SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Anti‐Phishing Test – July 2012             www.av‐comparatives.org 




Anti-Phishing Test




July 2012
Language: English
July 2012
Last revision: 14th August 2012

www.av-comparatives.org




                                  ‐ 1 ‐ 
Anti‐Phishing Test – July 2012                                                            www.av‐comparatives.org 




Introduction
What is Phishing?

Taken from Wikipedia1:

“Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit
card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fish-
ing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the
hook inside it takes the complete fish out of the lake. Communications purporting to be from popular social
web sites, auction sites, online payment processors or IT administrators are commonly used to lure the un-
suspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging and it often di-
rects users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usabil-
ity of current web security technologies.”

For more information about how not to get hooked by a phishing scam, please have a look at e.g. the
Consumer Alert of the FTC: http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm


Test procedure

In our common test scenario, we simulate a user that relies on the Anti-Phishing protection provided by
its security product while browsing the web (and/or checking his webmail e-mail account, i.e. anti-spam
features are not considered, as they are not the scope of this test). The test was done on real machines,
using Windows XP SP3 and Internet Explorer 7 (without the build-in phishing blocker in order to get
browser-independent results). All security products were tested with default settings and in parallel at
the same time on the same URLs.


Test Set
Phishing URLs were mainly taken out from phishing mails during 6th to 27th July 2012. All phishing URLs
had to be active/online and attempt to get personal information. After removing all invalid, offline and
duplicate (sites hosted on same server/IP) test-cases, only 574 different and valid Phishing URLs re-
mained. The phishing campaigns targeted various types of personal data. Among those were (in the fol-
lowing order) phishing attempts to gather e.g. login credentials etc. for: PayPal, Online Banking & Credit
cards, E-mail accounts, eBay, Social networks, Online Games, and other online services.

The lifespan of phishing URLs is getting shorter, and more and more phishing sites are targeted/small
campaigns to remain under the radar, which makes it increasingly difficult for Anti-Phishing/URL-Blocker
countermeasures to be efficient in time.




1
    http://en.wikipedia.org/wiki/Phishing



                                                     ‐ 2 ‐ 
Anti‐Phishing Test – July 2012                                                           www.av‐comparatives.org 




Tested products

The tested product versions are the ones that were available at time of testing (July 2012). The following
products were included in the Anti-Phishing test:

          Avast Free Antivirus 7.0                        G DATA Internet Security 2013
          AVG Internet Security 2012                      GFI Vipre Internet Security 2012
          Avira Internet Security 2012                    Kaspersky Internet Security 2012
          BitDefender Internet Security 2012              McAfee Internet Security 2012
          BullGuard Internet Security 12.0                PC Tools Internet Security 2012
          eScan Internet Security 11.0                    Qihoo 360 Internet Security 3.0
          ESET Smart Security 5.0                         Sophos Endpoint Security 10.0
          Fortinet FortiClient Lite 4.3.3                 Trend Micro Titanium Internet Security 2012
          F-Secure Internet Security 2012                 Webroot SecureAnywhere Complete 2012

Notes:
Panda Cloud Free Antivirus was also tested, but unfortunately, Panda had technical issues during the
period of the test. There was a downtime of the server pushing out URL filtering signatures in July.
Therefore, the measured results would not reflect the usual phishing protection of the product. Due to
that, we decided to do not publish the results of PCAV.
ESET v5 does not have a dedicated module for anti-phishing protection yet. However, phishing sites are
currently blocked along with other potentially harmful sites (like in most other products), employing
various technologies such as webfilter, parental control and detection of suspicious content aimed at the
phishing landing pages themselves. The new version (v6.0) of ESET includes dramatically improved anti-
phishing protection. We evaluated the new version in parallel: it would have blocked 93,9% of the phish-
ing sites.
Kaspersky is also going to release a new version (2013) soon, which includes improved phishing protec-
tion too. The new version would have blocked 97,4%.
Qihoo is mainly targeted to block Chinese phishing sites.


