The user, seeking to choose a suitable anti-virus solution and to install not just something, but the product which would ensure a high level of protection from malicious computer programs, is faced with the problem – how to make the right decision?
The best solution would naturally be to turn (refer) to various tests, as professional ones as possible. Do there exist any? The answer (to this question) is yes. Are they numerous (in number)? Alas, they are not. Various computer periodicals hold comparative tests of anti-virus programs quite frequently, when products are tested rather scrupulously and all parameters – from price to quality of customer support service – checked and compared.
These texts, however, cannot be considered comprehensive as far as testing the anti-virus functional is concerned. This is of course evident, as to test the anti-virus component (of the product) in detail a wide range of viruses and Trojans is required, as well as appropriate stands and testing procedures (as there are tens of different anti-virus programs) e.t.c. Thus, a special working group will be needed to collect viruses and test anti-virus programs, which will require relevant funding. It is only natural that all (or the majority of) computer journals do not have all this at their disposal. This explains the fact that the very anti-virus component (constituent) of such tests is far from being perfect, otherwise journalists turn to experts who specialize commonly involved in testing anti-virus products.
There are several experts specializing in comparative testing of anti-virus functional of various products. Their tests provide a rather detailed description of the quality of detecting various types of malicious programs, reaction speed of various anti-viral companies to newly emerging outbreaks, «proactiveness » of anti-virus programs e.t.c. The comprehensive and detailed tests can be used to compare the exactly these features of different anti-virus solutions.
However unfortunately, only the mentioned featured are tested, whereas all the rest – conduct of anti-viruses in «real» situations, for instance, repair of an infected system, anti-virus reaction to the infected web-site, resource intensity and accuracy of check of archives and installators – are not.
This is another problem, arising when one is choosing an anti-virus system – comprehensive tests are not available and the problem of choice of anti-virus solution is vital. Unfortunately, examples of comprehensive testing of anti-virus functional for most typical situations of computer life in the network are either nowhere in evidence or unknown to broad public. The anti-virus industry is rather young and comprehensive comparative testing (as, for instance, in the automobile industry) is yet non-existent.
In Q1 2018, we observed a significant increase in both the total number and duration of DDoS attacks against Q4 2017. The new Linux-based botnets Darkai (a Mirai clone) and AESDDoS are largely responsible for this hike. Read Full Article
In March 2018, Japanese media reported the hijacking of DNS settings on routers located in Japan, redirecting users to malicious IP addresses. The redirection led to the installation of Trojanized applications named facebook.apk and chrome.apk that contained Android Trojan-Banker. During our research we received some invaluable information about the true scale of this attack, we decided to call it ‘Roaming Mantis’. Read Full Article
Q4 2017 represented something of a lull: both the number and duration of DDoS attacks were down against the previous quarter. At the same time, the increase in the number of attacks on honeypot traps in the runup to holiday sales indicates that cybercriminals are keen to expand their botnets at the most opportune moment by pressuring owners of online resources and preventing them from making a profit. Read Full Article
According to KSN data, Kaspersky Lab solutions detected and repelled 277,646,376 malicious attacks from online resources located in 185 countries all over the world. Read Full Article
Our growing dependence on technology, connectivity and data means that businesses present a bigger attack surface than ever. Targeted attackers have become more adept at exploiting their victims’ vulnerabilities to penetrate corporate defences while ‘flying under the radar’. Read Full Article
In the third quarter of 2017, we registered a considerable increase in the number of both DDoS attacks and their targets. Traditionally, China is the country with the largest number of attack sources and targets. It was followed by the United States and South Korea. The popularity of Windows OS as a basis for creating a botnet has fallen noticeably, while the share of Linux-based botnets increased proportionally. Read Full Article
A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or any other active content. Read Full Article
The threat from ransomware continues to grow. Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers. In May, we saw the biggest ransomware epidemic in history, called WannaCry. Read Full Article
According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. Read Full Article
The second quarter quite clearly showed that the DDoS-attack threat is perceived rather seriously. Some companies were prepared to pay cybercriminals literally after their first demand without waiting for the attack itself. This set off a whole new wave of fraud involving money extortion under threat of a DDoS attack, also known as “ransom DDoS”. Read Full Article