SlideShare a Scribd company logo
1 of 17
Download to read offline
Are free Android virus scanners any good?
                      Authors: Hendrik Pilz, Steffen Schindler




                                Published: 10. November 2011

                                                  Version: 1.1
Are free Android virus scanners any good?




Copyright © 2011 AV-TEST GmbH. All rights reserved.

Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany

Phone +49 (0) 391 60754-60, Fax +49 (0) 391 60754-69

For further details, please visit: http://www.av-test.org




                                                   1
Are free Android virus scanners any good?



Content


  1. Test report ............................................................................................................................. 3
  2. Test results ............................................................................................................................ 4
  3. Product details
         • Antivirus Free ........................................................................................................... 5
         • BluePoint Antivirus Free ........................................................................................... 6
         • GuardX Antivirus ...................................................................................................... 7
         • Kinetoo Malware Scan ............................................................................................. 8
         • LabMSF Antivirus beta ............................................................................................. 9
         • Privateer Lite .......................................................................................................... 10
         • Zoner AntiVirus Free .............................................................................................. 11
         • F-Secure Mobile Security ....................................................................................... 12
         • Kaspersky Mobile Security ..................................................................................... 13
  4. Appendix ............................................................................................................................. 14




                                                                       2
Are free Android virus scanners any good?



1. Test report
The search query "Antivirus" in the Android market lists many
programs, which pretend to protect a mobile device against
threats in the Android world. AV-TEST wanted to know whether
the apps are really protecting the user. The world wide
acknowledged security institute had a deeper look on some of
them and tested, whether their installation is worth the effort.

The test field consisted of free apps, which were compatible with the test device Samsung GalaxyTab
(GT-P1010). The products of the well known security vendors Kaspersky and F-Secure were tested as
well for comparison. The Android version was 2.2.1 (45.3% of all Android devices use version 2.2, as
of 2011-10-03 1). The products were installed through the official Android market. They had to prove
their functionality in on-demand-scanning and the detection of 10 widely spread malicious apps
which were to be installed on the test device.

During the scan of the test device the different implementations of the tools were noticeable. Some
of them scanned installed apps only and consequently did not find the Android malware located on
the SD memory card. This is not necessarily a problem: As long as the malware resides only on the
removable media and is not installed on the system, it cannot do much harm. The scanned test set
contained 83 Android installation packages (APK) and 89 Dalvik binaries (DEX). No files were older
than 5 months. The best results claimed the products of Kaspersky and F-Secure, which detected at
least 50% of all malware samples already in inactive state. The best free app was Zoner AntiVirus
Free with 32% detected malicious apps. All other scanners detected at best 10% of the apps, some
didn’t detect anything at all.

The results of the real-time guard functionality were quite shocking. The guard should warn the user
upon installation of malicious apps. The 10 malware samples were chosen with the help of AV-TEST's
own analysis system, which uses more than 30 virus scanners to analyze the APK files. The test set
contains the 10 files, which were most often classified as malware by the virus scanners. Because of
the high detection rates these files can be considered as well known and should therefore be
detected by a reliable virus-scanner. Did the vendors of mobile security apps know them, too? The
test results will show: Zoner AntiVirus Free was the only app with a respectable result. It detected 8
out of 10 samples during the installation attempts. BluePoint AntiVirus Free, Kinetoo Malware Scan
and Privateer Lite still warned against one malicious app. Antivirus Free by Creative Apps, GuardX
Antivirus and LabMSF Antivirus beta failed completely. In comparison to the free apps the
commercial products of F-Secure and Kaspersky detected all threats without a problem.

The number of installations, which is given on the market website, shows that many users trust these
free apps, although they do not offer a reliable protection. The by far most popular program is
Antivirus Free by Creative Apps with 1,000,000 to 5,000,000 installations. The only useful free
product Zoner AntiVirus Free has just 50,000 - 100,000 users. The best protection was achieved by
the commercial tools of the well known security software vendors Kaspersky and F-Secure. The
circulation of obviously near to useless security apps endangers those, who trust them and install
apps from 3rd party app markets without further suspiciousness.

1
 http://developer.android.com/resources/dashboard/platform-versions.html
Portions of this page are reproduced from work created and shared by Google and used according to terms
described in the Creative Commons 3.0 Attribution License.

                                                    3
Are free Android virus scanners any good?



2.         Test results
                                                                                                                                                  Detection
                   Name                             Vendor          Version            Installation         Rating 2      Size
                                                                                                                                       Manual Scan        On installation
Antivirus Free                              Creative Apps               1.3.1      1.000.000 - 5.000.000   4,5 / 41375     0,4 MB          0 / 172 (0%)        0 / 10 (0%)
http://zrgiu.com/
BluePoint Antivirus Free                    BluePoint Security         4.0.14            10.000 - 50.000     4,2 / 549     3,4 MB          2 / 172 (1%)       1 / 10 (10%)
http://www.bluepointsecurity.com/
GuardX Antivirus                            Qstar                            2.3      100.000 - 500.000     4,6 / 2824     1,2 MB          0 / 172 (0%)        0 / 10 (0%)
http://guardx.qstar.org/
Kinetoo Malware Scan                        CPU Media SARL              1.6.9            10.000 - 50.000     4,2 / 184     0,2 MB        11 / 172 (6%)        1 / 10 (10%)
http://kinetoo.com/
LabMSF Antivirus beta                       LabMSF                           1.0           1.000 - 5.000      4,3 / 16     1,0 MB          0 / 172 (0%)        0 / 10 (0%)
http://labmsf.com/
Privateer Lite                              Online Vault                2.1.4              1.000 - 5.000      4,5 / 28     1,1 MB          0 / 172 (0%)       1 / 10 (10%)
http://www.privateerlabs.net/privateer-mobile-released
Zoner AntiVirus Free                        ZONER                       1.2.4          50.000 - 100.000     4,6 / 1614     0,9 MB       55 / 172 (32%)        8 / 10 (80%)
http://www.zonerantivirus.com

