App Review McAfee Protection (Plus Plans, Total Protection, LiveSafe)

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Product name
McAfee Total Protection/Plus Plans
Installation (rating)
5.00 star(s)
User interface (rating)
5.00 star(s)
Performance (rating)
5.00 star(s)
Core Protection (rating)
5.00 star(s)
Proactive protection (rating)
5.00 star(s)
Additional Protection notes
See tests
Browser protection (rating)
5.00 star(s)
Positives
    • Many features
    • Low impact on system resources
    • Lightning fast scans
    • Easy to use
    • Simple and non-intrusive
    • Ransomware protection
    • Strong and reliable protection
    • Detects or blocks in the wild malware
    • Consistently high test scores
    • Accurate results and reliable antivirus engine
    • Effective malicious URL blocking
    • Virus signatures are updated daily
    • Excellent scores in independent tests
    • Great value for money
    • Effective malware removal
    • Well designed, clear and easy to use interface
    • Multi-layer protection approach
Negatives
    • Advanced users may want more control
    • Short on configuration options
    • Includes paid-for components (paywall)
Time spent using product
Reviewed between 1 to 7 days
Computer specs
11th Gen Core i5
16GB RAM
Recommended for
  1. All types of users
Overall rating
5.00 star(s)

Trident

From Hawk Eye
Thread author
Verified
Top Poster
Developer
Well-known
Feb 7, 2023
4,267
27,559
5,189
hea-p.com
Hello guys and welcome to this McAfee review.

Before we get to the McAfee details (which will be discussed in great depth), I would like to discuss the upgrade to my practices across this forum.

This forum is not for promotion of favouritism, it is designed mainly as a technical and objective forum.
In the light of all that, I have created Trident Review Framework (TRF) 1.0 with several key highlights:
  • Software is reviewed objectively based on capabilities and performance.
  • Wherever threat detection levels are measured (or tested), I focus on realistic scenarios and broad coverage.
  • Committed to transparency: wherever threat detection tests are performed, hashes of the malware are provided (as much as possible), so users can test the same software or other software, as long as they know how to do it safely and securely.
  • Malware is pre-checked, hunted fresh (as much as possible) and guaranteed to be malicious. Malware of different types is tested.
  • Wherever the security software offers more aggressive downloads scanning (which is many solutions nowadays), malware is downloaded in realistic scenarios, giving the solution a chance to react.
  • When additional components such as email protection are offered, these are welcome. Malware (and all trouble really) comes mainly through the web and email. These are tested too.
  • When it comes to privacy, I have already created another thread here: Serious Discussion - Data Collection Core Principles (Security Software)
  • Generative AI (namely Gemini 2.5 Pro which I also use in programming) is heavily used in my research, as well as in various other tasks, such as converting antivirus logs to tables, researching patents and so on. This allows me to do more work in a shorter time.
These are the upgrades to my review practices. I am not aiming to become a reviewer number one, in fact, @Shadowra handles most of the tests excellently, editing videos and producing high number of them. This is something that I will never do, I simply lack the time of it. Hence, I will not be producing a bulk of these reviews, rather, I will be reviewing products that have attracted my interest. For them to attract my interest, they are guaranteed to be advanced. Requests for reviews should still be addressed to @Shadowra.
You can expect reviews from me every now and then, mainly when misinformation has to be combatted.

CHAPTER 1: The theory

McAfee around 2022 upgraded the products to a new cloud-based architecture. They rewrote the whole product and there were several support articles. Thread wad created by me here New Update - The new cloud-based McAfee

Since then the support articles have been deleted by McAfee.

