Hello,
help me decide between these AV. I need full protection + friendly for RAM and CPU... Thank you.
help me decide between these AV. I need full protection + friendly for RAM and CPU... Thank you.
Maybe not for you, but It matters for the OP.I did indeed, I simply stated that those facts contributes nothing.
Indeed, what makes the real difference is the time of the signature release. And usually ESET is the fastest.All suites in current world detect almost all the malicious and harmful malware etc. So pick the one which will let your system breathe easily.
@Umbra was not talking about how often they release new signatures, but how quickly they add signatures for new malware. Lately, Bitdefender has often been slow at adding signatures for 0 day malware.According to Eset Malware Research Team, when I had a chat with them in the past, they usualluy release detection after every 4 hours.
According to Bitdefender Support, they release detection every 1 hour for paid products and every 2 hours for free product.
Exact , sorry if my wording was not clear enough, after all i'm not English native.@Umbra was not talking about how often they release new signatures, but how quickly they add signatures for new malware. Lately, Bitdefender has often been slow at adding signatures for 0 day malware.
Wich one has a better Behavior blocker,
Emsisoft or F-secure??
Unfortunately, i think Emsisoft is struggling with this problem too nowdays@MacDefender, the only drawback I found during these weeks of testing in F-Secure is with some scripts whose payloads are not a PE/exe file, in this cases DeepGuard can't stop the script...
Yep I agree with this.@MacDefender, the only drawback I found during these weeks of testing in F-Secure is with some scripts whose payloads are not a PE/exe file, in this cases DeepGuard can't stop the script...
Yep I agree with this.
The way you defeat DeepGuard is you basically get a moderately well known scriptable process to do your dirty work for you.
One example in the wild is you just download a copy of Node.js and then have your ransom encrypting done via JavaScript. The interpreter is whitelisted and DeepGuard doesn't pay attention to what it's doing.
I've got another local test where I just used a build of 7zip and used the command line command to create encrypted zip files of the user's data and that also didn't seem to trigger DeepGuard.
I might prepare another MacDefender homebrew ransomware pack this week and see if the community can help us test. It does seem like it's a general flaw of behavior blockers that if you can convince them part of your payload is whitelisted, it creates a huge blind spot. I do want to see whose BB can deal with this. It shouldn't be hard to track a process tree and trace back to who exactly triggered a whitelisted thing to happen.
I will likely just distribute the test binaries to some testers -- I do like the transparency of having someone else other than the POC writer report the result. Please feel free to let me know offline what is the best way to get such samples to those who are willing to test.I am looking forward for your tests, maybe you could test Kaspersky 2020, I think it has one of the few behavior blockers without this blind spot.
ESETHello,
help me decide between these AV. I need full protection + friendly for RAM and CPU... Thank you.