Commercial products for comparison

                   Name                             Vendor          Version            Installation          Rating       Size
                              3
F-Secure Mobile Security                    F-Secure                         7.1               -               -         4,5 MB
http://www.f-secure.com/de/web/home_de/protection/mobile-security/overview
Kaspersky Mobile Security                   Kaspersky Lab             9.10.77        10.000 - 50.000       4,2 / 992     3,8 MB
http://www.kaspersky.com/kaspersky_mobile_security

2
    Android Market Rating / Number of ratings
3
    F-Secure Mobile Security is not (yet) available via the Android Market


                                                                                           4
Are free Android virus scanners any good?



3. Product details

(Creative Apps) -- http://zrgiu.com/
Antivirus Free




Functions                                                       Overview
     •     real-time scan                                       Installations         1.000.000 – 5.000.000
     •     manual scan                                          Manual scan           0 / 0%
     •     automatic updates                                    Real-time scan        0 / 0%


Permissions
Your location
coarse (network-based) location


Network communication
(full Internet access)

(view network state)


Phone calls
(Read phone state and identity)


Storage
(Modify/delete USB storage contents modify/delete SD card
contents)




                                                            5
Are free Android virus scanners any good?




(BluePoint Security, Inc.) -- http://www.bluepointsecurity.com/
BluePoint Antivirus Free




Functions                                                       Overview
     •     real-time scan                                       Installations                     10.000 - 50.000
     •     scans mail, sms and downloads                        Manual scan                       2 / 1%
     •     manual scan (apps, user data,                        Real-time scan                    1 / 10%
           removable media)


Permissions
Hardware controls                                               System-tools
(Take pictures and videos)                                      (Format external storage)

(Control vibrator)                                              (Mount and unmount filesystems)

                                                                (Modify global system settings)
Your location
(Fine (GPS) location)                                           (Display system-level alerts)

(Coarse (network-based) location)                               (Retrieve running applications)

                                                                (Measure application storage space)
Your personal information
(Read sensitive log data)
                                                                (Kill background processes)

Network communication                                           (Write Access Point Name settings)
(Full Internet access)
                                                                (Change Wi-Fi state)
(Create Bluetooth connections)
                                                                (Prevent device from sleeping)
(View network state)
                                                                (Bluetooth administration)
(View Wi-Fi state)

(Receive data from Internet)
                                                                Default
                                                                (Delete applications)

Storage                                                         (Directly install applications)
(Modify/delete USB storage contents modify/delete SD card
contents)                                                       (Modify secure system settings)

                                                                (Modify battery statistics)




                                                            6
Are free Android virus scanners any good?




(Qstar) -- http://guardx.qstar.org/
GuardX Antivirus




Functions                                     Overview
     •     Real-time scan                     Installations         100.000 - 500.000
     •     manual scan                        Manual scan           0 / 0%
     •     manual and automatic updates       Real-time scan        0 / 0%


Permissions
Network communication
(Full Internet access)

(View network state)


Phone calls
(Read phone state and identity)




                                          7
Are free Android virus scanners any good?




(CPU Media SARL) -- http://kinetoo.com/
Kinetoo Malware Scan




Functions                                     Overview
           •     scan system and apps         Installations         10.000 - 50.000
           •     Real-time scan               Manual scan           11 / 6%
                                              Real-time scan        1 / 10%


Permissions
Network communication
(Full Internet access)

(View network state)


System-tools
(Automatically start at boot)




                                          8
Are free Android virus scanners any good?




(LabMSF) -- http://labmsf.com/
LabMSF Antivirus beta




Functions                                                             Overview
     •     Real-time scan                                             Installations         1.000 - 5.000
     •     manual scan                                                Manual scan           0 / 0%
     •     manual and automatic updates                               Real-time scan        0 / 0%


Permissions
Network communication
(Full Internet access)


Storage
(Modify/delete USB storage contents modify/delete SD card contents)




                                                                9
Are free Android virus scanners any good?




(Online Vault) -- http://www.privateerlabs.net/privateer-mobile-released
Privateer Lite




Functions                                                             Overview
     •     Real-time scan                                             Installations         1.000 - 5.000
     •     manual scan                                                Manual scan           0 / 0%
                                                                      Real-time scan        1 / 10%


Permissions
Network communication
(Full Internet access)

(View network state)


System-tools
(Automatically start at boot)

(Retrieve running applications)


Storage
(Modify/delete USB storage contents modify/delete SD card contents)




                                                               10
Are free Android virus scanners any good?




(ZONER, Inc.) -- http://www.zonerantivirus.com
Zoner AntiVirus Free




Functions                                             Overview
     •     Theft Protection (find and control         Installations                     50.000 - 100.000
           your missing device)                       Manual scan                       55 / 32%
     •     Installed app protection                   Real-time scan                    8 / 80%
     •     On-access and on-demand scan
     •     Phone filtering (block calls and
           messages)
     •     Parental lock for calls
     •     Kontroll Functions
     •     Task Manager
     •     Automatic and manual database
           updates
     •     Home screen widget

Permissions
Services that cost you money
(Directly call phone numbers)                         Phone calls
                                                      (Intercept outgoing calls)
(Send SMS messages)
                                                      (Read phone state and identity)
Your location
(Fine (GPS) location)                                 Storage
                                                      (Modify/delete USB storage contents modify/delete SD card
                                                      contents)
Your messages
(Receive SMS)
                                                      Hardware controls
(Receive MMS)                                         (Control vibrator)


Network communication                                 System-tools
(Full Internet access)                                (Automatically start at boot)

(View network state)                                  (Kill background processes)


Your personal information
(Read contact data)