Anti-Phishing “False Alarm” Test
For the Anti-Phishing False Alarm Test we selected 300 very popular banking sites (all of them using
HTTPS and showing a login form) from all over the world and checked if any of the various security prod-
ucts blocked those legitimate online banking sites. Wrongly blocking such sites is a serious mistake.
From the tested products, only GFI Vipre had one false alarm on the tested 300 legitimate online banking
sites:

GFI Vipre (one false alarm):
     Bank24 from Russia

The discovered false alarm has been reported to the respective vendor and is now no longer blocked.




                                                   ‐ 3 ‐ 
Anti‐Phishing Test – July 2012                                                       www.av‐comparatives.org 




Test Results
Below you see the percentages of blocked phishing websites (size of test set: 574 phishing URLs). Please
take into consideration the false alarm rates when looking at the below results (products with false
alarms are marked with an asterisk).

     1.    BitDefender            97,4%
     2.    McAfee                 97,0%
     3.    Kaspersky              94,8%
     4.    BullGuard              92,2%
     5.    F-Secure               90,1%
     6.    Sophos                 89,7%
     7.    PC Tools               89,2%
     8.    Trend Micro            88,5%
     9.    Webroot                86,9%
     10.   Avast                  82,2%
     11.   AVIRA                  82,1%
     12.   GFI Vipre*             79,8%
     13.   G DATA                 72,3%
     14.   Qihoo                  62,0%
     15.   AVG                    61,3%
     16.   Fortinet               60,3%
     17.   ESET                   58,0%
     18.   eScan                  57,7%




                                                  ‐ 4 ‐ 
Anti‐Phishing Test – July 2012                                                                   www.av‐comparatives.org 




Award levels reached in this test

The awards are decided and given by the testers based on the observed test results (after consulting
statistical models). The ranking system for this Anti-Phishing test was:
                                Anti-Phishing         Anti-Phishing          Anti-Phishing            Anti-Phishing
    Ranking system
                            Protection under 50%   Protection Cluster 3   Protection Cluster 2     Protection Cluster 1
    zero FPs                        Tested               Standard              Advanced                 Advanced+
   1 to 3 FPs                       Tested                Tested                Standard                Advanced
   4 to 6 FPs                       Tested                Tested                 Tested                  Standard
 More than 6 FPs                    Tested                Tested                 Tested                   Tested


The following awards are for the results reached in this Anti-Phishing Test:

                                    AWARD LEVELS                           PRODUCTS
                                                                          BitDefender
                                                                             McAfee
                                                                           Kaspersky
                                                                           BullGuard
                                                                            F-Secure
                                                                             Sophos
                                                                            PC Tools
                                                                          Trend Micro
                                                                            Webroot



                                                                              Avast
                                                                             AVIRA
                                                                             G DATA




                                                                           GFI Vipre*
                                                                             Qihoo
                                                                              AVG
                                                                            Fortinet
                                                                              ESET
                                                                             eScan




                                                                                -




* downgraded by one rank due to a wrongly blocked banking site (FP).




                                                          ‐ 5 ‐ 
Anti‐Phishing Test – July 2012                                                            www.av‐comparatives.org 




Copyright and Disclaimer

This publication is Copyright © 2012 by AV-Comparatives e.V. ®. Any use of the results, etc. in whole or
in part, is ONLY permitted with the explicit written agreement of the management board of AV-
Comparatives e.V., prior to any publication. AV-Comparatives e.V. and its testers cannot be held liable for
any damage or loss, which might occur as a result of, or in connection with, the use of the information
provided in this paper. We take every possible care to ensure the correctness of the basic data, but liabil-
ity for the correctness of the test results cannot be taken by any representative of AV-Comparatives e.V.
We do not give any guarantee of the correctness, completeness, or suitability for a specific purpose of
any of the information/content provided at any given time. No-one else involved in creating, producing
or delivering test results shall be liable for any indirect, special or consequential damage, or loss of prof-
its, arising out of, or related to, the use (or inability to use), the services provided by the website, test
documents or any related data. AV-Comparatives e.V. is a registered Austrian Non-Profit-Organization.

