AV-Comparatives: AV-Comparatives - Real-World Protection Test Jul-Oct 2024
#1
Bug 
Quote:Introduction

Malicious software poses an ever-increasing threat, not only due to the number of malware programs increasing, but also due to the nature of the threats.

Infection vectors are changing from simple file-based methods to distribution via the Internet. Malware is increasingly focusing on users, e.g. by deceiving them into visiting infected web pages, installing rogue/malicious software or opening emails with malicious attachments. The scope of protection offered by antivirus programs is extended by the inclusion of e.g. URL-blockers, content filtering, cloud reputation systems, ML-based static and dynamic detections and user-friendly behaviour-blockers. If these features are perfectly coordinated with the signature-based and heuristic detection, the protection provided against threats increases.

In this test, all protection features of the product can be used to prevent infection – not just signatures or heuristic file scanning. A suite can step in at any stage of the process – accessing the URL, downloading the file, formation of the file on the local hard drive, file access and file execution – to protect the PC. This means that the test achieves the most realistic way of determining how well the security product protects the PC. Because all of a suite’s components can be used to protect the PC, it is possible for a product to score well in the test by having e.g. very good behavioural protection, but a weak URL blocker. However, we would recommend that all parts of a product should be as effective as possible. It should be borne in mind that not all malware enters computer systems via the Internet, and that e.g. a URL blocker is ineffective against malware introduced to a PC via a USB flash drive or over the local area network.
 
In spite of these technologies, it remains very important that also conventional and non-cloud features such as the signature-based and heuristic detection abilities of antivirus programs continue to be tested. Even with all the protection features available, the growing frequency of zero-day attacks means that some computers will inevitably become infected. As signatures can be updated, they provide the opportunity to recognize and remove malware which was initially missed by the security software. Other protection technologies often offer no means of checking existing data stores for already-infected files, which can be found on the file servers of many companies. Those security layers should be understood as an addition to good detection rates, not as a replacement.
 
The Real-World Protection test is a joint project of AV-Comparatives and the University of Innsbruck’s Faculty of Computer Science and Quality Engineering. It is partially funded by the Republic of Austria.
 
The methodology of our Real-World Protection Test has received the following awards and certifications, including:
  • Constantinus Award – given by the Austrian government
  • Cluster Award – given by the Standortagentur Tirol – Tyrolean government
  • eAward – given by report.at (Magazine for Computer Science) and the Office of the Federal Chancellor
  • Innovationspreis IT – “Best Of” – given by Initiative Mittelstand Germany
...
Full Article = Real-World Protection Test July-October 2024

Chart = Comparison
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Trojans in AI models
Hidden logic, data...harlan4096 — 08:03
Bitdefender 27.0.45.220
Bitdefender 27.0.4...harlan4096 — 08:01
AdGuard for Android v4.7
AdGuard for Androi...harlan4096 — 08:00
Google Chrome 131.0.6778.108/.109
Google Chrome 131....harlan4096 — 07:57
Adobe Acrobat Reader DC 24.005.20307
Adobe Acrobat Read...harlan4096 — 07:56

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (42)ivyhuv
avatar (40)Enlargedterrestrial20

[-]
Online Staff
There are no staff members currently online.

>