{"id":4347,"date":"2015-08-07T15:27:53","date_gmt":"2015-08-07T15:27:53","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4347"},"modified":"2019-11-15T13:57:12","modified_gmt":"2019-11-15T11:57:12","slug":"more-than-just-an-antivirus-p-1-when-and-why-antiviruses-appeared","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/more-than-just-an-antivirus-p-1-when-and-why-antiviruses-appeared\/4347\/","title":{"rendered":"More than just an Antivirus, p.1: When and why antiviruses appeared"},"content":{"rendered":"<p>From time to time, this discussion gets reignited: Is it still correct to use the term \u201cantivirus?\u201d Does it still make any sense to call\u00a0a security solution an \u201cantivirus,\u201d or we should take a shovel and bury it in the salt. Going ahead, we are by no means burying it. Cybersecurity today is much more than just antiviruses, even though these two terms used to be synonymous. Antivirus is still essential, a base, but alone it is no longer enough.<\/p>\n<p><strong>By inertia<\/strong><\/p>\n<p>The general public and businesses still use the word \u201cantivirus\u201d to describe any kind of security solution. And there are a few reasons for this. The first is, of course, inertia. For many years \u201can antivirus\u201d and \u201ca security solution\u201d were totally synonymous. And while today the security vendors are well aware that their products are much more than just an antivirus, the public may not know it (or may not care). And the word lives on.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>When and why #antiviruses appeared? \u2013 An old story #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F76Bn&amp;text=When+and+why+%23antiviruses+appeared%3F+%26%238211%3B+An+old+story+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The second reason is the fact that \u201can antivirus\u201d has fewer syllables than \u201ca security solution.\u201d People cling to the \u201cantivirus\u201d word for their comfort, which generates a lot of uncomfortable confusion afterwards. There is an antivirus, which\u00a0<a href=\"https:\/\/business.kaspersky.com\/death-of-av\/1768\" target=\"_blank\" rel=\"noopener nofollow\">is alive and kicking<\/a>, contrary to popular opinion; but besides that there are many other tools created to counter modern threats. And as such a threat, the viruses\u00a0per se are currently the tip of the iceberg.<\/p>\n<p>While clients have gotten used to calling the security vendors \u201cantivirus companies\u201d, they may be well aware that \u201cantivirus\u201d is not enough today. And the security vendors have to explain to their clients (every time) that they actually provide an\u00a0antivirus and so much more.<\/p>\n<p>That\u2019s why this post is here. We\u2019d like to dust off some long-standing terms so that there is less confusion. We\u2019d rather discourage users from calling modern security solutions \u201cantiviruses,\u201d altogether, but for the reasons mentioned above, the word has stuck.<\/p>\n<p><strong>What is an antivirus?<\/strong><\/p>\n<p>Strictly speaking, an antivirus is a program written with a specific purpose: to neutralize other malicious programs written to inflict harm. The term \u201ccomputer virus\u201d itself was coined in early 1980s after J\u00fcrgen Kraus wrote his diploma thesis \u201cSelf-reproduction of programs\u201d at the University of Dortmund. In this work, Kraus mentioned that computer programs can behave in a way similar to biological viruses.<\/p>\n<p>The term got fixed after 1984 when Fred Cohen from the University of Southern California wrote his paper \u201cComputer Viruses \u2013 Theory and Experiments\u201d, where the experimental program was called \u201ca virus\u201d (as introduced by Cohen\u2019s mentor Leonard Adleman).<\/p>\n<p>In fact, by that time, self-replicating programs already existed, with theoretical work done as early as 1949. At that time John von Neumann at the University of Illinois gave lectures about the \u201cTheory and Organization of Complicated Automata\u201d, and later published a work \u201cTheory of self-reproducing automata\u201d wherein he had actually described a self-reproducing program \u2013 the first \u201ccomputer virus\u201d.<\/p>\n<p>Then in 1970 there was <a href=\"https:\/\/en.wikipedia.org\/wiki\/Creeper_(program)\" target=\"_blank\" rel=\"noopener nofollow\">Creeper<\/a>, an experimental virus for DEC PDP-10 computers. It was infecting machines running the TENEX operating system connected to ARPANET. It copied itself to the remote system and displayed a message there: \u201cI\u2019m the creeper, catch me if you can!\u201d<\/p>\n<p>And here, ladies and gentlemen, we welcomed the program called Reaper, written with the sole purpose of eradicating Creeper. The first antivirus, it was a program designed to remove an undesirable software.<\/p>\n<p>Creeper was harmless, but its multiple self-replicating successors were not: By the end of the 1980s, they were a source of very serious threats, as the computer viruses deleted data, trashed entire disks and floppies, and, living up to its name, they were spread via removable media (floppy disks at that time). Then the Internet arrived and viruses\u00a0received a new way of fast distribution, which in part led to their further evolution.\u00a0But even ahead of that, viruses became a problem that required counter-action.<\/p>\n<p>Eugene Kaspersky started working on antivirus software in the late 1980s, producing AVP 1.0 in 1992 \u2013 the product that eventually evolved into Kaspersky Anti-Virus.<\/p>\n<p><strong>The need for a shield<\/strong><\/p>\n<p>It would be safe to assume that an attack tool comes first, protective measures second. Humanity first invented a sharp-edged stone attached to a long stick and only much\u00a0later found out about shields, etc.<\/p>\n<p>An antivirus initially was a \u201creactive\u201d tool, with a purpose to clean up the virus from the system, restoring it to normal, if possible.<\/p>\n<p>Early antivirus packages worked strictly by the code signatures of the viruses, which meant they were supposed to be intercepted and analyzed by antivirus developers, then the data is added to the antivirus bases, and those are distributed this or that way (over the Internet, once it arrived) to the end users and businesses.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>An #antivirus initially was a \u201creactive\u201d tool, with a purpose to clean up the #virus from the system<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F76Bn&amp;text=An+%23antivirus+initially+was+a+%26%238220%3Breactive%26%238221%3B+tool%2C+with+a+purpose+to+clean+up+the+%23virus+from+the+system\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The Internet has changed a lot: not only has it opened the way for virus epidemics (with self-propagating worms), to a degree it has also increased the speed of malware evolution. Soon it was not just viruses or worms; and so the necessity for an antivirus to grow into something more had become apparent too.<\/p>\n<p>Does \u201cgrowing into something more\u201d mean that the antivirus itself becomes obsolete and dies out? Nope. But this will be covered in the next post of the series. Stay tuned!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is it still correct to use the term &#8220;antivirus?&#8221; Cybersecurity today is much more than just antiviruses; still essential, but alone it is no longer enough.<\/p>\n","protected":false},"author":209,"featured_media":15370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[849,1251,36,2330,145],"class_list":{"0":"post-4347","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-antimalware","10":"tag-antivirus","11":"tag-malware-2","12":"tag-security-solution","13":"tag-virus"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/more-than-just-an-antivirus-p-1-when-and-why-antiviruses-appeared\/4347\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/more-than-just-an-antivirus-p-1-when-and-why-antiviruses-appeared\/4347\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/more-than-just-an-antivirus-p-1-when-and-why-antiviruses-appeared\/4347\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/antimalware\/","name":"antimalware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=4347"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4347\/revisions"}],"predecessor-version":[{"id":24548,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4347\/revisions\/24548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15370"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=4347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=4347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=4347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}