Software test for system and application protection against drive-by attacks and exploits
Lab MRG Effitas, known for its unusual methodology, often different from AV-C and AV-Test, presents the results of another software test to protect the system and applications against drive-by attacks and exploits . On the fourth page of the report, we find out that the test was sponsored by the SurfRight producer responsible for the development of HitmanPro.Alert 3.
- Avast Internet Security 2015 10.2.2214
- Bitdefender Internet Security 2015 126.96.36.1997
- EMET 5.2.5546.19547
- Emsisoft Internet Security 188.8.131.5266
- ESET Smart Security 8.0.304.0
- F-Secure Internet Security 2.15 build 361
- HitmanPro.Alert 184.108.40.206
- HitmanPro.Alert 220.127.116.11 - this version will be designed by SurfRight developers based on information from MRG Effitas
- Kaspersky Internet Security 2015 18.104.22.1685 (b)
- Malwarebytes Anti-Exploit Premium 1.05.1.1016
- McAfee Internet Security 16.8.821
- Microsoft Security Essentials 22.214.171.124
- Norton Security 126.96.36.199
- Trend Micro Internet Security 8.0.1133
The tests were carried out in the virtual system Windows 7 Enterprise x64 + SP1. The basic security features of the system, so - Windows Defender and SmartScreen in Internet Explorer have been disabled. The following Java applications have been installed: Java 188.8.131.52, Adobe Reader 9.3.0, Flash Player 184.108.40.206 (and for some Flash Player attacks 220.127.116.117), Silverlight 5.1.10411.0, Internet Explorer 8.0.7601.17514, 10.0.9200.16521, Firefox 33.1. 1 and 27.0, Google Chrome 38.0.2125.101, Microsoft Office 2010 with SP1. Windows updates have been turned off.
* Some tests have been repeated on other versions of programs - important from the point of view of CVE susceptibility.
12 sets of different exploits were used to test the effectiveness of protection against exploits, 16 different vulnerabilities (CVE) of the program were tested, exploits for Internet Explorer, Firefox and Chrome were used, as well as real malware, including the Metasploit tool .
Full report: https://www.mrg-effitas.com/w…
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.