[Thread split]MRG Flash Tests 2012

Discussion in 'other anti-virus software' started by LoneWolf, Jun 30, 2012.

Thread Status:
Not open for further replies.
  1. LoneWolf

    LoneWolf Registered Member

  2. Noob

    Noob Registered Member

    Thanks for the update, results are quite similar from previous tests, top performers keep showing good results while others keep trying. :D
     
  3. silverfox99

    silverfox99 Registered Member

    Why are Webroot not participating in these tests? - just that i thought one of the positives of WSA was that the cloud enabled 0-day malware to be identified as malicious in the cloud and all users to be protected quicker than traditional updates would? This type of MRG test would illustrate whether that is the case?
     
    Last edited: Aug 14, 2012
  4. fax

    fax Registered Member

  5. silverfox99

    silverfox99 Registered Member

    Thanks. So the answer is Webroot could be in the MRG test if they wanted to...... so... they don't want to?

    Just makes me slightly wary of Webroot claims that they might miss the odd 0-day malware, but due to mega fast cloud technology, their users will be protected quicker than traditional AVs due to no need for download/update of signature database. And their 'roll-back' feature.

    Many of the AVs tested by MRGs are 'hybrids' anyway in that they also have cloud technology built in, often with sig database as well.

    Just disappointed WSA didn't hang in there for a while longer...... so we could see the promised improvement(s).....
     
  6. TonyW

    TonyW Registered Member

    This has been discussed here.
     
  7. get_it

    get_it Registered Member

    Kaspersky is killing the zeroth hour. Impressive!
     
  8. malexous

    malexous Registered Member

  9. carat

    carat Guest

    SUPERAntiSpyware should be renamed to FAILUREAntiSpyware ... :D
     
  10. LoneWolf

    LoneWolf Registered Member

    Not very impressive results from SAS. :thumbd:
    Nice to see DW stay on top. :thumb:
     
  11. Thankful

    Thankful Savings Monitor

    Not a very impressive performance for anyone, save Kaspersky, Emsi, and Bluepoint.
     
  12. The Hammer

    The Hammer Registered Member

    I presume your talking overall results?
     
  13. Thankful

    Thankful Savings Monitor

    Zero hour results for this specific test.
     
  14. Noob

    Noob Registered Member

    And once again the usual top performers.
    Wonder why even after 12 hours SAS only caught 1. :rolleyes:
     
  15. qakbot

    qakbot Registered Member

    MRG doesn't publish any info about the samples they test with.. no hashes, nothing. So its impossible for anyone to corroborate their results. For all we know they could be another antimalware.ru outfit sponsored by Kaspersky where Kaspersky magically detects everything at zero hour (which we all know is impossible).

    MRG, if you want people to take you seriously, publish the samples, or at least the hashes of the samples you are testing with.
     
  16. nosirrah

    nosirrah Malware Fighter

    This is a more realistic test where web blocking also counts, MD5s wont tell you anything about malware blocked that way. Sources die too quickly to publish as well. If the MD5s and sources were to be published everyone would be complaining about vendor X not really blocking sample Y (because it was web blocked but not file blocked and a MD5 does not tell you this) and source A being dead so nothing can be verified.

    Its funny that some people call this testing crap but a test where everyone does between 90% and 99% is somehow trustworthy.

    I said this earlier but I will bring the point up again. Anyone with at least moderate experience can install a VM, make some duplicates, collect some live URls from the web and do this test themselves against any AV you want. If anything this testing model is more legit as you can replicate it yourself if you don't buy the results.

    In reality you should not trust any test that you cannot replicate yourself.
     
  17. qakbot

    qakbot Registered Member

    Bruce,

    No one is saying they should not test with live URLs. They absolutely should. But just because the URL blacklisting component of the product missed the threat, doesn't mean that the product as a whole did not prevent the infection. As their own methodology suggests, they do run the sample, assuming the product did not block the URL. WHERE IS THAT SAMPLE. If a product did not prevent the infection even though it had multiple opportunities to do so by browsing to the URL, by the PE file (if any ) being created on the disk, by running the PE file and it missed all of them, I would like to see that malicious file that they ran.

    So I do think asking for the hash of the file in cases where the product(s) completely missed it, is reasonable.

    Like you said, one should not trust any test one cannot replicate, and I cannot replicate this test with the information provided.
     
  18. Amin

    Amin Registered Member

    :thumb:

    I've got the same idea about the MRG tests..

    i think it's like this. my guess :D
    MRG's owner = kaspersky
    NSS's owner = Trend micro :argh: :argh:
     
  19. SLE

    SLE Registered Member

    [joking]
    Not really...that would mean, that kaspersky had connections with warez sites like ssupdater.com.
    Another point: Some other products (Emsisoft, DefenseWall, Bluepoint) score top at MRG for a long time, longer than KL. Why no one suspects this companies?
    conclusio: not worth a discussion

    and btw.: KL scored good/top in many other tests.

    Beside that the valid points are:
    - Are those tests transparent? No
    - Is MRG trustworthy? That question anybody has to answer for him/herself.

    I don't think those 95+% mass-tests have real world relevance but that says not much about their trustworthiness. At least IBK and other didn't play "sock puppet" here at wilders...
     
    Last edited: Aug 20, 2012
  20. Amin

    Amin Registered Member

    :thumb:
     
  21. malexous

    malexous Registered Member

    The tests you can trust least are AV-Test.org tests and the tests you can trust most are Dennis Technology Labs tests. Based on transparency.
     
  22. fax

    fax Registered Member

    You should also not trust posts telling you what to trust and what not. Read yourself the methodology used, assess based on your own criteria and main interest and most of all: try the products. ;)
     
  23. Baserk

    Baserk Registered Member

    What do you mean with suspecting these companies?
    I don't see any reason to suspect Emsisoft or Ilya/DefenseWall.
    Core-tech used in those programs (also Bluepoint) is mainly whitelisting, imo not surprising to see different results compared to heavy blacklisting based tech.
    Besides, if KL performs well for a prolonged period, as it does now, would that make KL also more suspect? ;)
    Rare but now I don't get your pov.

    As the sample set used is minimal and would have to be chosen with near perfection, in order to be representative for 'all malware out there', I see the test much more as a 'responsiveness test' than detection results.
     
  24. Thankful

    Thankful Savings Monitor

    I have no reason to doubt any testing company as MRG, AV-Test, and Av-Comparatives all show Kaspersky performing well. I am not a user of Kaspersky.
     
  25. SLE

    SLE Registered Member

    I used the "joking" -Tag before, because I don't suspect any vendor. I was only referring to qakbot ("hey could be another antimalware.ru outfit sponsored by Kaspersky where Kaspersky magically detects everything at zero hour (which we all know is impossible)") and his logic.;)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice