I have appreciated AV Comparatives, and although total scores are not the only criterion for my choice, the percentage of protection is a major consideration. However, I wonder if anyone here has experienced an infections on their computers, or customer's, when one of the top AVs was installed and up to date? I do not personally know of that happening. Jerry
No need to ask. I happens all the time, that computers get infected, espessially when it comes to adware, scareware and pup's. If the latter are counted as malware, I rate a protection rate of 60%, no more. When it comes to serious malware, like ransomware, banking trojans and other stuff, it all depends on users caution. No single AV, or Security will protect You from these, if You where hit by the latest version.
I mostly see infections when AV subs run out and the database isn't updated. Besides that, it's mostly pups.
I used to use Kaspersky Total Security few years ago and it still bypass them. It's not the effectiveness of the AV. It's the ability to show vigilance against suspicious file/site that can prevent you from getting infection. Which is why now I run an anti-executable and anti-exploit prog to increase the prevention from infecting my PC.
No infections here for many years. Although some malware detection while browsing (very few over the years), with most instances of detection and access denial from external third party flash drives (many of them 5 years ago, very few in the last 2 years). Avira has been excellent with flash drives, although I can't tell for sure how much Sandboxie and occasionally Shadow Defender might have helped Avira's great record.
I just installed kaspersky IS for holidays for friend of mine and he got infected with scareware, basically it is fake website that loads and wont go away. Before they used Webroot and never had a issue. its just how lucky you are
Nowadays what I do after I got infected, learnt my lesson: 1) Clean install everything again. Turn on WD + Firewall. 2) Install sandboxie 3) Install common apps (libreoffice, skype, etc) 4) Install install NVT ERP (learn then lockdown) 5) Install SD And I'm good to go. Change settings/AV/FW whenever I needed. Rarely AV is my first choice of installation for my clean PC. They're secondary to go with once these 5 steps are achieved.
You can't prevent something that doesn't have malicious characteristics. Webpage is a webpage, if it has no malicious payload or content, it's just that, despite being a "scareware" page.
Just check support forums, it is pretty straightforward, like: I have got infected by malware, ransomware, but I have that or that paid AV installed. AVs do not prevent infections, they just slow it down. Company policies, restrictions and some very simple rules help, people would be surprised.
i agree with this, i have similar procedure when i do a clean install (mostly because Windows Upgrades).
I just cleaned my neighbor's computer last week. They were using updated AV but managed to infect system with some PUP-like malware.
I've cleaned so many computers that get infected using the supposed best AV , it's not the AV but the operator of the computer 95% of the time . And a layered approach is best . I use a mediocre AV Spywareblaster and Outpost pro firewall , so far no problems on any of the computers in my care . And they are checked with a few different scanners once a month pre boot
Layered approach and a knowledgeable user are definitely the best way to go about things. I know people who constantly end up with infected systems, no mater what security software you give them.
These days I rarely encounter actual malware, but often encounter lots of PUPs and adware. It is quite common for me to come across a computer with a paid antivirus with an expired license, so it it no longer adequately protecting thier system, or even an installed a.ntivirus that no longer runs (I see this from time to time with old versions of security software from Trend Micro). However, even if the antivirus was working and fully updated, a lot (if not most) of these PUPs would have still installed. While, there is a definite case for better detection of PUPs, the reality is that the vast majority of these PUPs are not malicious in any way (I've tested many PUPs over the years), and as such there is also a good case for them not being detected.
I agree with you on this. Precisely that is what I'm having problem with my siblings. They like to surf and download and install programs without knowing what content and from where they download it. Which is why I decided to lock their comp with anti-exe so that whenever they run the prog, it blocks them. They'll have to let me or my cousin know if they want to install it. Sounds autocratic, but necessary to educate them.
I got infected by a trojan from a flash ad back in 2008 and Norton missed it totally. Luckily SAS caught it.
Thanks for the replies. In over 15 years of using computers I have never been infected. There have been a few attempts by malware, but my AV has always caught them. I have used Avast, Avira, F Secure, BD, and KISS. Jerry
Last year a bunch of at work got hit by Powerlics. That was one nasty one. Norton' endpoint would catch it and try to delete it but couldn't. The IT company that they hired could not deal with it and that really made the manager mad. I installed Malwarbytes and it didn't even see it. Someone on here mentioned Eset had a removal program just for Powerlics and I tried that and fixed it. The manager got a new IT company. I can't remember if if spread via intranet or email but it was the manager that got it first. Now the last few weeks my work computer's hard drive has been getting hit real hard when I try do anything it just freezes. I told the IT guy and he said he would remote in at night and speed it up. It is still slow. Now I see he removed Norton from all our work computers and is going to install something else. We were told not to try fix our own computers because we are getting paid o do our regular jobs.
In the last few years the infections I find on customers computers are adware infections. around 4 years ago I would routinely see see fake antivirus/ransomware asking for people to pay using ekash becuase apparently they have been downloading illegal stuff etc. I cannot believe how sneaky adware installers are these days. when uninstalling in add/remove programs if I left default uninstall it would of installed 6 more adware programs so it would be even worse than before. downloading from the so called safe download sites can be a challenge to download the non adware versions when you have a download page with like 5 download buttons. adware really is getting out of hand. it is the same few programs I find on customers computers. I find it funny awhile back when an adware developer complained on the set forums because they detected their program as PUP. I have found that program on customers computer and they never intended to install it. i always check with customers before uninstalling programs and there has never been a time that the customer intended to install any of the programs I wanted to remove. I am sure there are still some more malicious infections out there but i just never see them anymore. I used to see quite a few rootkits routinely as well but that seems to of stopped as well. I am wondering what the current experiences of what other people normally find on customers systems.
1. Adware 2. PUPs/Scareware 3. Banking trojans (in combination with rootkits) 4. Spam-bots (in combination with rootkits) 5. Syskey locking (left by fraud supporters) 6. Ransomware 7. Others This may vary, depending on location and actually active malware campaign..., but Adware, PUPs and Scareware lead the list.
I have also seen a growth in how sneaky some of the adware uninstallers behave. You really have to have your wits about you for some of them, as each part of the uninstall can offer its buttons in a different way. One wrong press, and as you've said, you've installed more adware while you are uninstalling the original one.
I don't think things are getting any better. The bad guys are going after your bank to get at your info these days. Going after corporations and the governments to get secrets for defense by having the upper hand in an all out war or just making money.