logo
#

Latest news with #AV-Comparatives

NordVPN certified as the only anti-phishing VPN – for the second year running
NordVPN certified as the only anti-phishing VPN – for the second year running

Tom's Guide

time4 days ago

  • Business
  • Tom's Guide

NordVPN certified as the only anti-phishing VPN – for the second year running

NordVPN has announced that its Threat Protection Pro feature has been recognized as one of the leading tools in detecting phishing sites and NordVPN remains the only VPN with certified phishing protection. NordVPN tops our best VPN list and the effectiveness of Threat Protection Pro is one of the reasons for that. Testing by AV-Comparatives found that Threat Protection Pro detected and blocked 90% of phishing websites. It's the second year in a row that NordVPN has received certification from AV-Comparitives – the company also rated it as the best VPN malware protection back in November 2024. Threat Protection Pro is included in all NordVPN Plus plans and higher. Tom's Guide (and our friends at TechRadar) currently have an exclusive deal where you can purchase a two-year NordVPN Plus plan for $3.76 per month ($105.36 up front pre-tax). With that, you'll get four extra months of protection for free, as well as a $20 Amazon gift card. NordVPN Plus: $20 Amazon gift card + 4 months FREEWe rate NordVPN as our #1 VPN. It's super fast, boasts class-leading privacy and security, plus it can unblock streaming sites with ease. What you'll get...• Protection for up to 10 devices• Speeds of 950 Mbps+• Streaming service unblocking• Post-quantum encryption• Threat Protection Pro• NordPass password manager• 30-day money-back guarantee• $20 Amazon gift card (for a limited time only)• 28 months protection for $3.76 per month ($105.36 up front pre-tax) Many leading VPNs offer a form of threat protection but NordVPN's Threat Protection Pro is a consistently high performer. AV-Comparatives, an independent testing lab, conducted its extensive testing between May 15 and 28 2025. It aimed to evaluate the effectiveness of Threat Protection Pro in detecting and blocking phishing websites. The tool was tested against 228 phishing URLs and 200 clean ones to see how well it would protect a user. Threat Protection Pro detected 90% of phishing websites, exceeding the 85% success rate required by AV-Comparatives to be approved for its Anti-Phishing Protection certification. The product must also not raise any false alarms with legitimate online banking and related sites. Domininkas Virbickas, product director at Threat Protection said: "Phishing websites are one of the biggest threats to internet users worldwide." "They steal personal data, login credentials, and financial information from unsuspecting users before redirecting them or disappearing entirely." "We put our greatest effort into protecting our customers from the consequences caused by these sites." Threat Protection Pro will do a great job at keeping harmful phishing sites at bay. But it's not perfect and there are actions you can take to further protect yourself. Always be mindful of the links you're clicking on. Is it a genuine link for a genuine site? Who sent you the link? You should only click on links if you know they're safe. Subtle character changes or shortened URLs can hide the true nature of malicious links, so always be vigilant and use features like Threat Protection Pro. Never give out your personal information or login details unless you're 100% sure it's safe to do so. If you get a text from your bank, or other seemingly reputable contact, never click on the links provided. Always ring them back and confirm the request's validity. Make sure you secure your accounts with strong, complex, passwords. Many passwords can be cracked in seconds, so the more robust they are, the better. The best password managers can generate and store secure passwords for you, so you don't need to rely on remembering them all yourself. NordPass is a great password manager and it's included with NordVPN Plus plans and above. Finally, enable two factor authentication (2FA). This acts as a second line of defence against hackers. If your password is compromised, 2FA provides an additional layer of security. One-time codes are a common authentication step and a hacker won't be able to infiltrate your accounts without it. Many password managers, including NordPass, come with 2FA. We test and review VPN services in the context of legal recreational uses. For example: 1. Accessing a service from another country (subject to the terms and conditions of that service). 2. Protecting your online security and strengthening your online privacy when abroad. We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.

