silvercats 10 Junior Poster

If someone managed to execute a remote code by exploiting a browser vulnerabil,can or can't a good AV stop it?

1.does the code run under the process name of the browser so AV wouldn't block it?
2.or as a separate process so av can detect and block it if it is up to date?

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.