Nevertheless, the new architecture has several key highlights:
  • Less reliant on own kernel drivers, uses Windows native components as much as possible: McAfee uses the Defender Firewall for static rules and adds on top domain/web reputation. It also uses the Windows Filtering Platform to facilitate the malicious traffic interception.
  • No "signatures" as in no malware fragments. McAfee uses highly efficient heuristic/generic detections, as well as local trust and machine learning models and YARA rules to detect malware offline. It's important to note that if you are testing McAfee with fresh malware from several websites we've all come to know, you can't expect offline detection. The offline detection will be only on old and well-known malware. Such software that is light, efficient, disconnected from the cloud and yet detects everything simply doesn't exist.
  • Upgraded cloud, this was reflected in my McAfee deep research here: Serious Discussion - Deep Research: McAfee GTI, JTI, Artemis and Other Technologies Explained
  • The new architecture creates a very lightweight product, see the performance section for details.
  • McAfee offers many features that extend the protection, such as email scanning and deep fake detection. These features solve real problems for real users, beyond detecting malware which Microsoft Defender can do too.
  • Heavily focused on machine learning and AI. Recent patents tell us more about McAfee focus
    Patent TitlePublication NumberDate (YYYY-MM-DD)Brief Description
    --- 2024 ---
    Systems and Methods for Providing User Experiences on AR/VR SystemsUS-20240060933-A12024-02-22Manages security and privacy within augmented or virtual reality environments.
    Methods and Apparatus for Comprehensive User-Centric ProtectionUS-20240034800-A12024-02-01Creates a personalized security posture based on a user's digital assets and risk profile across devices.
    Systems and methods for detecting deepfake artifactsUS-20240012586-A12024-01-11Analyzes media files for subtle inconsistencies and artifacts to identify AI-generated deepfakes.
    --- 2023 ---
    Visual Detection of Phishing Websites via Headless BrowserUS-20230396013-A12023-12-07Uses a non-graphical browser to analyze the visual components of a webpage to determine if it's a phishing site.
    Systems and Methods for Performing Multi-Faceted Security ScanningUS-20230349887-A12023-11-02Implements a multi-layered scanning approach to detect diverse and complex security threats.
    Device Reputation Score Based on Device VitalsUS-20230282672-A12023-09-07Calculates a real-time trust score for a device based on its security health, software, and behavior.
    In-Place Cloud Instance RestoreUS-20230205562-A12023-06-29Provides a method to restore a compromised cloud computing instance directly, minimizing downtime.
    Dynamic Process Criticality ScoringUS-20230185984-A12023-06-15Assigns a real-time risk score to running processes to prioritize security actions.
    Visual Identification of MalwareUS-20230089868-A12023-03-23Converts malware code into a visual representation (an image) to use image analysis for faster detection.
    Methods and systems for cloud native threat detectionUS-20230070151-A12023-03-02Provides threat detection specifically designed for the architecture of cloud-native applications (containers, etc.).
    Icon Based Phishing DetectionUS-20230047306-A12023-02-16Detects phishing attempts by analyzing the favicon or other icons associated with a website.
    --- 2022 ---
    Method and Apparatus for Hardware Based File/Document Expiry TimerUS-20220399433-A12022-12-15Enforces document access expiry dates using hardware-level security, making it harder to bypass.
    Systems and Methods for Utilizing Hardware Assisted ProtectionUS-20220366299-A12022-11-17Leverages specialized hardware security features (like Intel SGX) to protect applications and data.
    Threat Hunting Using Natural Language ProcessingUS-11451613-B22022-09-20Enables security analysts to search for threats in datasets using plain English queries instead of complex code.
    Multi-Dimensional Malware AnalysisUS-20220261685-A12022-08-18Utilizes machine learning to analyze malware across multiple dimensions (code, behavior, network) for classification.
    Systems and methods for mitigating against malicious scriptsUS-11394801-B22022-07-19Detects and neutralizes malicious scripts (e.g., Magecart) designed to steal payment info from web forms.
    Detecting Grammatical Artifacts of Machine-Translated Phishing WebsitesUS-20220191398-A12022-06-16Identifies phishing sites by spotting grammatical errors characteristic of automated translation tools.
    Systems and Methods for Monitoring IoT Device BaselineUS-11356453-B22022-06-07Establishes a normal behavior baseline for IoT devices and flags anomalous activity as a potential threat.
    Methods and Systems for Detecting RansomwareUS-20220078235-A12022-03-10Employs behavioral analysis to detect and block ransomware activity before significant encryption occurs.
  • Local Intelligence Explained:
  • AV Trust: whitelist for Neo engine, 6.49 KB in size.
  • Neo Core: the main engine, includes true file type detection, unpacking and the Neo host (12.7 MB total size).
  • Neo rules: these are heuristic rules for the Neo engine, compressed from 20.9 MB in a cab file that is 3.5 MB. Whilst some heuristics could be ran on the code, majority of AV heuristics are usually ran on behaviour, which means the Neo engine is responsible for file emulation as well.
  • Neo trust: these are exceptions from the heuristic rules, 9.99MB compressed to 2.4MB
  • Real Protect Core - these are the core behavioural monitoring machine learning models, just over 13 MB
  • Real Protect Non-PE - these are machine learning modules mainly for DLL modules, 2.7 MB
  • Real Protect Script - these are machine learning models involved in the detection of scripts (during runtime), probably focusing on suspicious, long encoded commands and so on.
  • Real Protect Static - machine learning models facilitating Pre-Execution (static analysis) on scripts, modules and portable executables, 11.7 MB.
  • TPX (according to McAfee these are the main AV generic detections), 35.7 MB -> these are updated often, if not daily
  • TPX-1, these are the YARA rules (according to the configuration file), compressed from 20 MB to 3.2 MB -> these are updated often if not daily
  • TRS, that's another part of the AV engine, 10.3 MB -> this seems to be updated every few days
  • OpenVino-based DeepFake detection models, optimised for various CPUs (McAfee just recently launched that and is still working to increase availability), just over 50 MB
  • McAfee also offers ransomware remediation/restoration
Apart from the local intelligence which is mainly used offline, McAfee is in constant connection with the cloud. TLSH (Trend Micro Locality Sensitive Hash) is used, don't be surprised by the name, it is quite popular and widely used to allow minor, local changes to files, to not void the cloud detection. The distance between 2 TLSH hashes is calculated to establish the file similarity level. TLSH is also part of the STIX standard.
TLSH is better than other methods such as SSDEEP, mainly because SSDEEP struggles with small files. McAfee also uses server-side machine learning.