AV-Comparatives Validates Real-World Threat Detection in 2025 EDR XDR MDR Certification Testing
AV-Comparatives Validates Real-World Threat Detection in 2025 EDR XDR MDR Certification Testing

Cision Canada

time15-06-2025

  • Business
  • Cision Canada

AV-Comparatives Validates Real-World Threat Detection in 2025 EDR XDR MDR Certification Testing

INNSBRUCK, Austria, June 15, 2025 /CNW/ -- "As cyberattacks evolve, detection can't be a checkbox. Our 2025 EDR/XDR Certification helps CISOs assess how effectively their tools uncover stealthy, real-world threats." - Andreas Clementi, ceo and founder, AV-Comparatives This independent evaluation tested enterprise cybersecurity solutions under advanced threat scenarios. The goal: to assess their ability to detect and report real-world attacks with precision and visibility. Unlike, e.g. the EPR Test, which focuses on prevention, the EDR test simulates complex attack scenarios to assess how well a product detects and logs each stage of an intrusion, providing insights into its visibility, telemetry quality, and threat detection precision. Threat visibility based on threat hunting capabilities is also considered. AV-Comparatives is pleased to announce that five out of seven solutions have achieved certification so far under our transparent and rigorous methodology. Certified Products – EDR, XDR and MDR Solutions The following products earned certification in the 2025 test round CrowdStrike Falcon Pro ESET PROTECT Enterprise Cloud G DATA 365 MXDR (MDR solution) Kaspersky Next EDR Expert (in the pilot test) Palo Alto Networks Cortex XDR Pro One Methodology for EDR, XDR and MDR While initially designed to evaluate EDR and XDR capabilities, the test can equally be applied to MDR (Managed Detection and Response) offerings. In this round, G DATA successfully participated with their MDR solution, demonstrating that even managed offerings can be assessed under realistic, controlled attack conditions. A Focus on Real-World Visibility This evaluation simulates Advanced Persistent Threat (APT) attacks, using known Tactics, Techniques, and Procedures (TTPs) from frameworks such as MITRE ATT&CK. All products were tested in monitoring mode only, meaning prevention features were disabled. The goal: to measure how well threats are detected and reported, not blocked. Highlights of the methodology: Execution of complex attack chains Validation of detections via alerts in the management console or through manual threat hunting in telemetry Transparent certification model: only products meeting the detection threshold are certified and publicly listed Methodological Improvements and the Road Ahead The 2025 test incorporated feedback from independent analysts, resulting in greater transparency, enhanced scoring, and deeper telemetry validation. Further enhancements are planned for the 2026 certification test. The EDR Detection Validation Test is open to EPP, EDR, XDR, and MDR vendors seeking independent validation of their detection capabilities. Certification offers vendors industry recognition and deep technical insight into their solution's real-world performance. Contact us to participate in the next test cycle. Cybersecurity and Antivirus Test Results are available at or the following vendors: Avast, AVG, Avira, Bitdefender, Checkpoint, Cisco, CrowdStrike, Elastic, Fortinet, F-Secure, ESET, G DATA, Gen Digital. Google, Intego, K7 Computing, Kaspersky, Malwarebytes, ManageEngine, McAfee, Microsoft, NetSecurity, Nordsec, Norton, Palo Alto Networks, Rapid7, SenseOn, Sophos, Total Defense, TotalAV, Trellix, TrendMicro, VIPRE, WithSecure and many more

Does Antivirus Software Collect Your Data? Yes, But Here's Why You Shouldn't Worry
Does Antivirus Software Collect Your Data? Yes, But Here's Why You Shouldn't Worry

Yahoo

time09-05-2025

  • Yahoo

Does Antivirus Software Collect Your Data? Yes, But Here's Why You Shouldn't Worry