                                                 11
Are free Android virus scanners any good?




(F-Secure) -- http://www.f-secure.com/en/web/home_global/protection/mobile-security/overview
F-Secure Mobile Security




Functions
     •     malware protection
     •     safe browsing
     •     Locate a lost or stolen smartphone
     •     Parental control
     •     your children can be located via their mobile phone


Permissions
Your personal information                                        Phone calls
(Add or modify calendar events and send email to guests)         (Read phone state and identity)

(Read calendar events)
                                                                 System-tools
(Write contact data)                                             (Format external storage)

(Read Browser’s history and bookmarks)                           (Mount and unmount filesystems)

(Write Browser’s history and bookmarks)                          (Write Access Point Name settings)

                                                                 (Change Wi-Fi state)
Services that cost you money
(Send SMS messages)
                                                                 (Prevent device from sleeping)

Your location                                                    (Retrieve running applications)
(Fine (GPS) location)
                                                                 (Modify global system settings)
(Coarse (network-based) location)
                                                                 (Write sync settings)

Your messages                                                    (Read sensitive log data)
(Receive SMS)

(Read SMS or MMS)

(Edit SMS or MMS)


Network communication
(Full Internet access)


Storage
(Modify/delete USB storage contents modify/delete SD card
contents)




                                                            12
Are free Android virus scanners any good?




(Kaspersky Lab) -- http://www.kaspersky.com/kaspersky_mobile_security
Kaspersky Mobile Security




Functions
     •     Privacy Protection - for your eyes only
     •     Locate a lost or stolen smartphone
     •     Secure contacts, photos and files from unauthorized access
     •     Block unwanted calls or SMSs
     •     Parental control
     •     Protect your smartphone from malware and network attacks

Permissions
Your accounts                                             (Write contact data)
(Manage the accounts list)
                                                          (Read calendar events)
(Discover known accounts)
                                                          (Add or modify calendar events and send email to guests)

Services that cost you money
(Directly call phone numbers)
                                                          Phone calls
                                                          (Read phone state and identity)
(Send SMS messages)
                                                          (Modify phone state)

Your location
(Coarse (network-based) location)
                                                          Storage
                                                          (Modify/delete USB storage contents modify/delete SD card
(Fine (GPS) location)                                     contents)

(Mock location sources for testing)                       System-tools
                                                          (Prevent device from sleeping)
(Access extra location provider commands)
                                                          (Write sync settings)
Your messages
                                                          (Modify global system settings)
(Read SMS or MMS)
                                                          (Write Access Point Name settings)
(Edit SMS or MMS)
                                                          (Change network connectivity)
(Receive SMS)
                                                          (Automatically start at boot)
Network communication
(Full Internet access)                                    (Read subscribed feeds)

(View network state)                                      (Read sync settings)

                                                          (Set preferred applications)
Your personal information
(Read contact data)                                       (Kill background processe




                                                    13
Are free Android virus scanners any good?
4. Appendix

                 Permission                        Description
                                                   Access coarse location sources such as the cellular network database to
                 coarse (network-based) location   determine an approximate device location, where available. Malicious
                                                   applications can use this to determine approximately where you are.
 Your location                                     Access fine location sources such as the Global Positioning System on the
                 fine (GPS) location               device, where available. Malicious applications can use this to determine
                                                   where you are, and may consume additional battery power.
                 full Internet access              Allows an application to create network sockets.
                 View network state                Allows an application to view the state of all networks.
                                                   Allows an application to view configuration of the local Bluetooth device,
              Create Bluetooth connections
   Network                                         and to make and accept connections with paired devices.
communication View Wi-Fi state                     Allows an application to view the state of all networks.
                                                   Allows the applications to accept cloud to device messages sent by the
                 Receive data from Internet        application's service. Using this service will incur data usage. Malicious
                                                   applications may cause excess data usage.
                                                   Allows the application to access the phone features of the device. An
                                                   application with this permission can determine the phone number and serial
  Phone calls    Read phone state and identity
                                                   number of this phone, whether a call is active, the number that call is
                                                   connected to and the like.
                 Modify/delete USB storage
                                                   Allows an application to write to the USB storage. Allows an application to
    Storage      contents modify/delete SD card
                                                   write to the SD card.
                 contents
                                                   Allows application to take pictures and videos with the camera. This allows
  Hardware       Take pictures and videos
                                                   the application at any time to collect images the camera is seeing.
   controls      Control vibrator                  Allows the application to control the vibrator.
                 Format external storage           Allows the application to format removable storage.
                                                   Allows the application to mount and unmount filesystems for removable
                 Mount and unmount filesystems
                                                   storage.
                                                   Allows an application to modify the system's settings data. Malicious
                 Modify global system settings
                                                   applications can corrupt your system's configuration.
                                                   Allows an application to show system alert windows. Malicious applications
                 Display system-level alerts
                                                   can take over the entire screen.
                                                   lows application to retrieve information about currently and recently
                 Retrieve running applications     running tasks. May allow malicious applications to discover private
                                                   information about other applications.
                 Measure application storage
                                                   Allows an application to retrieve its code, data, and cache sizes
                 space
                                                  Allows an application to kill background processes of other applications,
 System-tools    Kill background processes
                                                  even if memory isn't low.
                                                  Allows an application to modify the APN settings, such as Proxy and Port of
                 Write Access Point Name settings
                                                  any APN.
                                                  Allows an application to connect to and disconnect from Wi-Fi access points,
                 Change Wi-Fi state
                                                  and to make changes to configured Wi-Fi networks.
                 Prevent device from sleeping     Allows an application to prevent the device from going to sleep.
                                                  Allows an application to have itself started as soon as the system has
                 Bluetooth administration         finished booting. This can make it take longer to start the device and allow
                                                  the application to slow down the overall device by always running.
                                                  Allows an application to have itself started as soon as the system has
                 Automatically start at boot      finished booting. This can make it take longer to start the device and allow
                                                  the application to slow down the overall device by always running.
                 Change network connectivity      Allows an application to change the state of network connectivity.




