Feeds

Today's antivirus apps ARE 'worse at slaying hidden threats'

But they're not as rubbish as those other researchers said

High performance access to file storage

The effectiveness of antivirus products has declined, according to tests by German testing outfit AV-Test.org.

AV-Test put 25 antivirus products for home users and eight corporate endpoint protection software applications through their paces in November and December 2012.

Only an average of 92 per cent of the zero-day attacks were blocked during the tests, it said, a result that suggests that one out of 10 malware attacks succeeded. The products were able to clean 91 per cent of the infected systems, however, only 60 per cent could be put back in a condition similar to the pre-infection state, the firm said.

The tests were carried out on Windows 7 (SP1, 64-bit) machines. The firm said that three of the 25 consumer antivirus products failed to make the grade, including Microsoft Security Essentials and products from PC Tools and AhnLabs.

The eight corporate products came out better, but even so Microsoft Forefront Endpoint Protection flunked the exam after scoring protection against zero-day malware of just 78 per cent in the December tests (although this was an improvement on its score of 67 per cent in November).

Andreas Marx, chief exec of AV-Test, said: "More products than usual had difficulties [meeting] our high standards and therefore failed to receive the AV-Test certification."

The overall results of the test are far better than those obtained from a controversial set of tests run by Imperva in November, which concluded that most antivirus software detects less than 5 per cent of new malware.

Imperva's antivirus test used VirusTotal, but detractors argue that the online service is not designed to determine whether an antivirus product actually blocks a threat since it only looks at whether a signature is on file, not at other lines of defence. VirusTotal itself describes this practice as a "bad idea". The use of VT as a testing tool and other criticisms of Imperva's study are summarised at some length by David Hartley of Eset, an antivirus supplier, here.

Rob Rachwald of Imperva defended its methodology in a combative blog post last week. The details about the methodology can be found here, and the main 'Test Report' website for home users here. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.