We count on antivirus software to keep our devices and personal data safe from cyber threats. But some of that software may be collecting data about you while it protects you. That's the concern raised in a 2023 report by AV-Comparatives, an independent testing lab that evaluated how 20 of the most popular antivirus programs handle user data. The study looked at what data these products collect, how much control users have over it, and whether that data is shared with third parties. It also considered how easy companies' data policies are to understand and how transparent they are about these policies. The takeaway? Antivirus tools do their job, but many gather more data than most people realize. Here's what you need to know. Read more: Best Antivirus Software for Maximum Protection in 2025 Antivirus software must know some things about your system to keep it safe. But in many cases, it collects more information than it needs. The AV-Comparatives report found that most antivirus programs gather a mix of system info, network details, user data and file-related information. That includes basics like your operating system version, how much RAM you have, your CPU type and even your computer's name. Some go further, collecting BIOS info, a list of installed apps, or details about running processes. They also pull in network data, such as your local and external IP addresses, DNS server and network name. This helps them spot potential threats, but it also gives them a clear picture of where and how you connect. User data is where things start to feel more personal. About half of the products in the study send your Windows username to the company. Depending on your setup, that could be your full name. Time zone, language and general location info are also collected. And if your antivirus includes web protection, it might track every URL you visit, the previous URL you came from and the site's IP address. Then there's the stuff on your computer. Antivirus software often uploads file names, locations and hashes when scanning something suspicious. But in some cases, it also sends entire files -- including harmless ones like documents -- without asking first. That could be a problem. Let's say your antivirus software collected your data for legitimate reasons. What it does with that data matters. According to the AV-Comparatives report, some antivirus companies are pretty responsible when it comes to how they handle your data. Others, not so much. F-Secure, G Data and K7 were among the top performers when it comes to data collection and sharing practises. Norton, Panda and McAfee, however, scored poorly for how they share user data. Now, to be fair, not all data sharing is bad. Some of it helps improve malware detection. For example, many antivirus programs send suspicious files or file hashes to services like VirusTotal, where different security companies work together to identify threats. That kind of collaboration makes sense and helps keep everyone safer. But not every company draws the line in the right place. AVG, which was later acquired by Avast, collected users' browsing history and sold it to third-party advertisers. The FTC eventually banned Avast in June 2024 from selling or licensing users' web-browsing data and fined it $16.5 million. Not exactly the kind of behavior you want from software that's supposed to be guarding your privacy. Some antivirus tools are clearer than others about what's going on behind the scenes. If privacy matters to you, it's worth digging into these details before hitting install. In a perfect world, antivirus software would only collect and share data that was absolutely necessary. Since that's not the world we live in, you'll need to be proactive in protecting yourself. Here's how. Most antivirus programs have options tucked away in their menus that let you opt out of things like: Usage tracking Cloud analysis Uploading suspicious files Logging the websites you visit These features are often turned on by default, so it's worth spending a couple of minutes poking around and turning off anything you don't want running in the background. If you're not sure what's being shared right now, you can always disable the antivirus first and review the options later. Many people fly through the software setup process without realizing they're agreeing to send all kinds of data. Look for any checkboxes related to product improvement or data sharing and uncheck them if you'd rather not participate. Free antivirus tools can be tempting, but they need to make money somehow. That sometimes means collecting and selling user data. If you care about privacy, it's usually safer to go with a paid version from a vendor that's more upfront about how it handles your info. In the AV-Comparatives report, F-Secure, ESET and G Data all scored well for how they handle and share data. Avoid the software that didn't do so well. Yeah, we know. It's not the most fun thing to read, but the privacy policy and end-user license agreement will usually tell you what kind of data is collected and what the company does with it. Some vendors even have simplified versions or FAQs that make things easier to understand. Here are a few you can check out: Bitdefender ESET Kaspersky It's fair to worry about how much data antivirus software collects, but that doesn't mean you should ditch it altogether. Antivirus is still one of the most important tools you can have to protect yourself from malware, phishing attacks and all the other junk floating around online. Yes, some programs grab more data than they probably need, but most use it to improve security, not to spy on you. The key is picking antivirus software that's upfront about what it collects and gives you some control over it. Plenty of great options offer solid protection without going overboard on data collection. So yes, it's smart to be cautious, but going without antivirus software leaves you way more exposed than using a well-reviewed one that respects your privacy.

ESET receives prestigious Anti-Tampering Certification for the second time - Middle East Business News and Information
ESET receives prestigious Anti-Tampering Certification for the second time - Middle East Business News and Information

Mid East Info

time05-05-2025

  • Mid East Info

ESET receives prestigious Anti-Tampering Certification for the second time - Middle East Business News and Information