                                                        14
Are free Android virus scanners any good?
                Permission                      Description
                                                Allows application to retrieve information about currently and recently
                Retrieve running applications   running tasks. May allow malicious applications to discover private
System-tools                                    information about other applications.
                                                Allows an application to modify the sync settings, such as whether sync is
                Write sync settings
                                                enabled for Contacts.
                                                Allows an application to delete Android packages. Malicious applications can
                Delete applications
                                                use this to delete important applications.
                                                Allows an application to install new or updated Android packages. Malicious
                Directly install applications   applications can use this to add new applications with arbitrarily powerful
   Default                                      permissions.
                                                Allows an application to modify the system's secure settings data. Not for
                Modify secure system settings
                                                use by normal applications.
                                                Allows the modification of collected battery statistics. Not for use by normal
                Modify battery statistics
                                                applications.
                                                Allows the application to access the phone features of the device. An
                                                application with this permission can determine the phone number and serial
                Read phone state and identity
                                                number of this phone, whether a call is active, the number that call is
                                                connected to and the like.
                                                Allows application to process outgoing calls and change the number to be
 Phone calls    Intercept outgoing calls        dialed. Malicious applications may monitor, redirect, or prevent outgoing
                                                calls.
                                                Allows the application to control the phone features of the device. An
                Modify phone state              application with this permission can switch networks, turn the phone radio
                                                on and off and the like without ever notifying you.
                                                Allows an application to read from the system's various log files. This allows
                read sensitive log data         it to discover general information about what you are doing with the device,
                                                potentially including personal or private information.
                                                Allows an application to read all of the contact (address) data stored on your
                Read contact data               device. Malicious applications can use this to send your data to other
                                                people.
                                                Allows an application to add or change the events on your calendar, which
                add or modify calendar events
                                                may send email to guests. Malicious applications can use this to erase or
                and send email to guests
                                                modify your calendar events or to send email to guests.
Your personal                                   Allows an application to read all of the calendar events stored on your
 information    Read calendar events            device. Malicious applications can use this to send your calendar events to
                                                other people.
                                                Allows an application to modify the contact (address) data stored on your
                Write contact data              device. Malicious applications can use this to erase or modify your contact
                                                data.
                Read Browser’s history and      Allows the application to read all the URLs that the Browser has visited, and
                bookmarks                       all of the Browser's bookmarks.
                                                Allows an application to modify the Browser's history or bookmarks stored
                Write Browser’s history and
                                                on your device. Malicious applications can use this to erase or modify your
                bookmarks
                                                Browser's data.




                                                    15
Are free Android virus scanners any good?
                 Permission                    Description
                                               Allows the application to call phone numbers without your intervention.
                 Directly call phone numbers   Malicious applications may cause unexpected calls on your phone bill. Note
 Services that
                                               that this does not allow the application to call emergency numbers.
cost you money                                 Allows application to send SMS messages. Malicious applications may cost
                 Send SMS messages
                                               you money by sending messages without your confirmation.
                                               Allows application to receive and process SMS messages. Malicious
                 Receive SMS                   applications may monitor your messages or delete them without showing
                                               them to you.
                                               Allows application to receive and process MMS messages. Malicious
                 Receive MMS                   applications may monitor your messages or delete them without showing
Your messages                                  them to you.
                                               Allows application to read SMS messages stored on your device or SIM card.
                 Read SMS or MMS
                                               Malicious applications may read your confidential messages.
                                               Allows application to write to SMS messages stored on your device or SIM
                 Edit SMS or MMS
                                               card. Malicious applications may delete your messages.




                                                   16

More Related Content

What's hot

How to Audit
How to AuditHow to Audit
How to Auditayousif
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsUltraUploader
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new milleniumUltraUploader
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14Javier Gonzalez
 
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyTyler Shields
 
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover 0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover Ken Herold
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Kaspersky
 
200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds? 200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds? Blueboxer2014
 

What's hot (11)

Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 
How to Audit
How to AuditHow to Audit
How to Audit
 
A study of anti virus' response to unknown threats
A study of anti virus' response to unknown threatsA study of anti virus' response to unknown threats
A study of anti virus' response to unknown threats
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Antivirus software testing for the new millenium
Antivirus software testing for the new milleniumAntivirus software testing for the new millenium
Antivirus software testing for the new millenium
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
 
Incompatible
IncompatibleIncompatible
Incompatible
 
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover 0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
 
200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds? 200:1 - Do You Trust Your Mobile Security Odds?
200:1 - Do You Trust Your Mobile Security Odds?
 

Viewers also liked

むかし名言集bot作りました!
むかし名言集bot作りました!むかし名言集bot作りました!
むかし名言集bot作りました!Shinya Takamaeda-Y
 
A wild kimberley expedition
A wild kimberley expeditionA wild kimberley expedition
A wild kimberley expeditionaussierscblog
 
Sintesis informativa 17 11 2012
Sintesis informativa 17 11 2012Sintesis informativa 17 11 2012
Sintesis informativa 17 11 2012megaradioexpress
 
PresentacióN
PresentacióNPresentacióN
PresentacióNSilviarev
 
Out Of Africa
Out Of AfricaOut Of Africa
Out Of Africajbaynham
 

Viewers also liked (7)

むかし名言集bot作りました!
むかし名言集bot作りました!むかし名言集bot作りました!
むかし名言集bot作りました!
 
