This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy.
Accept

Anti-Spam Test (Consumer Products) 2016

Spam can be defined as unsolicited emails sent en masse. These may be sent for advertising purposes, in which case they may be seen as irritating but harmless. They may attempt to deceive the recipient into sending money to the scammer; typical examples are pretending to be a friend or relative who has lost their wallet while abroad, and so needs money to get home, or claiming that by paying a relatively small administration fee, the recipient will receive a much larger sum as lottery winnings. Other malicious spam emails may contain links to phishing pages or malware, or simply include malware as an attachment.

In this first Anti-Spam Test Report, AV-Comparatives had a look at 13 consumer anti-spam products for their ability to filter out spam emails.

Microsoft-prevalence-based analysis of the File Detection Test

This Microsoft-prevalence-based analysis report is supplementary to AV-Comparatives’ main report, already published, of the March 2016 File-Detection Test. No additional testing has been performed; rather, the existing test result have been re-analysed from a different perspective, to consider what impact the missed samples are likely to have on customers, according to telemetry data of Microsoft.

Microsoft commissioned this supplementary report. In this report, customer impact is measured according to prevalence. Essentially, some malware samples pose a greater threat to the average user than others, because they are more widespread. An impact heatmap can be found on https://impact.av-comparatives.org

More information can be read also in this Microsoft blog post.

Support Test 2016

Given the numerous risks to be found on the Internet today, effective antimalware software is essential when going online. If a user is unable to install or activate their security program, or it is not working as expected, rapid help from an expert is called for. Arguably the quickest way of getting assistance is to pick up the phone and speak to one of the manufacturer’s support agents. The aim of Support Tests is to assess how quickly and effectively the vendor’s support services cope with typical questions.

You can find the evaluation reports for the phone support in UK and Germany here.

Follow Us

Twitter

Facebook

Tags

False Alarm Malware Protection hacking deepweb iot fileless powershell security video youtube test zero day cryptography deception social engineering bug hunting antivirus security review business security corporate enterprise products incident response nextgen android review test results netapp certification mac anti-phishing Real-World Protection Test amtso protection rttl performance anti-spam spam-test commissioned malware file detection microsoft prevalence telemetry hotline phone support detection fdt dynamic wildlist poll survey summary report whole-product testing wpdt certified eicar testing labs trusted it-security windows 10 false alarms false positives apt cyberwar cheating david harley schneier testing detection test antivirus handbook malware analysis certificates fraud netcraft phishing ssl saas small business smb EU NSA privacy safe harbor 10-Years awards Participation av comparatives comparison Virus Bulletin conference disinfection remediation removal VB2015 child protection content filtering parental control mobile tools antispy metadata spyware online sandbox jotti metascan multiscanner online scan virustotal market share OPSWAT blogs news malicious URLs malware sources websites honeypots forensics rootkit malware scam url reverse engineering penetration testing exploit python memory network botnet windows metasploit fiddler sandbox honeypot disassembler IDA browser apple email spam linux story statistics 10 Years AV-Comparatives anniversary greenwald Hero snowden surveillance Whistleblower 1984 NSA Handbook orwell pc mark speed windows 8.1 behavioral behavioural heuristics proactive retrospective ubuntu list of mobile security vendors list of security vendors for Mac list of security vendors for PC archive reports best paper award Malware Conference file-detection ISO certification data leakage data transmission award constantinus it security tips knowledgebase