Several of the new patents explain the McAfee multi-faceted approach in depth, McAfee combines online and offline reputation, heavily focused on multiple different types of machine learning, and also takes into account the file origin when taking a decision.

CHAPTER 2: Antivirus Test
McAfee was tested in the continuation of a few days. To make the test more interesting, executables were tested twice - once original, as they are and once modified. Scripts were modified to include custom functions/subs.

File NameDetection NameFinal Detection SourceTLSHDate
1c8071c09a7f4b7bce1339b71d2522547aae5b41ed8d80a821a990a2f2b991fc.jsTrojan:Script/STRRAT.DAneoN/A2025-07-08
9ce142439e553f047639d272975b85c41da29191e532348f00653723e7f00299.batti!9CE142439E55htiN/A2025-07-08
b97cd404ceab09bdd92003599566d946cead1d5d5dba528327821fe4f18108ec.msiti!B97CD404CEABhtiN/A2025-07-08
63d2e9f885c7b2df3fc23658a5c13d3df968fbe205d9c973f4f42c775bd787af.exeti!63D2E9F885C7htiT13C55...1463E7A32025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiti!2F0F2CDC865FhtiN/A2025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiti!2F0F2CDC865FhtiN/A2025-07-08
ca9d03df1842fbec86ce1be7fd74318cefaa44e61047c9667b3cc60667f0f9d9.exeti!CA9D03DF1842htiT1AFB4...05A823AF2025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiCache!257a6b771f3acacheN/A2025-07-08
ae4e172d659cdd1fb298a4bb02f361ac8db869e78cdfe5f4e21741337b088845.exeti!AE4E172D659ChtiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
d82bd404ae9e2a0e63509e6d4114cd139f029f6c27b30d5cde0713fe54f543eb.exeti!D82BD404AE9EhtiT185E4...39F141E22025-07-08
19b6c6f8da4dd0a883cc647f0c5eaedd01a0bc1758beba1c8f9f97f4335b1f58.zipti!19B6C6F8DA4DhtiN/A2025-07-08
c4c2a82a7d454bb85fa22f12d2571639c1640ba4a6790d708f4a229f91a7a99b.exeti!C4C2A82A7D45htiN/A2025-07-08
ddd77057aed66ecef36d3b3997694acca1c72d4d23c32c684b9dff50e385b880.exeti!DDD77057AED6htiN/A2025-07-10
ddd77057aed66ecef36d3b3997694acca1c72d4d23c32c684b9dff50e385b880.exeReal Protect-LS!c16f81a15b2arp-sN/A2025-07-10
7fc0bcc654d5369fa6a18661eddfd91f058db076559f4517f0dd21f674d2fa3c.jsti!7FC0BCC654D5htiN/A2025-07-10
7fc0bcc654d5369fa6a18661eddfd91f058db076559f4517f0dd21f674d2fa3c.jsTrojan:Script/Downloadagent.IneoN/A2025-07-10
6caa23ad0e1f8b3cbfc3ec44de9bebfc53660a58df76f4756539edd5fdafee76.vbsTrojan:Script/ObfuBAT.EOFFneoN/A2025-07-10
6caa23ad0e1f8b3cbfc3ec44de9bebfc53660a58df76f4756539edd5fdafee76.vbsTrojan:Script/ObfuBAT.EOFFneoN/A2025-07-10
ab0105ec57d87547362920516f6374f729f046f1a722eef189a1ef2d813ba00a.exeti!AB0105EC57D8htiT1C725...2525EA732025-07-10
fecd05a391d8dc00fc236e0808f8191bbcaee0f1b41b55d40f4c725f71f04848.zipTrojan:Win/suspiciousLnk.CneoN/A2025-07-12
ab0105ec57d87547362920516f6374f729f046f1a722eef189a1ef2d813ba00a.exehti!1dddaaaahtiT1C725...2525EA732025-07-12
70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761.cmdti!70A92CDCD65BhtiN/A2025-07-12
70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761.cmdTrojan:Script/SuspiciousBat.A!2neoN/A2025-07-12
wscript.exeti!AD5039A88038rp-dN/A2025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!C5BE4A627FE0htiT101C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!4BDF1C5B280Brp-sT1C8C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!4BDF1C5B280Brp-sT1C8C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exehti!1dae93a9htiT101C5...29F1E3322025-07-12
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!DEAC7649D369rp-sT11155...2521E6732025-07-14
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!DEAC7649D369rp-sT11155...2521E6732025-07-14
r189722c5-ba5c-4822-ab5d-7359af018697r.jsTrojan:Script/GenericYJ.BBCneoN/A2025-07-15
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!6981D8702172htiT19C55...2521E6732025-07-15
9b757a3dbb96ff7cbea3853bdea20cbf954add2f6a2f6cebb2d0d5f0c137c0d8.exeti!9B757A3DBB96rp-sT16715...016CF08F2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exeti!968396EE196BhtiN/A2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exeti!0CBCDA1CFD01rp-sN/A2025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
404f55e7aa854f7df700f2b93b4a31d0f13dde464e74985ca9bc98ba6224cc93.exeti!404F55E7AA85htiN/A2025-07-15
tier0.dllti!95829D5ACF78htiN/A2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exehti!968cc448htiN/A2025-07-15
b501e17e249221d34a618e288e0e9a75933cea9894ec11fdcd45c0663d95eeb6.vbsVBS/Generic.cavN/A2025-07-15