A wild kimberley expedition
A wild kimberley expeditionA wild kimberley expedition
A wild kimberley expedition
 
Sintesis informativa 17 11 2012
Sintesis informativa 17 11 2012Sintesis informativa 17 11 2012
Sintesis informativa 17 11 2012
 
PresentacióN
PresentacióNPresentacióN
PresentacióN
 
Foro Xo
Foro XoForo Xo
Foro Xo
 
Ar target
Ar targetAr target
Ar target
 
Out Of Africa
Out Of AfricaOut Of Africa
Out Of Africa
 

Similar to Avtest Kasım 2011 Bedava Android Antivirüs Araştırması

Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishDaniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAnatoliy Tkachev
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelledlosalamos
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 

Similar to Avtest Kasım 2011 Bedava Android Antivirüs Araştırması (20)

Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avc fdt 201303_en
Avc fdt 201303_enAvc fdt 201303_en
Avc fdt 201303_en
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 
Avc fdt 201209_en
Avc fdt 201209_enAvc fdt 201209_en
Avc fdt 201209_en
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 

More from Erol Dizdar

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiErol Dizdar
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERErol Dizdar
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİErol Dizdar
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİErol Dizdar
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİErol Dizdar
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiErol Dizdar
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİErol Dizdar
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıErol Dizdar
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Erol Dizdar
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıErol Dizdar
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIErol Dizdar
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIErol Dizdar
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiErol Dizdar
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakErol Dizdar
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk YardımErol Dizdar
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Erol Dizdar
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Erol Dizdar
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakErol Dizdar
 

More from Erol Dizdar (20)

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem Terminolojisi
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLER
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİ
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem Terminolojisi
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİ
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) Bozuklukları
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç Kullanımı
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMI
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMI
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmak
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk Yardım
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmak
 

Recently uploaded

Culture Clash_Bioethical Concerns_Slideshare Version.pptx
Culture Clash_Bioethical Concerns_Slideshare Version.pptxCulture Clash_Bioethical Concerns_Slideshare Version.pptx
Culture Clash_Bioethical Concerns_Slideshare Version.pptxStephen Palm
 
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...baharayali
 
Unity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfUnity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfRebeccaSealfon
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfUnity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfRebeccaSealfon
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Naveed Bangali
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...Amil Baba Mangal Maseeh
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
A Costly Interruption: The Sermon On the Mount, pt. 2 - Blessed
A Costly Interruption: The Sermon On the Mount, pt. 2 - BlessedA Costly Interruption: The Sermon On the Mount, pt. 2 - Blessed
A Costly Interruption: The Sermon On the Mount, pt. 2 - BlessedVintage Church
 
Seerah un nabi Muhammad Quiz Part-1.pdf
Seerah un nabi  Muhammad Quiz Part-1.pdfSeerah un nabi  Muhammad Quiz Part-1.pdf
Seerah un nabi Muhammad Quiz Part-1.pdfAnsariB1
 
No 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaNo 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaAmil Baba Mangal Maseeh
 
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls DubaiDubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubaikojalkojal131
 

Recently uploaded (20)

Culture Clash_Bioethical Concerns_Slideshare Version.pptx
Culture Clash_Bioethical Concerns_Slideshare Version.pptxCulture Clash_Bioethical Concerns_Slideshare Version.pptx
Culture Clash_Bioethical Concerns_Slideshare Version.pptx
 
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Pushp vihar Delhi Escort service
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Pushp vihar  Delhi Escort service🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Pushp vihar  Delhi Escort service
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Pushp vihar Delhi Escort service
 
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...Topmost Black magic specialist in Saudi Arabia  Or Bangali Amil baba in UK Or...
Topmost Black magic specialist in Saudi Arabia Or Bangali Amil baba in UK Or...
 
Unity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdfUnity is Strength 2024 Peace Haggadah + Song List.pdf
Unity is Strength 2024 Peace Haggadah + Song List.pdf
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdfUnity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
Unity is Strength 2024 Peace Haggadah_For Digital Viewing.pdf
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
young Call girls in Dwarka sector 3🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 3🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 3🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 3🔝 9953056974 🔝 Delhi escort Service
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
🔝9953056974 🔝young Delhi Escort service Vinay Nagar
🔝9953056974 🔝young Delhi Escort service Vinay Nagar🔝9953056974 🔝young Delhi Escort service Vinay Nagar
🔝9953056974 🔝young Delhi Escort service Vinay Nagar
 
young Whatsapp Call Girls in Adarsh Nagar🔝 9953056974 🔝 escort service
young Whatsapp Call Girls in Adarsh Nagar🔝 9953056974 🔝 escort serviceyoung Whatsapp Call Girls in Adarsh Nagar🔝 9953056974 🔝 escort service
young Whatsapp Call Girls in Adarsh Nagar🔝 9953056974 🔝 escort service
 
St. Louise de Marillac: Animator of the Confraternities of Charity
St. Louise de Marillac: Animator of the Confraternities of CharitySt. Louise de Marillac: Animator of the Confraternities of Charity
St. Louise de Marillac: Animator of the Confraternities of Charity
 
A Costly Interruption: The Sermon On the Mount, pt. 2 - Blessed
A Costly Interruption: The Sermon On the Mount, pt. 2 - BlessedA Costly Interruption: The Sermon On the Mount, pt. 2 - Blessed
A Costly Interruption: The Sermon On the Mount, pt. 2 - Blessed
 
Seerah un nabi Muhammad Quiz Part-1.pdf
Seerah un nabi  Muhammad Quiz Part-1.pdfSeerah un nabi  Muhammad Quiz Part-1.pdf
Seerah un nabi Muhammad Quiz Part-1.pdf
 
No 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in CanadaNo 1 astrologer amil baba in Canada Usa astrologer in Canada
No 1 astrologer amil baba in Canada Usa astrologer in Canada
 
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls DubaiDubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
Dubai Call Girls Skinny Mandy O525547819 Call Girls Dubai
 

