AVLab.pl - May 2022: Advanced In The Wild Malware Test
#1
Bug 
Quote:
[Image: avlab-logo.svg]


Dear Readers!

Last edition of Advanced In The Wild Malware Test we had a lot discuss about methodology. The primary changes we added are MOTW (mark of the web) feature and change wording (Level 1, Level 2, Level 3 to Post-Launch and Pre-Launch).

In May 2022, we completed the 18th edition of the Advanced In the Wild Malware Test. We carry out this analysis for our readers systematically in order to show the effectiveness of security from various developers in the long run. This time we used 1925 samples of malware.

Tested softwares (always the latest version – our testing system updates antiviruses and signatures once a day):
  • Avast Free Antivirus
  • Avira Antivirus Pro
  • Bitdefender Total Security
  • Comodo Advanced Endpoint Protection (for businesses)
  • Comodo Internet Security
  • Emsisoft Business Security (for businesses)
  • Malwarebytes Premium
  • Mks_vir Endpoint Security (for businesses)
  • Microsoft Defender (Windows 10 with SmartScreen disabled – explanation in article)
  • CatchPulse (formerly known as SecureAPlus Pro)
  • Webroot Antivirus
Please note!

​In May we experimented with Microsoft Defender. We disabled SmartScreen in order to verify the true effectiveness of protection against malware without the use of technology that is not part of the antivirus, but the operating system. Microsoft’s results were not satisfactory, because 98,6%.

In July 2022, in the next edition the SmartScreen technology for Microsoft Defender will be enabled in order to compare results. Experience on the example will tell whether the level of protection is significantly higher. We will present the conclusions in the next summary.

New! Level 1 + Level 2 = Pre-launch

​Start from May 2022 we change Level 1 and Level 2 are combined into single level: Pre-launch (previously Level 1 or Level 2)

Level 3 remains the same level with new name: Post-launch (previously Level 3)

Reclassification of levels is for marketing to simplify the methodology and make it easier to understand the tests that users have suggested. Thank you!

So the new classification concerns detecting malware samples:
  • Before they are launched in the system (Pre-launch)
  • and samples which are blocked after launch (Post-launch). This is the most dangerous situation but experience shows that such cases require tests in the field.
Please read full comment: Advanced In The Wild Malware Test: We Check How Malware Is Blocked Before And After Being Launched - AVLab Cybersecurity Foundation

Recent Results: Recent Results - AVLab Cybersecurity Foundation
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Surfshark Antivirus Video
Surfshark Antivirus_...jasonX — 05:09
K-Lite Codec Pack 19.1.0 / 19.1.1 Update
Changes in 19.1.1 ...harlan4096 — 07:00
Manjaro Linux 25.0.6 Build 250730
Manjaro Linux 25.0...harlan4096 — 06:57
Brave 1.80.125
Release Channel 1....harlan4096 — 06:55
Vivaldi 7.5 Build 3735.58
Vivaldi 7.5 Build ...harlan4096 — 06:54

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (41)schanumget
avatar (49)apertosibBip
avatar (43)MatthewTop
avatar (47)RussellRuigh
avatar (54)isyqop
avatar (44)AntoineLer
avatar (38)prefenouff
avatar (39)emogig
avatar (47)riafootgtap
avatar (38)fixlnub
avatar (45)greencek
avatar (46)floraJoumn
avatar (41)Isabelle88Nes
avatar (41)ferpuMip
avatar (38)kinotExaro
avatar (50)HerbertPab
avatar (47)Susanskymn
avatar (41)stepaRurry
avatar (37)torieyang
avatar (44)WilsonHep
avatar (43)pironfub
avatar (38)trafgawark
avatar (46)MichaelPlaup
avatar (50)oskasGok
avatar (39)hattiepn1
avatar (39)JasonSoult
avatar (36)hyxamuc
avatar (25)Arshi1

[-]
Online Staff
There are no staff members currently online.

>