McAfee detects all malware early, pre-execution (just 2-3 detections were post-execution) and leaves clean system, confirmed by Norton Power Eraser and MalwareBytes.
The tests are ongoing, but it's clear that the new architecture offers efficient security.
1752677038715.jpeg

rare instance of post-execution fileless malware block

*It's important to note that in a real world scenario, McAfee would never allow someone to download large amount of malware. From the quick web test, I wasn't able to download any.


Phishing Detection Test Coming Soon on the same thread.
1752676995074.jpeg
1752677143193.jpeg


Scam/SPAM email test:
In addition to handling files and web well, McAfee provides email protection for Outlook, Yahoo and Gmail. The protection does not scan emails that's already marked as spam. It only scans emails that pass the initial filtration. I composed several realistic scenarios, including Taylor Swift being in love with me and getting "a massive pay rise" with infostealer attached as a contract. McAfee blocked the scams. It's important to note that marketing emails containing language like "hurry up, offer expires", are not McAfee Anti-Scam's favourite and are also being flagged.

1752675908516.png
1752675928552.png
1752675962428.png
1752675988023.png


Removing emails of this sort aids malware detection and overall protection, including for unsuspecting users finances.

DeepFake detection: I don't really know where I can find deep fakes, so I turned to YouTube. Unfortunately, they are not that many and quite short, but they were identified based on audio patterns.
1752677310017.jpeg


Now let's get to perhaps the most important.

CHAPTER 3: Performance impact
Loading the interface CPU Usage: 6-7% for a few seconds
Scan with fast scanning enabled: 75% CPU usage
Scan with fast scan disabled: 20-30% CPU usage
Quick Scan duration: less than a minute
Full scan duration: <10 minutes
Observed Maximum memory usage: 270 MB (right after a scan)
Observed minimum memory usage: 160 MB (idle)
Observed CPU usage in idle: <1%
Observed CPU usage whilst opening popular and unpopular apps: <5%
System feels responsive and boots fast: yes

Additional features that may be useful:
Breach monitoring, VPN, data shredder.
Cyber-theft insurance on more expensive plans available.

Cons: the Mac protection is not migrated to the new architecture.

Final verdict: TRF approved and recommended for all types of users.
 
Last edited:
Hello guys and welcome to this McAfee review.

Before we get to the McAfee details (which will be discussed in great depth), I would like to discuss the upgrade to my practices across this forum.

This forum is not for promotion of favouritism, it is designed mainly as a technical and objective forum.
In the light of all that, I have created Trident Review Framework (TRF) 1.0 with several key highlights:
  • Software is reviewed objectively based on capabilities and performance.
  • Wherever threat detection levels are measured (or tested), I focus on realistic scenarios and broad coverage.
  • Committed to transparency: wherever threat detection tests are performed, hashes of the malware are provided (as much as possible), so users can test the same software or other software, as long as they know how to do it safely and securely.
  • Malware is pre-checked, hunted fresh (as much as possible) and guaranteed to be malicious. Malware of different types is tested.
  • Wherever the security software offers more aggressive downloads scanning (which is many solutions nowadays), malware is downloaded in realistic scenarios, giving the solution a chance to react.
  • When additional components such as email protection are offered, these are welcome. Malware (and all trouble really) comes mainly through the web and email. These are tested too.
  • When it comes to privacy, I have already created another thread here: Serious Discussion - Data Collection Core Principles (Security Software)
  • Generative AI (namely Gemini 2.5 Pro which I also use in programming) is heavily used in my research, as well as in various other tasks, such as converting antivirus logs to tables, researching patents and so on. This allows me to do more work in a shorter time.
These are the upgrades to my review practices. I am not aiming to become a reviewer number one, in fact, @Shadowra handles most of the tests excellently, editing videos and producing high number of them. This is something that I will never do, I simply lack the time of it. Hence, I will not be producing a bulk of these reviews, rather, I will be reviewing products that have attracted my interest. For them to attract my interest, they are guaranteed to be advanced. Requests for reviews should still be addressed to @Shadowra.
You can expect reviews from me every now and then, mainly when misinformation has to be combatted.