Avtest Kasım 2011 Bedava Android Antivirüs Araştırması

  • 1. Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1
  • 2. Are free Android virus scanners any good? Copyright © 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0) 391 60754-60, Fax +49 (0) 391 60754-69 For further details, please visit: http://www.av-test.org 1
  • 3. Are free Android virus scanners any good? Content 1. Test report ............................................................................................................................. 3 2. Test results ............................................................................................................................ 4 3. Product details • Antivirus Free ........................................................................................................... 5 • BluePoint Antivirus Free ........................................................................................... 6 • GuardX Antivirus ...................................................................................................... 7 • Kinetoo Malware Scan ............................................................................................. 8 • LabMSF Antivirus beta ............................................................................................. 9 • Privateer Lite .......................................................................................................... 10 • Zoner AntiVirus Free .............................................................................................. 11 • F-Secure Mobile Security ....................................................................................... 12 • Kaspersky Mobile Security ..................................................................................... 13 4. Appendix ............................................................................................................................. 14 2
  • 4. Are free Android virus scanners any good? 1. Test report The search query "Antivirus" in the Android market lists many programs, which pretend to protect a mobile device against threats in the Android world. AV-TEST wanted to know whether the apps are really protecting the user. The world wide acknowledged security institute had a deeper look on some of them and tested, whether their installation is worth the effort. The test field consisted of free apps, which were compatible with the test device Samsung GalaxyTab (GT-P1010). The products of the well known security vendors Kaspersky and F-Secure were tested as well for comparison. The Android version was 2.2.1 (45.3% of all Android devices use version 2.2, as of 2011-10-03 1). The products were installed through the official Android market. They had to prove their functionality in on-demand-scanning and the detection of 10 widely spread malicious apps which were to be installed on the test device. During the scan of the test device the different implementations of the tools were noticeable. Some of them scanned installed apps only and consequently did not find the Android malware located on the SD memory card. This is not necessarily a problem: As long as the malware resides only on the removable media and is not installed on the system, it cannot do much harm. The scanned test set contained 83 Android installation packages (APK) and 89 Dalvik binaries (DEX). No files were older than 5 months. The best results claimed the products of Kaspersky and F-Secure, which detected at least 50% of all malware samples already in inactive state. The best free app was Zoner AntiVirus Free with 32% detected malicious apps. All other scanners detected at best 10% of the apps, some didn’t detect anything at all. The results of the real-time guard functionality were quite shocking. The guard should warn the user upon installation of malicious apps. The 10 malware samples were chosen with the help of AV-TEST's own analysis system, which uses more than 30 virus scanners to analyze the APK files. The test set contains the 10 files, which were most often classified as malware by the virus scanners. Because of the high detection rates these files can be considered as well known and should therefore be detected by a reliable virus-scanner. Did the vendors of mobile security apps know them, too? The test results will show: Zoner AntiVirus Free was the only app with a respectable result. It detected 8 out of 10 samples during the installation attempts. BluePoint AntiVirus Free, Kinetoo Malware Scan and Privateer Lite still warned against one malicious app. Antivirus Free by Creative Apps, GuardX Antivirus and LabMSF Antivirus beta failed completely. In comparison to the free apps the commercial products of F-Secure and Kaspersky detected all threats without a problem. The number of installations, which is given on the market website, shows that many users trust these free apps, although they do not offer a reliable protection. The by far most popular program is Antivirus Free by Creative Apps with 1,000,000 to 5,000,000 installations. The only useful free product Zoner AntiVirus Free has just 50,000 - 100,000 users. The best protection was achieved by the commercial tools of the well known security software vendors Kaspersky and F-Secure. The circulation of obviously near to useless security apps endangers those, who trust them and install apps from 3rd party app markets without further suspiciousness. 1 http://developer.android.com/resources/dashboard/platform-versions.html Portions of this page are reproduced from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. 3
  • 5. Are free Android virus scanners any good? 2. Test results Detection Name Vendor Version Installation Rating 2 Size Manual Scan On installation Antivirus Free Creative Apps 1.3.1 1.000.000 - 5.000.000 4,5 / 41375 0,4 MB 0 / 172 (0%) 0 / 10 (0%) http://zrgiu.com/ BluePoint Antivirus Free BluePoint Security 4.0.14 10.000 - 50.000 4,2 / 549 3,4 MB 2 / 172 (1%) 1 / 10 (10%) http://www.bluepointsecurity.com/ GuardX Antivirus Qstar 2.3 100.000 - 500.000 4,6 / 2824 1,2 MB 0 / 172 (0%) 0 / 10 (0%) http://guardx.qstar.org/ Kinetoo Malware Scan CPU Media SARL 1.6.9 10.000 - 50.000 4,2 / 184 0,2 MB 11 / 172 (6%) 1 / 10 (10%) http://kinetoo.com/ LabMSF Antivirus beta LabMSF 1.0 1.000 - 5.000 4,3 / 16 1,0 MB 0 / 172 (0%) 0 / 10 (0%) http://labmsf.com/ Privateer Lite Online Vault 2.1.4 1.000 - 5.000 4,5 / 28 1,1 MB 0 / 172 (0%) 1 / 10 (10%) http://www.privateerlabs.net/privateer-mobile-released Zoner AntiVirus Free ZONER 1.2.4 50.000 - 100.000 4,6 / 1614 0,9 MB 55 / 172 (32%) 8 / 10 (80%) http://www.zonerantivirus.com Commercial products for comparison Name Vendor Version Installation Rating Size 3 F-Secure Mobile Security F-Secure 7.1 - - 4,5 MB http://www.f-secure.com/de/web/home_de/protection/mobile-security/overview Kaspersky Mobile Security Kaspersky Lab 9.10.77 10.000 - 50.000 4,2 / 992 3,8 MB http://www.kaspersky.com/kaspersky_mobile_security 2 Android Market Rating / Number of ratings 3 F-Secure Mobile Security is not (yet) available via the Android Market 4
