The best way to protect your PC and laptop is to compare 11 antivirus scanners and choose the best security solution.
Silent Trojans
Antivirus Test 2017: Blackmail software is on the rise, but providers of security software have learned. Who defends the domestic PC best against Ransomware, infected websites and other threats?
Rootkits in reverse
The malware scene has become "violent" in the past years, so at least the user appears before the screen, because blackmail programs, in English ransomware, have been on the advance for years. Ransomware directly accesses the data of the users and makes them illegible - with encryption. Then the user is also directly attacked. A message will appear on the screen asking the victim to ransom. Some encryption trojans, such as Jigsaw, delete a file every hour to put the victim under further pressure. Resistance seems futile. Because the newer versions of Ransomware use strong encryption algorithms, so you can often not recover the affected files without the blackmailer.
Ransomware makers have season
After all, there is a little hope. Anti-virus vendors offer decryption tools for some Ransomware variants.
Protection from Ransomware
Before 2013 one was mainly afraid of another type of Trojans. Trojans, who secretly in the PC einnisten and first silent. They spy credit card information, eavesdrop the user's bank transactions, or use the conquered PC to attack servers anywhere in the world. These Trojans are still active and their impact is bad enough. However, secret trojans usually leave the data of the users in peace. And the secret data traffic of the malware users without special knowledge about network technology often do not even notice. Malicious viruses that directly attack, erase, or modify user data were rare before 2013.
A particularly tricky variant of the "silent" Trojans is the rootkits, which are deeply embedded in the operating system and thus make their discovery more difficult. But this threat has now lost much of its horror. The rootkits have been declining for years, reports McAfee (PDF). McAfee is responsible for the widespread use of 64-bit systems and current operating systems, such as Windows 8 and Windows 10, which provide protection against rootkit programs. In the malware reports of many other manufacturers the category of rootkits is no longer mentioned. Unlike Ransomware. This kind of malicious software is just in the upturn.
The extortion programs have been on the rise since about the year 2017. The growth rates are scary. Trend Micro's report for the first half-year, 2017 even the Ransomware (Trend Micro, Reign of Ransomware, TrendLabs 2017 1H Security Roundup), reports a growth of 172 percent in the Ransomware families - only in the first , Half-year 2017. Kaspersky Security Bulletin 2017 states that Kaspersky's security programs have detected some 50,000 computers with Ransomware in corporate networks. This is more than twice as many infections with this kind of malware as in 2017. Approximately 58% of computers in corporate networks were attacked in 2017.
How does the Ransomware get to the computer? Trend Micro, has investigated the causes of Ransomware and found nothing really astonishing. In the case of the known infections, which, however, were only 47 percent of the analyzed cases of Ransomware, e-mail spam was the most frequent vehicle in the first half of 2017 (71 percent). This is far behind, with 18% of infections caused by exploit kits - by calling up infected sites. An exploit kit is a software collection that runs on web servers. If a PC is connected to one of these infected servers, the scripts running there look for: vulnerabilities, for example, in the user's browser. The malicious software reaches these computers via its weak points. The remaining infections are, according to Trend Micro, about exploits (5 percent), software vulnerabilities, infected apps and Teamviewer software (3 percent each). The manufacturer asserts that these infections do not result from a security breach in Teamviewer. Rather, hacked Teamviewer accounts were used to distribute the Surprise extortion trojan.
Because Ransomware uses the same creeping paths as other malicious software, the proven recipes are enough to defend. Use an anti-virus program, either a free or one of our test candidates. All programs in the test can scan e-mail for malicious attachments and block them. If you accidentally clicked on a dangerous link, there is still a chance, practically all test candidates have browser plugins that can prevent the loading of dangerous sites. With a little luck, the plugin recognizes the imminent danger. Otherwise, as the very last line of defense, still support advertising and script blockers such as Noscript and Adblock Plus. Nevertheless, the most important tool remains the same: the healthy understanding of people: If an email is suspicious, you should delete it and not open it at all. The same applies to obscure weblinks. Very important: Patch operating system, browser and other programs regularly. This reduces the probability of being offered an exploit kit. Some, programs in the test field can scan the system for obsolete software, thus reducing the risk of infection.
And if you've downloaded a blackjack? Also, you have a chance with the candidates in our test field. Virtually all antivirus programs can detect malicious software on their behavior, for example when it starts to encrypt files in the background. An example is BitDefender Total Security, 2017, which specifically monitors document and image folders and prevents encryption.
But what happens if the malware on the virus scanner pre-routed and actually files, has encrypted? Then you need to keep your peace and do not pay a ransom. Now you need a good backup of your important data. However, set your backup software to hold multiple versions of your backup files. If your files were encrypted without you noticing, your files could be overwritten by encrypted files.
Even if your data has been encrypted and there is no backup, there is still a glimmer of hope. Many security companies provide decryption tools that allow you to restore many infected files. These include, for example, Kaspersky, Emsisoft, AVG and Trend Micro.
The internet of things (Internet of Things, IoT), that is computerized, household appliances from the surveillance camera to the heating control, have long been in the sights of safety researchers. The Mirai Botnet network in September and October of this year has now become clear. At the end of September 2017 the site of the security expert Brian Krebs was attacked by thousands of IoT devices. The attacks were so violent that the site had to be taken off the grid at short notice. In October, the Internet service provider Dyn was the victim. As a result, there were disruptions to large Internet providers such as Amazon, Twitter, Github and Airbnb. Among the infected devices were Brian Krebs, not just classic IoT devices, but also printers and routers.
Intelligent things in mind
The incident shows that antivirus programs nowadays need to protect not only the PC but the entire home network. An entry gate is, for example, the domestic ADSL router to which most devices are connected. This is why we have added roles to the evaluation of routers this year.
In the gallery you will find the ranking of our eleven test candidates. For detailed information on the detection and defense of the individual suites, please refer to issue 1/17 of the PC Magazine.
Kaspersky Total Security. The product landed during the virus scan, with the virus removal and with the equipment in the first places. The suites of Bitdefender and Avira are practically on the same level, and Avira is even a performance master in the test field. Anyone who goes to one of these programs will certainly not do anything wrong. Worked forward, since our last test ESET Smart Security. The security suite was hardly tested in the AV Comparatives test, false alarms, and was the top-line of the Virenscan results.
Avast, offers a good equipment, but was able to keep up with the anti-virus functions, not quite with the top group. AVG Ultimate, on the other hand, was a top spot when it came to virus cleanup, and it showed a meager performance in terms of equipment and hard drive scanning.
This is followed by Emsisoft Internet Security, which has good antivirus values, but the features are rather minimalistic. There follow, programs with quite good equipment, but weaknesses in the; antivirus functions. F-Secure provided a macroscopic result as a virus guard, but provided many false alarms and showed gaps in the distance. McAfee LiveSafe, and Norton Security Premium, with interesting features such as protection programs, children and cloud storage to back up important data at times, from Ransomware. Symantec, however, plagued as a virus guardian and in the case of false alarms. McAfee gave average results, and found it among the other virus monitors in the penultimate place.
Conclusion
The Windows Defender, which is integrated into Windows, is far-flung in, and can not compete as a protection program either from the scanning performance or from the other functions
No comments:
Post a Comment