CHAPTER 1: The theory

McAfee around 2022 upgraded the products to a new cloud-based architecture. They rewrote the whole product and there were several support articles. Thread wad created by me here New Update - The new cloud-based McAfee

Since then the support articles have been deleted by McAfee.

Nevertheless, the new architecture has several key highlights:
  • Less reliant on own kernel drivers, uses Windows native components as much as possible: McAfee uses the Defender Firewall for static rules and adds on top domain/web reputation. It also uses the Windows Filtering Platform to facilitate the malicious traffic interception.
  • No "signatures" as in no malware fragments. McAfee uses highly efficient heuristic/generic detections, as well as local trust and machine learning models and YARA rules to detect malware offline. It's important to note that if you are testing McAfee with fresh malware from several websites we've all come to know, you can't expect offline detection. The offline detection will be only on old and well-known malware. Such software that is light, efficient, disconnected from the cloud and yet detects everything simply doesn't exist.
  • Upgraded cloud, this was reflected in my McAfee deep research here: Serious Discussion - Deep Research: McAfee GTI, JTI, Artemis and Other Technologies Explained
  • The new architecture creates a very lightweight product, see the performance section for details.
  • McAfee offers many features that extend the protection, such as email scanning and deep fake detection. These features solve real problems for real users, beyond detecting malware which Microsoft Defender can do too.
  • Heavily focused on machine learning and AI. Recent patents tell us more about McAfee focus
    Patent TitlePublication NumberDate (YYYY-MM-DD)Brief Description
    --- 2024 ---
    Systems and Methods for Providing User Experiences on AR/VR SystemsUS-20240060933-A12024-02-22Manages security and privacy within augmented or virtual reality environments.
    Methods and Apparatus for Comprehensive User-Centric ProtectionUS-20240034800-A12024-02-01Creates a personalized security posture based on a user's digital assets and risk profile across devices.
    Systems and methods for detecting deepfake artifactsUS-20240012586-A12024-01-11Analyzes media files for subtle inconsistencies and artifacts to identify AI-generated deepfakes.
    --- 2023 ---
    Visual Detection of Phishing Websites via Headless BrowserUS-20230396013-A12023-12-07Uses a non-graphical browser to analyze the visual components of a webpage to determine if it's a phishing site.
    Systems and Methods for Performing Multi-Faceted Security ScanningUS-20230349887-A12023-11-02Implements a multi-layered scanning approach to detect diverse and complex security threats.
    Device Reputation Score Based on Device VitalsUS-20230282672-A12023-09-07Calculates a real-time trust score for a device based on its security health, software, and behavior.
    In-Place Cloud Instance RestoreUS-20230205562-A12023-06-29Provides a method to restore a compromised cloud computing instance directly, minimizing downtime.
    Dynamic Process Criticality ScoringUS-20230185984-A12023-06-15Assigns a real-time risk score to running processes to prioritize security actions.
    Visual Identification of MalwareUS-20230089868-A12023-03-23Converts malware code into a visual representation (an image) to use image analysis for faster detection.
    Methods and systems for cloud native threat detectionUS-20230070151-A12023-03-02Provides threat detection specifically designed for the architecture of cloud-native applications (containers, etc.).
    Icon Based Phishing DetectionUS-20230047306-A12023-02-16Detects phishing attempts by analyzing the favicon or other icons associated with a website.
    --- 2022 ---
    Method and Apparatus for Hardware Based File/Document Expiry TimerUS-20220399433-A12022-12-15Enforces document access expiry dates using hardware-level security, making it harder to bypass.
    Systems and Methods for Utilizing Hardware Assisted ProtectionUS-20220366299-A12022-11-17Leverages specialized hardware security features (like Intel SGX) to protect applications and data.
    Threat Hunting Using Natural Language ProcessingUS-11451613-B22022-09-20Enables security analysts to search for threats in datasets using plain English queries instead of complex code.
    Multi-Dimensional Malware AnalysisUS-20220261685-A12022-08-18Utilizes machine learning to analyze malware across multiple dimensions (code, behavior, network) for classification.
    Systems and methods for mitigating against malicious scriptsUS-11394801-B22022-07-19Detects and neutralizes malicious scripts (e.g., Magecart) designed to steal payment info from web forms.
    Detecting Grammatical Artifacts of Machine-Translated Phishing WebsitesUS-20220191398-A12022-06-16Identifies phishing sites by spotting grammatical errors characteristic of automated translation tools.
    Systems and Methods for Monitoring IoT Device BaselineUS-11356453-B22022-06-07Establishes a normal behavior baseline for IoT devices and flags anomalous activity as a potential threat.
    Methods and Systems for Detecting RansomwareUS-20220078235-A12022-03-10Employs behavioral analysis to detect and block ransomware activity before significant encryption occurs.
  • Local Intelligence Explained:
  • AV Trust: whitelist for Neo engine, 6.49 KB in size.
  • Neo Core: the main engine, includes true file type detection, unpacking and the Neo host (12.7 MB total size).
  • Neo rules: these are heuristic rules for the Neo engine, compressed from 20.9 MB in a cab file that is 3.5 MB. Whilst some heuristics could be ran on the code, majority of AV heuristics are usually ran on behaviour, which means the Neo engine is responsible for file emulation as well.
  • Neo trust: these are exceptions from the heuristic rules, 9.99MB compressed to 2.4MB
  • Real Protect Core - these are the core behavioural monitoring machine learning models, just over 13 MB
  • Real Protect Non-PE - these are machine learning modules mainly for DLL modules, 2.7 MB
  • Real Protect Script - these are machine learning models involved in the detection of scripts (during runtime), probably focusing on suspicious, long encoded commands and so on.
  • Real Protect Static - machine learning models facilitating Pre-Execution (static analysis) on scripts, modules and portable executables, 11.7 MB.
  • TPX (according to McAfee these are the main AV generic detections), 35.7 MB -> these are updated often, if not daily
  • TPX-1, these are the YARA rules (according to the configuration file), compressed from 20 MB to 3.2 MB -> these are updated often if not daily
  • TRS, that's another part of the AV engine, 10.3 MB -> this seems to be updated every few days
  • OpenVino-based DeepFake detection models, optimised for various CPUs (McAfee just recently launched that and is still working to increase availability), just over 50 MB
  • McAfee also offers ransomware remediation/restoration
Apart from the local intelligence which is mainly used offline, McAfee is in constant connection with the cloud. TLSH (Trend Micro Locality Sensitive Hash) is used, don't be surprised by the name, it is quite popular and widely used to allow minor, local changes to files, to not void the cloud detection. The distance between 2 TLSH hashes is calculated to establish the file similarity level. TLSH is also part of the STIX standard.
TLSH is better than other methods such as SSDEEP, mainly because SSDEEP struggles with small files. McAfee also uses server-side machine learning.