  • 6. Are free Android virus scanners any good? 3. Product details (Creative Apps) -- http://zrgiu.com/ Antivirus Free Functions Overview • real-time scan Installations 1.000.000 – 5.000.000 • manual scan Manual scan 0 / 0% • automatic updates Real-time scan 0 / 0% Permissions Your location coarse (network-based) location Network communication (full Internet access) (view network state) Phone calls (Read phone state and identity) Storage (Modify/delete USB storage contents modify/delete SD card contents) 5
  • 7. Are free Android virus scanners any good? (BluePoint Security, Inc.) -- http://www.bluepointsecurity.com/ BluePoint Antivirus Free Functions Overview • real-time scan Installations 10.000 - 50.000 • scans mail, sms and downloads Manual scan 2 / 1% • manual scan (apps, user data, Real-time scan 1 / 10% removable media) Permissions Hardware controls System-tools (Take pictures and videos) (Format external storage) (Control vibrator) (Mount and unmount filesystems) (Modify global system settings) Your location (Fine (GPS) location) (Display system-level alerts) (Coarse (network-based) location) (Retrieve running applications) (Measure application storage space) Your personal information (Read sensitive log data) (Kill background processes) Network communication (Write Access Point Name settings) (Full Internet access) (Change Wi-Fi state) (Create Bluetooth connections) (Prevent device from sleeping) (View network state) (Bluetooth administration) (View Wi-Fi state) (Receive data from Internet) Default (Delete applications) Storage (Directly install applications) (Modify/delete USB storage contents modify/delete SD card contents) (Modify secure system settings) (Modify battery statistics) 6
  • 8. Are free Android virus scanners any good? (Qstar) -- http://guardx.qstar.org/ GuardX Antivirus Functions Overview • Real-time scan Installations 100.000 - 500.000 • manual scan Manual scan 0 / 0% • manual and automatic updates Real-time scan 0 / 0% Permissions Network communication (Full Internet access) (View network state) Phone calls (Read phone state and identity) 7
  • 9. Are free Android virus scanners any good? (CPU Media SARL) -- http://kinetoo.com/ Kinetoo Malware Scan Functions Overview • scan system and apps Installations 10.000 - 50.000 • Real-time scan Manual scan 11 / 6% Real-time scan 1 / 10% Permissions Network communication (Full Internet access) (View network state) System-tools (Automatically start at boot) 8
  • 10. Are free Android virus scanners any good? (LabMSF) -- http://labmsf.com/ LabMSF Antivirus beta Functions Overview • Real-time scan Installations 1.000 - 5.000 • manual scan Manual scan 0 / 0% • manual and automatic updates Real-time scan 0 / 0% Permissions Network communication (Full Internet access) Storage (Modify/delete USB storage contents modify/delete SD card contents) 9
  • 11. Are free Android virus scanners any good? (Online Vault) -- http://www.privateerlabs.net/privateer-mobile-released Privateer Lite Functions Overview • Real-time scan Installations 1.000 - 5.000 • manual scan Manual scan 0 / 0% Real-time scan 1 / 10% Permissions Network communication (Full Internet access) (View network state) System-tools (Automatically start at boot) (Retrieve running applications) Storage (Modify/delete USB storage contents modify/delete SD card contents) 10
  • 12. Are free Android virus scanners any good? (ZONER, Inc.) -- http://www.zonerantivirus.com Zoner AntiVirus Free Functions Overview • Theft Protection (find and control Installations 50.000 - 100.000 your missing device) Manual scan 55 / 32% • Installed app protection Real-time scan 8 / 80% • On-access and on-demand scan • Phone filtering (block calls and messages) • Parental lock for calls • Kontroll Functions • Task Manager • Automatic and manual database updates • Home screen widget Permissions Services that cost you money (Directly call phone numbers) Phone calls (Intercept outgoing calls) (Send SMS messages) (Read phone state and identity) Your location (Fine (GPS) location) Storage (Modify/delete USB storage contents modify/delete SD card contents) Your messages (Receive SMS) Hardware controls (Receive MMS) (Control vibrator) Network communication System-tools (Full Internet access) (Automatically start at boot) (View network state) (Kill background processes) Your personal information (Read contact data) 11
  • 13. Are free Android virus scanners any good? (F-Secure) -- http://www.f-secure.com/en/web/home_global/protection/mobile-security/overview F-Secure Mobile Security Functions • malware protection • safe browsing • Locate a lost or stolen smartphone • Parental control • your children can be located via their mobile phone Permissions Your personal information Phone calls (Add or modify calendar events and send email to guests) (Read phone state and identity) (Read calendar events) System-tools (Write contact data) (Format external storage) (Read Browser’s history and bookmarks) (Mount and unmount filesystems) (Write Browser’s history and bookmarks) (Write Access Point Name settings) (Change Wi-Fi state) Services that cost you money (Send SMS messages) (Prevent device from sleeping) Your location (Retrieve running applications) (Fine (GPS) location) (Modify global system settings) (Coarse (network-based) location) (Write sync settings) Your messages (Read sensitive log data) (Receive SMS) (Read SMS or MMS) (Edit SMS or MMS) Network communication (Full Internet access) Storage (Modify/delete USB storage contents modify/delete SD card contents) 12
  • 14. Are free Android virus scanners any good? (Kaspersky Lab) -- http://www.kaspersky.com/kaspersky_mobile_security Kaspersky Mobile Security Functions • Privacy Protection - for your eyes only • Locate a lost or stolen smartphone • Secure contacts, photos and files from unauthorized access • Block unwanted calls or SMSs • Parental control • Protect your smartphone from malware and network attacks Permissions Your accounts (Write contact data) (Manage the accounts list) (Read calendar events) (Discover known accounts) (Add or modify calendar events and send email to guests) Services that cost you money (Directly call phone numbers) Phone calls (Read phone state and identity) (Send SMS messages) (Modify phone state) Your location (Coarse (network-based) location) Storage (Modify/delete USB storage contents modify/delete SD card (Fine (GPS) location) contents) (Mock location sources for testing) System-tools (Prevent device from sleeping) (Access extra location provider commands) (Write sync settings) Your messages (Modify global system settings) (Read SMS or MMS) (Write Access Point Name settings) (Edit SMS or MMS) (Change network connectivity) (Receive SMS) (Automatically start at boot) Network communication (Full Internet access) (Read subscribed feeds) (View network state) (Read sync settings) (Set preferred applications) Your personal information (Read contact data) (Kill background processe 13
