I'd like to say a few words.
I have read most of the messages, which are very pertinent.
But when I see AV-Comparative and others, I have to intervene.
Please know that I have no animosity towards these test companies, nor towards my fellow testers. But when I don't like it, I tend to say things.
Personally, I give no credit to Av-Comparative, Av-Tests etc...
Not because they're bad, but I very rarely see their test protocols, which for me should be mentioned...
These test editors very rarely execute, contenting themselves with contextual analysis which, frankly, doesn't make a test.
=> Using ONLY EXE files is not enough to make a test.
There are different systems for infecting a machine.
The classic e-mail trap with a PDF/ONE/JS or VBS file that downloads and launches a payload.
There are also exploit sites called Drive-by Download, which will target all vulnerabilities at the same time until the malware is installed.
And don't forget bloated or re-packed files, which can contain malicious code.
=> Relying ONLY on an analysis is TOTALLY insufficient for a test.
Antivirus software doesn't just have an antimalware engine!
There are several shields to counter a threat.
Whether it's basic protection, HIPS/IDS or anti-attack shields, these protections are not often highlighted in these tests.
If one day you'd like to see my test protocol, I'd be delighted to show it to you!
The only one I'll give credit to is
@Adrian Ścibor , because it totally covers what I've mentioned.
Enjoy