Several of the new patents explain the McAfee multi-faceted approach in depth, McAfee combines online and offline reputation, heavily focused on multiple different types of machine learning, and also takes into account the file origin when taking a decision.

CHAPTER 2: Antivirus Test
McAfee was tested in the continuation of a few days. To make the test more interesting, executables were tested twice - once original, as they are and once modified. Scripts were modified to include custom functions/subs.

File NameDetection NameFinal Detection SourceTLSHDate
1c8071c09a7f4b7bce1339b71d2522547aae5b41ed8d80a821a990a2f2b991fc.jsTrojan:Script/STRRAT.DAneoN/A2025-07-08
9ce142439e553f047639d272975b85c41da29191e532348f00653723e7f00299.batti!9CE142439E55htiN/A2025-07-08
b97cd404ceab09bdd92003599566d946cead1d5d5dba528327821fe4f18108ec.msiti!B97CD404CEABhtiN/A2025-07-08
63d2e9f885c7b2df3fc23658a5c13d3df968fbe205d9c973f4f42c775bd787af.exeti!63D2E9F885C7htiT13C55...1463E7A32025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiti!2F0F2CDC865FhtiN/A2025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiti!2F0F2CDC865FhtiN/A2025-07-08
ca9d03df1842fbec86ce1be7fd74318cefaa44e61047c9667b3cc60667f0f9d9.exeti!CA9D03DF1842htiT1AFB4...05A823AF2025-07-08
2f0f2cdc865f7769b831943e2edb2a3090c3de28e45cb583a695257a6b771f3a.msiCache!257a6b771f3acacheN/A2025-07-08
ae4e172d659cdd1fb298a4bb02f361ac8db869e78cdfe5f4e21741337b088845.exeti!AE4E172D659ChtiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
6d7bd0f24261739722d0d052000ea27767c6b73446aa5d0dd8d2b9b39a105563.vbeti!6D7BD0F24261htiN/A2025-07-08
d82bd404ae9e2a0e63509e6d4114cd139f029f6c27b30d5cde0713fe54f543eb.exeti!D82BD404AE9EhtiT185E4...39F141E22025-07-08
19b6c6f8da4dd0a883cc647f0c5eaedd01a0bc1758beba1c8f9f97f4335b1f58.zipti!19B6C6F8DA4DhtiN/A2025-07-08
c4c2a82a7d454bb85fa22f12d2571639c1640ba4a6790d708f4a229f91a7a99b.exeti!C4C2A82A7D45htiN/A2025-07-08
ddd77057aed66ecef36d3b3997694acca1c72d4d23c32c684b9dff50e385b880.exeti!DDD77057AED6htiN/A2025-07-10
ddd77057aed66ecef36d3b3997694acca1c72d4d23c32c684b9dff50e385b880.exeReal Protect-LS!c16f81a15b2arp-sN/A2025-07-10
7fc0bcc654d5369fa6a18661eddfd91f058db076559f4517f0dd21f674d2fa3c.jsti!7FC0BCC654D5htiN/A2025-07-10
7fc0bcc654d5369fa6a18661eddfd91f058db076559f4517f0dd21f674d2fa3c.jsTrojan:Script/Downloadagent.IneoN/A2025-07-10
6caa23ad0e1f8b3cbfc3ec44de9bebfc53660a58df76f4756539edd5fdafee76.vbsTrojan:Script/ObfuBAT.EOFFneoN/A2025-07-10
6caa23ad0e1f8b3cbfc3ec44de9bebfc53660a58df76f4756539edd5fdafee76.vbsTrojan:Script/ObfuBAT.EOFFneoN/A2025-07-10
ab0105ec57d87547362920516f6374f729f046f1a722eef189a1ef2d813ba00a.exeti!AB0105EC57D8htiT1C725...2525EA732025-07-10
fecd05a391d8dc00fc236e0808f8191bbcaee0f1b41b55d40f4c725f71f04848.zipTrojan:Win/suspiciousLnk.CneoN/A2025-07-12
ab0105ec57d87547362920516f6374f729f046f1a722eef189a1ef2d813ba00a.exehti!1dddaaaahtiT1C725...2525EA732025-07-12