ESET, a global leader in cybersecurity solutions, is proud to announce that its ESET PROTECT Elite cloud solution has passed AV-Comparatives' rigorous Anti-Tampering Test, certifying its power to protect against tampering attacks that could result in permanent, temporary, partial or complete loss of product functionality. Usually, once a cybercriminal compromises a network/machine, staying under the radar is mission critical. This is best achieved by eliminating endpoint security software, likely by using compromised credentials to access the network and then using legitimate tools as much as possible (living off the land). This is tampering, and it can lead to major security disasters if it is not protected against. Regarding anti-tampering, ESET excelled in tests as far back as 2014 and 2015, when independent testing found ESET's consumer offering 100% successful in preventing tampering attacks, a major milestone compared to the 32 other participating vendors. The same was confirmed in business products in 2023, when AV-Comparatives awarded ESET PROTECT Entry the highest degree of approval, affirming ESET's continuous focus on products that are secure-by-design. In testing this year, ESET PROTECT Elite received acclaim for its top-notch anti-tampering security, with AV-Comparatives highlighting its password protected settings as a very relevant functionality. Besides that, the solution excelled in mitigating against registry key, DLL, file system and even kernel driver manipulation, among others. This shows that our protection agent is qualified to defend against a vast array of attacks and techniques known to tamper with key processes. These anti-tampering capabilities are applied across all advanced ESET PROTECT tiers, including our XDR-enabling component, ESET Inspect. 'If a security tool can be tampered with, it's not a security tool — it's a vulnerability. At ESET, we take that principle seriously. We strive to deliver the highest level of protection, and anti-tampering has been one of our core defenses against hacking attempts for many years. In fact, it's been over a decade since we pioneered several technologies specifically designed to safeguard our software from manipulation — making us one of the first vendors to do so. We're proud that AV-Comparatives has recognized that our commitment to this crucial functionality remains strong and relevant,' said Zuzana Legáthová, Director of Test, Analyst Relations and Market Research. For any endpoint security solution, independent testing done by analysts is how a product receives professional acclaim and certification proving its expert competence. With Anti-Tampering becoming increasingly relevant in view of novel sophisticated threats such as EDR killers, it's crucial for any business to seek a solution that can fill security gaps that might not be so obvious, such as the integrity of the product itself. Read AV-Comparatives' Anti-Tampering Certification report on ESET PROTECT Elite cloud. Read further to discover how anti-tampering is relevant for everyday security. Explore ESET PROTECT Elite and its multi-layered security power capable of stopping sophisticated attacks. About ESET ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it's endpoint, cloud or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network.

ESET PROTECT Elite Receives Anti-Tampering Certification
ESET PROTECT Elite Receives Anti-Tampering Certification

Channel Post MEA

time05-05-2025

  • Channel Post MEA

ESET PROTECT Elite Receives Anti-Tampering Certification

ESET announced that its ESET PROTECT Elite cloud solution has passed AV-Comparatives' rigorous Anti-Tampering Test, certifying its power to protect against tampering attacks that could result in permanent, temporary, partial or complete loss of product functionality. Usually, once a cybercriminal compromises a network/machine, staying under the radar is mission critical. This is best achieved by eliminating endpoint security software, likely by using compromised credentials to access the network and then using legitimate tools as much as possible (living off the land). This is tampering, and it can lead to major security disasters if it is not protected against. Regarding anti-tampering, ESET excelled in tests as far back as 2014 and 2015, when independent testing found ESET's consumer offering 100% successful in preventing tampering attacks, a major milestone compared to the 32 other participating vendors. The same was confirmed in business products in 2023, when AV-Comparatives awarded ESET PROTECT Entry the highest degree of approval, affirming ESET's continuous focus on products that are secure-by-design. In testing this year, ESET PROTECT Elite received acclaim for its top-notch anti-tampering security, with AV-Comparatives highlighting its password protected settings as a very relevant functionality. Besides that, the solution excelled in mitigating against registry key, DLL, file system and even kernel driver manipulation, among others. This shows that our protection agent is qualified to defend against a vast array of attacks and techniques known to tamper with key processes. These anti-tampering capabilities are applied across all advanced ESET PROTECT tiers, including our XDR-enabling component, ESET Inspect. 'If a security tool can be tampered with, it's not a security tool — it's a vulnerability. At ESET, we take that principle seriously. We strive to deliver the highest level of protection, and anti-tampering has been one of our core defenses against hacking attempts for many years. In fact, it's been over a decade since we pioneered several technologies specifically designed to safeguard our software from manipulation — making us one of the first vendors to do so. We're proud that AV-Comparatives has recognized that our commitment to this crucial functionality remains strong and relevant,' said Zuzana Legáthová, Director of Test, Analyst Relations and Market Research. For any endpoint security solution, independent testing done by analysts is how a product receives professional acclaim and certification proving its expert competence. With Anti-Tampering becoming increasingly relevant in view of novel sophisticated threats such as EDR killers, it's crucial for any business to seek a solution that can fill security gaps that might not be so obvious, such as the integrity of the product itself. 0 0

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store