I am not the person who made this video,I just posted this video from youtube to show people that recommend this useless product that was once something to give people better advice,I hate when people recommend a product to novice users that don't perform any more & find all sorts of excuses why it still comes in handy because nuff people they follow uses it or so call top geeks, useless is useless don't care how others try to paint the picture, but i must insist you also have to have facts to back your claims. IT IS WHAT IT IS
And you know what I hate? People that call a product useless without knowing how to use it, how it works, how to test it properly, or that think their opinion must be considered facts when they have no experience in InfoSec, or IT at all and are most likely underage.
I agree with certain aspects you have stated here with the exception of the Downloads folder, which by default is where everyone "downloads" too from emails to the web, this is still real world scenario.
Not really, it depends on your email client. For instance, if you open an attachment straight from an email in Outlook (which most people do), it doesn't download (copy) itself to the Downloads folder, but the Outlook temporary folder which isn't in %USERPROFILE%\Downloads, but somewhere along %AppData%\Microsoft\Windows.
Also, going back to my argument where the "tester" expect Malwarebytes to fully stop a Ransomware payload when he disables 50% of the modules (2 out of 4), I guess he never thought that in a real-world situation it could go like this:
User browses the web and somehow hits an EK
EK have an exploit in store for the user system and manage to drop a Ransomware payload on his system
Payload contact his C2, receives information, proceeds to encrypt the files
Game over.
Now, with Malwarebytes installed, it could stop the infection chain at any moment.
User browses the web and somehow hits an EK, but Malwarebytes Web Protection module blocks it (by preventing the connection to the gate)
EK have an exploit in store for the user system and manage to drop a Ransomware payload on his system, but Malwarebytes Anti-Exploit module blocks it and if not, Malwarebytes Malware protection module detects the file and deletes it on the spot
Payload contact his C2, receives information, proceeds to encrypt the files, but Malwarebytes Web Protection module blocks the connection to the C2, and some Ransomware do not proceed with the encryption if they cannot contact their C2 OR the Ransomware starts his encryption process only to be stopped by the Anti-Ransomware module because of it's behavior.
People somehow think that Malwarebytes' 4 protection modules are fully independent from each others, while this is true (as disabling one of them, don't prevent the 3 others from actually working and do their job properly), did anyone thought about the fact that these 4 modules are enabled together, to work together for a reason?
Jesus that post is badly constructed but I'm in a hurry so I'll adjust it later if needed.