This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy.
Accept

Mac Security Review/Test 2017

2017 Test & Review of Mac antivirus and security software

 The closed Apple ecosystem reduces the risk of malware, but does not make Mac’s immune to adware, spyware and other threats. The recent FruitFly malware for example spied on Mac users through their own webcams. In our 2017 review we tested 9 popular Mac antivirus solutions.

Continue reading…

Anti-Phishing Certification 2017

Anti-phishing test: security products published passing the 2017 test

Every year we publish the results of our phishing protection test. These tests evaluate the protection provided against phishing websites. These deceptive websites can pose a real threat to Internet users, as they attempt to steal sensitive information such as usernames, passwords, and credit card details.

https://www.av-comparatives.org/anti-phishing-test/

Continue reading…

Parental Control Certification 2017

Three parental control solutions certified

AV-Comparatives provides certification for parental control software. Parental control solutions are tested against 2,000 URLs with undesirable content in different categories, and 100 child-safe URLs. In order to be certified, a product must block at least 98% of pornographic websites, have no more than a few false alarms on child-friendly websites, and have no severe unresolved bugs (or design flaws) discovered during the review.

The certification reports can be found here: https://www.av-comparatives.org/parental-control/

Continue reading…

Follow Us

Twitter

Facebook

Tags

Real-World Protection Test test results wpdt False Alarm Malware Protection hacking deepweb iot fileless powershell security video youtube test zero day cryptography deception social engineering bug hunting antivirus security review business security corporate enterprise products incident response nextgen android review netapp certification mac anti-phishing amtso protection rttl performance anti-spam spam-test commissioned malware file detection microsoft prevalence telemetry hotline phone support detection fdt dynamic wildlist poll survey summary report whole-product testing certified eicar testing labs trusted it-security windows 10 false alarms false positives apt cyberwar cheating david harley schneier testing detection test antivirus handbook malware analysis certificates fraud netcraft phishing ssl saas small business smb EU NSA privacy safe harbor 10-Years awards Participation av comparatives comparison Virus Bulletin conference disinfection remediation removal VB2015 child protection content filtering parental control mobile tools antispy metadata spyware online sandbox jotti metascan multiscanner online scan virustotal market share OPSWAT blogs news malicious URLs malware sources websites honeypots forensics rootkit malware scam url reverse engineering penetration testing exploit python memory network botnet windows metasploit fiddler sandbox honeypot disassembler IDA browser apple email spam linux story statistics 10 Years AV-Comparatives anniversary greenwald Hero snowden surveillance Whistleblower 1984 NSA Handbook orwell pc mark speed windows 8.1 behavioral behavioural heuristics proactive retrospective ubuntu list of mobile security vendors list of security vendors for Mac list of security vendors for PC archive reports best paper award Malware Conference file-detection ISO certification data leakage data transmission award constantinus it security tips knowledgebase