- Mar 16, 2019
This Programme is called “360 Assessment & Certification” since it tests the security applications capabilities with a full spectrum of attack vectors. In the 360 Assessment, trojans, backdoors, spyware, financial malware, ransomware and “other” malicious applications are all used. Along side the traditional In-The-Wild (ITW) file-based attacks, our evaluation also contains scenarios where fileless cases and exploitation techniques, live botnets and financial malware simulators are also applied. Besides the malicious attacks, in order to evaluate the practical accuracy of AV products, they were exposed to potentially unwanted applications (PUA or Greyware) and clean files (FP) as well. Additionally, besides security capabilities tests, our assessment measured the footprint each security software on a computer’s performance.
Read the full report here