70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761.cmdti!70A92CDCD65BhtiN/A2025-07-12
70a92cdcd65bad4c5ed38adf340d5123944acde22d94c44df7ee8178f778d761.cmdTrojan:Script/SuspiciousBat.A!2neoN/A2025-07-12
wscript.exeti!AD5039A88038rp-dN/A2025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!C5BE4A627FE0htiT101C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!4BDF1C5B280Brp-sT1C8C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exeti!4BDF1C5B280Brp-sT1C8C5...29F1E3322025-07-12
c5be4a627fe03ecc5c3768b579c77fc12b1a52738dfb7c0a5a2ee0fa122c28ac.exehti!1dae93a9htiT101C5...29F1E3322025-07-12
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!DEAC7649D369rp-sT11155...2521E6732025-07-14
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!DEAC7649D369rp-sT11155...2521E6732025-07-14
r189722c5-ba5c-4822-ab5d-7359af018697r.jsTrojan:Script/GenericYJ.BBCneoN/A2025-07-15
6981d8702172dc39f302bdeb4917c0eb49f7c37b2a90bee41f64ccecc7e9497d.exeti!6981D8702172htiT19C55...2521E6732025-07-15
9b757a3dbb96ff7cbea3853bdea20cbf954add2f6a2f6cebb2d0d5f0c137c0d8.exeti!9B757A3DBB96rp-sT16715...016CF08F2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exeti!968396EE196BhtiN/A2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exeti!0CBCDA1CFD01rp-sN/A2025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
x.exeti!8C874AE8B5B3rp-sT18E75...06A297632025-07-15
404f55e7aa854f7df700f2b93b4a31d0f13dde464e74985ca9bc98ba6224cc93.exeti!404F55E7AA85htiN/A2025-07-15
tier0.dllti!95829D5ACF78htiN/A2025-07-15
968396ee196be287ac6de30d897f7e84570eb5a297642a32d7300826241349bb.exehti!968cc448htiN/A2025-07-15
b501e17e249221d34a618e288e0e9a75933cea9894ec11fdcd45c0663d95eeb6.vbsVBS/Generic.cavN/A2025-07-15

McAfee detects all malware early, pre-execution (just 2-3 detections were post-execution) and leaves clean system, confirmed by Norton Power Eraser and MalwareBytes.
The tests are ongoing, but it's clear that the new architecture offers
View attachment 289638
rare instance of post-execution fileless malware block

*It's important to note that in a real world scenario, McAfee would never allow someone to download large amount of malware. From the quick web test, I wasn't able to download any.


Phishing Detection Test Coming Soon on the same thread.
View attachment 289637View attachment 289639

Scam/SPAM email test:
In addition to handling files and web well, McAfee provides email protection for Outlook, Yahoo and Gmail. The protection does not scan emails that's already marked as spam. It only scans emails that pass the initial filtration. I composed several realistic scenarios, including Taylor Swift being in love with me and getting "a massive pay rise" with infostealer attached as a contract. McAfee blocked the scams. It's important to note that marketing emails containing language like "hurry up, offer expires", are not McAfee Anti-Scam's favourite and are also being flagged.

