As long as security uses a blacklist, it will be possible to evade it pretty easily. There are products that use a whitelist such as bit9.com, but that approach mostly works in corporate networks where they can set policy about what executable files can be run--period.