- Apr 13, 2013
- 3,224
Well bit defender is a paid soft. Unlike free soft they have an obligation to each and every user to protect their system once they install their software, be it tweaked or not so. Remember they have a specific module just to prevent ransomware. Hence enabling or disabling of a module doesn't count. It failed.I wonder if Active Threat Control set to aggressive would make a difference or running it in Windows 10.
I wonder if Active Threat Control set to aggressive would make a difference or running it in Windows 10.
Good video but...
AV Comparatives is incredibly fake. I think they are getting paid to say that all of the AV products get 100% in every test...
Look at this:
View attachment 125795
It said that almost all of the AVs tested got 100%! There is no way that Tencent, Trend Micro, Vipre, AVG, F-Secure or any other AV got 100% in this test. Unless you used incredibly old samples then these tests are completely fake.
Exactly!Most of the av companies tests give good results by using samples older than dinosaurs i would assume. Reason they do that is because if they don't no AV company will want to be tested by them. Simple as that.
They help AV companies make sales with good scores and the AV companies pays. Probably doesn't apply to all testing companies but a lot of those do it.
Personally, I dislike the 100% label as well. Nothing is 100%. I guess people just get tired of writing "100% of the samples tested". And yes, every AV vendor pays to participate in these tests. Apparently, they all pay the same. Whether that is entirely true only AV Comparatives will know. Knowing how much they ask for, I don't see why they would require "extra money" though. They make money hand over fist already.Good video but...
AV Comparatives is incredibly fake. I think they are getting paid to say that all of the AV products get 100% in every test...
Look at this:
View attachment 125795
It said that almost all of the AVs tested got 100%! There is no way that Tencent, Trend Micro, Vipre, AVG, F-Secure or any other AV got 100% in this test. Unless you used incredibly old samples then these tests are completely fake.
Mr Robot is my favourite Amazon Prime seriesAna- With BD I just had soooo many choices of malware that bypass it it was difficult to choose which one to demonstrate!
About upping the ATC- once again a really pretty term but that's about it. It was bypassed in all modes. Also as the Pro testers didn't employ it, I also could not for the purpore of this video.
FW- Good points, but I avoid doing the URL test as the URL blocking is essentially equivalent to having a definition for a true zero day sample- new malware, as well as new malware URL's will just blow right by such protection schemes. Also running some URL's that may have been sitting on some list or other for God knows how long is in my opinion a waste of my viewers time (which I fervently hope is precious). I also didn't include it as the song wasn't that long.
Regarding email protection you have a valid point. I've added a pre-existing botnet where ransomware was being emailed out by a D forked svchost in a couple of recently published videos and will include it in my season finale in a few weeks.
And finally running a file from the desktop (or Folder) is totally valid as this will take into account a malware vector from ANY source, including dragging it on to the system from a flash drive (didn't you watch Mr Robot?).
You can at least consider downloading the samples from some URL. Set up a local webserver and download them from there to have a complete chain of events that behaviour blockers can track and samples don't just suddenly "appear". It would simulate an unknown URL to block far better than just copying the samples to the system.FW- Good points, but I avoid doing the URL test as the URL blocking is essentially equivalent to having a definition for a true zero day sample- new malware, as well as new malware URL's will just blow right by such protection schemes.
If I have access to your system to stick in my flash drive and run my malware, you have lost anyway. I can just turn off your AV in that case or click "allow" when it screams at me. Phyiscal security is a must. If you can't guarantee that, don't even bother with anything else.And finally running a file from the desktop (or Folder) is totally valid as this will take into account a malware vector from ANY source, including dragging it on to the system from a flash drive (didn't you watch Mr Robot?).
I agree. I don't have proof but I'm assuming 99% of ransomware is delivered through the internet. So good URL blocking would be a critical consideration when it comes to stopping malware. Like you said samples don't just magically appear in real life.You can at least consider downloading the samples from some URL. Set up a local webserver and download them from there to have a complete chain of events that behaviour blockers can track and samples don't just suddenly "appear". It would simulate an unknown URL to block far better than just copying the samples to the system.
If I have access to your system to stick in my flash drive and run my malware, you have lost anyway. I can just turn off your AV in that case or click "allow" when it screams at me. Phyiscal security is a must. If you can't guarantee that, don't even bother with anything else.
Ana- With BD I just had soooo many choices of malware that bypass it it was difficult to choose which one to demonstrate!
About upping the ATC- once again a really pretty term but that's about it. It was bypassed in all modes. Also as the Pro testers didn't employ it, I also could not for the purpore of this video.
FW- Good points, but I avoid doing the URL test as the URL blocking is essentially equivalent to having a definition for a true zero day sample- new malware, as well as new malware URL's will just blow right by such protection schemes. Also running some URL's that may have been sitting on some list or other for God knows how long is in my opinion a waste of my viewers time (which I fervently hope is precious). I also didn't include it as the song wasn't that long.
Regarding email protection you have a valid point. I've added a pre-existing botnet where ransomware was being emailed out by a D forked svchost in a couple of recently published videos and will include it in my season finale in a few weeks.
And finally running a file from the desktop (or Folder) is totally valid as this will take into account a malware vector from ANY source, including dragging it on to the system from a flash drive (didn't you watch Mr Robot?).