Viruscope (behavior analysis) - analyzes the behavior of apps and processes that signify signs of a malware infection and can also reverse changes made by viruses.HIPS (Host Intrusion Prevention System) - monitors and controls the actions of apps and processes on your system, alerting you of any suspicious behaviors.This prevents zero-day attacks and unknown threats from compromising your system. It uses a default-deny approach that blocks all unknown files by default and scans them in a sandbox (a virtual environment) until they’re proven to be safe. The score isn’t perfect but good enough to give you a secure browsing experience if you practice safe surfing habits. In my tests, it blocked 96% of the threats I exposed it to, including rootkits, trojans, adware, and spyware. Real-Time Protection - Decent Protection Against Most Complex ThreatsĬomodo’s real-time protection is decent but not at par with top competitors like Norton and McAfee. In comparison, Norton’s full scan detects the stealthiest of viruses, takes much less time, and doesn’t give any false positives. I expected a detection rate of at least 98% in its full scan after taking 3 hours. Overall, Comodo’s malware detection abilities are below average. I had to manually trust or clean the files wrongly rated by the scan. Comodo marked some files as untrustworthy even though they had valid security certificates. However, I found that some ratings were inaccurate and inconsistent. The Rating Scan checks programs on your system and reports their rating status based on Comodo’s online database and other factors. It had trouble identifying complex threats like file-less malware that don’t leave traces on your hard drive. Out of the 150 EICAR malware samples I planted on my testing machine, Comodo’s full scan removed 142 of them. The full scan gave me a much better detection score of 95%, but it was still below the industry average. You can quickly check critical areas on your hard drive with Comodo’s Quick Scan. It missed some malware samples I had intentionally placed on my system like ZeroAccess rootkit, which is good at evading traditional scans. While its speed was commendable, its accuracy was below average during my testing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |