionally modified with an <a href=\"https:\/\/de.wikipedia.org\/wiki\/Kodierer#Kodierer_in_der_digitalen_Nachrichtentechnik\" target=\"_blank\" rel=\"noopener\">encoder<\/a>.<\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 47\/63<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage2_scan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-440\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage2_scan-300x61.png\" alt=\"\" width=\"850\" height=\"172\"><\/a>Here I tried to trick the virus scanners by coding the malware. This worked only conditionally, because only 2 virus scanners alert less!<\/p>\n<h3># Stage 3: embedded malicious code<\/h3>\n<p>The malicious code was embedded into an existing file.<\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 23\/62<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-441\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage3-300x63.png\" alt=\"\" width=\"850\" height=\"177\"><\/a>By now, it should be clear that virus scanners look for certain schemes in the files. For the above result, I injected the malicious code into an existing executable file (firefox.exe in this case). This leads to the frightening result that the detection rate was halved again.<\/p>\n<h3># Stage 4: Exotic file<\/h3>\n<p>This file was generated from a little used source.<\/p>\n<p style=\"text-align: center;\"><strong>Detection rate 7\/62<\/strong><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-442\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/stage4-300x61.png\" alt=\"\" width=\"850\" height=\"174\"><\/a>In conclusion, we can see that the use of less common malicious code drops the detection rate to just 11%.<\/p>\n<h1>#3 Conclusion<\/h1>\n<p>The examples listed show that even the most primitive methods are sufficient to bypass the most up-to-date virus scanners. I would like to emphasize here that hackers or <a href=\"https:\/\/hansesecure.de\/en\/services\/penetration-test\/\" target=\"_blank\" rel=\"noopener\">penetration testers<\/a> use much more perfidious methods to trick your security system.<\/p>\n<p><strong>Do you have any questions? Should your system perhaps be looked at more closely? Just <a href=\"mailto:info@hansesecure.de\">contact<\/a> me.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are safe because we have a virus scanner and a firewall! This statement is often the first to fall and should therefore be finally put right \ud83d\ude09 #1 Firewall A firewall prevents connections to unwanted services (actually ports, but we&#8217;ll get to that in a moment). This is done by blocking\/closing ports which are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7037,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[259],"tags":[264,265,266],"class_list":["post-7363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-practical-advice","tag-awareness-en-2","tag-it-security-en-2","tag-migration-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH<\/title>\n<meta name=\"description\" content=\"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH\" \/>\n<meta property=\"og:description\" content=\"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"HanseSecure GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/hansesecure\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-11T07:43:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"HanseSecure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:site\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HanseSecure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/\"},\"author\":{\"name\":\"HanseSecure\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\"},\"headline\":\"Deceptive security: antivirus and firewall\",\"datePublished\":\"2017-07-11T07:43:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/\"},\"wordCount\":587,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/blog-av-fw.jpg\",\"keywords\":[\"Awareness\",\"IT Security\",\"Migration\"],\"articleSection\":[\"Practical Advice\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/\",\"name\":\"Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/blog-av-fw.jpg\",\"datePublished\":\"2017-07-11T07:43:37+00:00\",\"description\":\"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/blog-av-fw.jpg\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/blog-av-fw.jpg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/deceptive-security-antivirus-and-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deceptive security: antivirus and firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"name\":\"HanseSecure GmbH\",\"description\":\"Choose the Intruder\",\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\",\"name\":\"HanseSecure GmbH\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"width\":512,\"height\":512,\"caption\":\"HanseSecure GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/hansesecure\",\"https:\\\/\\\/x.com\\\/CyberWarship\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/hansesecure\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCAABbKOA_stDFkEKS3MSF7Q\",\"https:\\\/\\\/www.instagram.com\\\/hansesecure\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\",\"name\":\"HanseSecure\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"caption\":\"HanseSecure\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH","description":"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH","og_description":"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.","og_url":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/","og_site_name":"HanseSecure GmbH","article_publisher":"https:\/\/facebook.com\/hansesecure","article_published_time":"2017-07-11T07:43:37+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg","type":"image\/jpeg"}],"author":"HanseSecure","twitter_card":"summary_large_image","twitter_creator":"@CyberWarship","twitter_site":"@CyberWarship","twitter_misc":{"Written by":"HanseSecure","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#article","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/"},"author":{"name":"HanseSecure","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593"},"headline":"Deceptive security: antivirus and firewall","datePublished":"2017-07-11T07:43:37+00:00","mainEntityOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/"},"wordCount":587,"commentCount":0,"publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg","keywords":["Awareness","IT Security","Migration"],"articleSection":["Practical Advice"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/","url":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/","name":"Deceptive security: antivirus and firewall &#8211; HanseSecure GmbH","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#primaryimage"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg","datePublished":"2017-07-11T07:43:37+00:00","description":"Antivir and firewall are sufficient measures for the IT security of a company. This myth should finally be dispelled with this article.","breadcrumb":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#primaryimage","url":"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg","contentUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2017\/07\/blog-av-fw.jpg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/deceptive-security-antivirus-and-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/hansesecure.de\/en\/"},{"@type":"ListItem","position":2,"name":"Deceptive security: antivirus and firewall"}]},{"@type":"WebSite","@id":"https:\/\/hansesecure.de\/en\/#website","url":"https:\/\/hansesecure.de\/en\/","name":"HanseSecure GmbH","description":"Choose the Intruder","publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hansesecure.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hansesecure.de\/en\/#organization","name":"HanseSecure GmbH","url":"https:\/\/hansesecure.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","contentUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","width":512,"height":512,"caption":"HanseSecure GmbH"},"image":{"@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/hansesecure","https:\/\/x.com\/CyberWarship","https:\/\/www.linkedin.com\/company\/hansesecure","https:\/\/www.youtube.com\/channel\/UCAABbKOA_stDFkEKS3MSF7Q","https:\/\/www.instagram.com\/hansesecure\/"]},{"@type":"Person","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593","name":"HanseSecure","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","caption":"HanseSecure"}}]}},"_links":{"self":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/comments?post=7363"}],"version-history":[{"count":0,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7363\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/media\/7037"}],"wp:attachment":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/media?parent=7363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/categories?post=7363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/tags?post=7363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}