The WannaCry ransomware has been a major news story over the last few days. It has infected hundreds of thousands of computers worldwide (mostly in Russia), including some well-known companies and institutions. All the programs in our public Main Test Series now detect the WannaCry malware samples by means of signatures, but we decided to find out which of these programs would have blocked the malware sample (not the exploit) proactively, i.e. before the the outbreak started and the malware samples became known.
The Malware Protection Test is an enhancement of the File Detection Test which we performed in previous years. It assesses a security program’s ability to protect a system against infection by malicious files; what is unique about this test is that in addition to checking detection in scans, it additionally assesses each program’s last line of defence. Any samples that have not been detected e.g. on-access are executed on the test system, with Internet/cloud access available, to allow features such as behavioural protection to come into play.
The test set for Malware Protection Test consisted of about 38,000 samples. As we only use samples that have been analysed by our own in-house automated sandboxes, the quality of our sets is very high. Unlike some other testers, we only use malware in our tests, and do not include PUAs or other controversial software. What is malicious and what is “potentially unwanted” is sometimes debatable. We welcome feedback from vendors; however, the decision as to whether something can or cannot be classified as malware is ultimately up to us, even if our decisions may sometimes be regarded as imperfect.
Exponential growth of smart technology and Bluetooth Smart With the booming of Internet of Things (IoT), Bluetooth Smart, or Bluetooth v4.0 (aka Low Energy or BLE), has played an increasing role in technology adoption. According to Bluetooth SIG, the global market is expected to reach 1.2 billion Bluetooth Smart devices and 2.7 billion Bluetooth Smart…
Do you have a LinkedIn account? If yes, please feel free to follow us on LinkedIn! You just have to click the “Follow” button to stay connected to our activities.
You can find our LinkedIn company page here.
Not, I hasten to add, on anti-malware testing, on this occasion. And since I’m not a subscriber to the Cult of Schneier – certainly when he pontificates on the shortcomings of the anti-malware industry – I would have examined any thoughts he had expressed on that specific topic with enough salt to hand for several large pinches….
In just one month, certificate authorities have issued hundreds of SSL certificates for deceptive domain names used in phishing attacks. SSL certificates lend an additional air of authenticity to phishing sites, causing the victims’ browsers to display a padlock icon to indicate a secure connection.
The European Union’s highest court has today ruled against the transatlantic Safe Harbor agreement which had allowed companies to transfer European citizens’ personal data to the US. The decision, made by the European Court of Justice (ECJ), will affect thousands of companies which had been transfering a wide range of information under an agreement that allowed them to circumvent Europe’s much stricter privacy rules.