App Review Emsisoft Internet Security BETA Prevention and Detection Test

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Status
Not open for further replies.
great video review as always :) . I expected a clean sheet for emsisoft but it didnt
In your next video could you please test KIS 2017 default settings with the same samples so we can compare between these top-notch products? Thank you :)
 
Great video, thank you @safe1st for sharing!
I still think Emsisoft checks the cloud only if suspect activity is detected and not every time an unknown file is executed.
I hope they change this.
Btw, on Malware Hub I started testing Emsi IS beta too and will keep testing it for 30 days or till final version is released.
 
Thanks guys and yes hopefully they do something for final version

great video review as always :) . I expected a clean sheet for emsisoft but it didnt
In your next video could you please test KIS 2017 default settings with the same samples so we can compare between these top-notch products? Thank you :)

Cant be same sample. Why?
Because I test this Yesterday. And Im sure Kaspersky can detect more sample because newer signature :)
 
A user asked the following question on Emsisoft forum regarding safe1st video ;) and Fabian Wosar, Emsisoft Development Team has answered :)


takeoff342 said:
Hello Emsi Team,

here is a very new Video, that tested from a well known and good tester the new V12 Beta. In the Result of this video u can see, that Emsisoft has not detected a Ransom.
Now i would love to ask how that can be? Cause specially your new BB is trained to detect all forms of ransom ware. Maybe i would be good if u get into kontakt to the hoster and let you get the sample and test it yourself.
has u an answer why the ransom is not detected?

Thanks in advance. Chris


Fabian Wosar said:
Just because some product calls it ransomware doesn't mean it has to be. There are dozens of reasons why this could have happened. The most likely one, given the fact that none of the files were even encrypted, is that the ransomware's C2 servers simply have been taken down already. So the file would never actually encrypt anything, which is kind of what we are looking for. There are also several ransomware families out there that simply will not attempt to encrypt any files if the system is running EAM. Cerber being one of those families for example.
 
Last edited:
great video review as always :) . I expected a clean sheet for emsisoft but it didnt
In your next video could you please test KIS 2017 default settings with the same samples so we can compare between these top-notch products? Thank you :)
using same samples again is not a fair test, because the first AV had to deal with zero-day samples, so the second AV will have the advantage.
 
Status
Not open for further replies.

You may also like...