  • 15. Are free Android virus scanners any good? 4. Appendix Permission Description Access coarse location sources such as the cellular network database to coarse (network-based) location determine an approximate device location, where available. Malicious applications can use this to determine approximately where you are. Your location Access fine location sources such as the Global Positioning System on the fine (GPS) location device, where available. Malicious applications can use this to determine where you are, and may consume additional battery power. full Internet access Allows an application to create network sockets. View network state Allows an application to view the state of all networks. Allows an application to view configuration of the local Bluetooth device, Create Bluetooth connections Network and to make and accept connections with paired devices. communication View Wi-Fi state Allows an application to view the state of all networks. Allows the applications to accept cloud to device messages sent by the Receive data from Internet application's service. Using this service will incur data usage. Malicious applications may cause excess data usage. Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial Phone calls Read phone state and identity number of this phone, whether a call is active, the number that call is connected to and the like. Modify/delete USB storage Allows an application to write to the USB storage. Allows an application to Storage contents modify/delete SD card write to the SD card. contents Allows application to take pictures and videos with the camera. This allows Hardware Take pictures and videos the application at any time to collect images the camera is seeing. controls Control vibrator Allows the application to control the vibrator. Format external storage Allows the application to format removable storage. Allows the application to mount and unmount filesystems for removable Mount and unmount filesystems storage. Allows an application to modify the system's settings data. Malicious Modify global system settings applications can corrupt your system's configuration. Allows an application to show system alert windows. Malicious applications Display system-level alerts can take over the entire screen. lows application to retrieve information about currently and recently Retrieve running applications running tasks. May allow malicious applications to discover private information about other applications. Measure application storage Allows an application to retrieve its code, data, and cache sizes space Allows an application to kill background processes of other applications, System-tools Kill background processes even if memory isn't low. Allows an application to modify the APN settings, such as Proxy and Port of Write Access Point Name settings any APN. Allows an application to connect to and disconnect from Wi-Fi access points, Change Wi-Fi state and to make changes to configured Wi-Fi networks. Prevent device from sleeping Allows an application to prevent the device from going to sleep. Allows an application to have itself started as soon as the system has Bluetooth administration finished booting. This can make it take longer to start the device and allow the application to slow down the overall device by always running. Allows an application to have itself started as soon as the system has Automatically start at boot finished booting. This can make it take longer to start the device and allow the application to slow down the overall device by always running. Change network connectivity Allows an application to change the state of network connectivity. 14
  • 16. Are free Android virus scanners any good? Permission Description Allows application to retrieve information about currently and recently Retrieve running applications running tasks. May allow malicious applications to discover private System-tools information about other applications. Allows an application to modify the sync settings, such as whether sync is Write sync settings enabled for Contacts. Allows an application to delete Android packages. Malicious applications can Delete applications use this to delete important applications. Allows an application to install new or updated Android packages. Malicious Directly install applications applications can use this to add new applications with arbitrarily powerful Default permissions. Allows an application to modify the system's secure settings data. Not for Modify secure system settings use by normal applications. Allows the modification of collected battery statistics. Not for use by normal Modify battery statistics applications. Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial Read phone state and identity number of this phone, whether a call is active, the number that call is connected to and the like. Allows application to process outgoing calls and change the number to be Phone calls Intercept outgoing calls dialed. Malicious applications may monitor, redirect, or prevent outgoing calls. Allows the application to control the phone features of the device. An Modify phone state application with this permission can switch networks, turn the phone radio on and off and the like without ever notifying you. Allows an application to read from the system's various log files. This allows read sensitive log data it to discover general information about what you are doing with the device, potentially including personal or private information. Allows an application to read all of the contact (address) data stored on your Read contact data device. Malicious applications can use this to send your data to other people. Allows an application to add or change the events on your calendar, which add or modify calendar events may send email to guests. Malicious applications can use this to erase or and send email to guests modify your calendar events or to send email to guests. Your personal Allows an application to read all of the calendar events stored on your information Read calendar events device. Malicious applications can use this to send your calendar events to other people. Allows an application to modify the contact (address) data stored on your Write contact data device. Malicious applications can use this to erase or modify your contact data. Read Browser’s history and Allows the application to read all the URLs that the Browser has visited, and bookmarks all of the Browser's bookmarks. Allows an application to modify the Browser's history or bookmarks stored Write Browser’s history and on your device. Malicious applications can use this to erase or modify your bookmarks Browser's data. 15
  • 17. Are free Android virus scanners any good? Permission Description Allows the application to call phone numbers without your intervention. Directly call phone numbers Malicious applications may cause unexpected calls on your phone bill. Note Services that that this does not allow the application to call emergency numbers. cost you money Allows application to send SMS messages. Malicious applications may cost Send SMS messages you money by sending messages without your confirmation. Allows application to receive and process SMS messages. Malicious Receive SMS applications may monitor your messages or delete them without showing them to you. Allows application to receive and process MMS messages. Malicious Receive MMS applications may monitor your messages or delete them without showing Your messages them to you. Allows application to read SMS messages stored on your device or SIM card. Read SMS or MMS Malicious applications may read your confidential messages. Allows application to write to SMS messages stored on your device or SIM Edit SMS or MMS card. Malicious applications may delete your messages. 16