View attachment 289633View attachment 289634View attachment 289635View attachment 289636

Removing emails of this sort aids malware detection and overall protection, including for unsuspecting users finances.

DeepFake detection: I don't really know where I can find deep fakes, so I turned to YouTube. Unfortunately, they are not that many and quite short, but they were identified based on audio patterns.
View attachment 289641

Now let's get to perhaps the most important.

CHAPTER 3: Performance impact
Loading the interface CPU Usage: 6-7% for a few seconds
Scan with fast scanning enabled: 75% CPU usage
Scan with fast scan disabled: 20-30% CPU usage
Quick Scan duration: less than a minute
Full scan duration: <10 minutes
Observed Maximum memory usage: 270 MB (right after a scan)
Observed minimum memory usage: 160 MB (idle)
Observed CPU usage in idle: <1%
Observed CPU usage whilst opening popular and unpopular apps: <5%
System feels responsive and boots fast: yes

Additional features that may be useful:
Breach monitoring, VPN, data shredder.
Cyber-theft insurance on more expensive plans available.

Cons: the Mac protection is not migrated to the new architecture.

Final verdict: TRF approved and recommended for all types of users.
Scan speed is exceptional.
 
good news! (but) I am "confused" -- does McAfee use different names for its AV / Plans in other countries: on their US website I see Essential, Premium & Advance and more hidden away: Basic & Ultimate. You use different names. What version have you been testing. I'd tell you my version but I'm running Linux this morning. I am running Essential.
 
good news! (but) I am "confused" -- does McAfee use different names for its AV / Plans in other countries: on their US website I see Essential, Premium & Advance and more hidden away: Basic & Ultimate. You use different names. What version have you been testing. I'd tell you my version but I'm running Linux this morning. I am running Essential.
I am running LiveSafe, which nowadays is the same as Total Protection. Total Protection can be found for a low price around the web, usually just a few dollars, euro or pounds. It's on their website as well, at least in the UK.
 
I am running LiveSafe, which nowadays is the same as Total Protection. Total Protection can be found for a low price around the web, usually just a few dollars, euro or pounds. It's on their website as well, at least in the UK.
Thanks @Trident , i really like the way you test. No crap and nonsense !

@Shadowra keep up the good work ! Your video tests are the best !
 
Thanks @Trident , i really like the way you test. No crap and nonsense !

@Shadowra keep up the good work ! Your video tests are the best !
The Trident Review Framework encompasses sort of professional lab test (malware-wise) with more extensive feature testing, deep research of the architecture and performance monitoring. It’s like Neil Rubenking tests but the malware testing part is executed better. It does require time though.

I hope it allows users to draw meaningful conclusions.
 
hence my "confusion" I don't see those names on the US website and McAfee is US product? interesting and confusing (perhaps only to me)
LiveSafe was an old “all in one” type of product (Norton 360 much?). I purchased this product around 5-6 years ago.
Many features were removed as time went by, like backup for example.
Total Protection is now the more basic product, whilst the plus plans are new and offer some bells and whistles, like breach monitoring for more individuals.

It’s not really confusing, Total Protection includes everything that you need for yourself and for your family, you have the core security.

The plus plans bring more bells and whistles to everyone in the family, plus insurances and so on.
 
LiveSafe was an old “all in one” type of product (Norton 360 much?). I purchased this product around 5-6 years ago.
Many features were removed as time went by, like backup for example.
Total Protection is now the more basic product, whilst the plus plans are new and offer some bells and whistles, like breach monitoring for more individuals.

It’s not really confusing, Total Protection includes everything that you need for yourself and for your family, you have the core security.

The plus plans bring more bells and whistles to everyone in the family, plus insurances and so on.
I believe you, but I go to McAfee main page it talks about scam protection, then click "antivirus" and it shows me Essential $39, Premium $49 & Advanced $89. On lower left side it uses "Total Protection" but opens to same 3 "plans" (or products) Essential, Premium & Advanced. The is my first experience with McAfee. want to make sure I'm using the "correct" version. :rolleyes:
 
I believe you, but I go to McAfee main page it talks about scam protection, then click "antivirus" and it shows me Essential $39, Premium $49 & Advanced $89. On lower left side it uses "Total Protection" but opens to same 3 "plans" (or products) Essential, Premium & Advanced. The is my first experience with McAfee. want to make sure I'm using the "correct" version. :rolleyes:
They all offer the scam protection (which TM charges extra for) and they all offer VPN and breach monitoring. They all share the same core architecture. There is no wrong one.
 
These are all the plus plans and the basic one is probably equal to total protection.

Edit: here it is

The brazilian website is a little different compared to the Portugal one, the total protection adress will redirect to Plus Premium.


Btw I couldn't find a working trial in the brazilian website, I guess I will have to insert my credit card in the US version 😒