For more information about AV-Comparatives and the testing methodologies please visit our website.

                                                                 AV-Comparatives e.V. (August 2012)




                                                     ‐ 6 ‐ 

Más contenido relacionado

La actualidad más candente

Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판Minseok(Jacky) Cha
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! Prathan Phongthiproek
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionPaulo R
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021Adrian Sanabria
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...NowSecure
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
Mobile Security - Hakin9 Magazine
Mobile Security - Hakin9 MagazineMobile Security - Hakin9 Magazine
Mobile Security - Hakin9 Magazinelogfusion
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solutionlaonap166
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGrant Swanson
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 

La actualidad más candente (20)

Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판
임베디드 리눅스 악성코드로 본 사물인터넷 보안 차민석 20150406_코드게이트 발표판
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
 
IronPort
IronPortIronPort
IronPort
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Mobile Security - Hakin9 Magazine
Mobile Security - Hakin9 MagazineMobile Security - Hakin9 Magazine
Mobile Security - Hakin9 Magazine
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 

Destacado (8)

Employment law update October 2011
Employment law update   October 2011Employment law update   October 2011
Employment law update October 2011
 
Guidance Counsellor Presentation - Cornwall
Guidance Counsellor Presentation - CornwallGuidance Counsellor Presentation - Cornwall
Guidance Counsellor Presentation - Cornwall
 
Employment law update september 2011
Employment law update   september 2011Employment law update   september 2011
Employment law update september 2011
 
Experience Kingston
Experience KingstonExperience Kingston
Experience Kingston
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar a Avc aph 201207_en

Can consumer av products protect
Can consumer av products protectCan consumer av products protect
Can consumer av products protectAnatoliy Tkachev
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016rajeshnikam
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowKaseya
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Moti Sagey מוטי שגיא
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
Avc report25
Avc report25Avc report25
Avc report25Era Brown
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 

Similar a Avc aph 201207_en (20)

Avc fdt 201303_en
Avc fdt 201303_enAvc fdt 201303_en
Avc fdt 201303_en
 
Can consumer av products protect
Can consumer av products protectCan consumer av products protect
Can consumer av products protect
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
Avc fdt 201209_en
Avc fdt 201209_enAvc fdt 201209_en
Avc fdt 201209_en
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
Avc fd mar2012_intl_en
Avc fd mar2012_intl_enAvc fd mar2012_intl_en
Avc fd mar2012_intl_en
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Avc beh 201207_en
Avc beh 201207_enAvc beh 201207_en
Avc beh 201207_en
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to Know
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Technology auto protection_from_exploit
Technology auto protection_from_exploitTechnology auto protection_from_exploit
Technology auto protection_from_exploit
 
Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Avc report25
Avc report25Avc report25
Avc report25
 
Avc Report25
Avc Report25Avc Report25
Avc Report25
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Avc aph 201207_en

  • 1. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Anti-Phishing Test July 2012 Language: English July 2012 Last revision: 14th August 2012 www.av-comparatives.org ‐ 1 ‐ 
  • 2. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Introduction What is Phishing? Taken from Wikipedia1: “Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fish- ing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the hook inside it takes the complete fish out of the lake. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the un- suspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging and it often di- rects users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usabil- ity of current web security technologies.” For more information about how not to get hooked by a phishing scam, please have a look at e.g. the Consumer Alert of the FTC: http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm Test procedure In our common test scenario, we simulate a user that relies on the Anti-Phishing protection provided by its security product while browsing the web (and/or checking his webmail e-mail account, i.e. anti-spam features are not considered, as they are not the scope of this test). The test was done on real machines, using Windows XP SP3 and Internet Explorer 7 (without the build-in phishing blocker in order to get browser-independent results). All security products were tested with default settings and in parallel at the same time on the same URLs. Test Set Phishing URLs were mainly taken out from phishing mails during 6th to 27th July 2012. All phishing URLs had to be active/online and attempt to get personal information. After removing all invalid, offline and duplicate (sites hosted on same server/IP) test-cases, only 574 different and valid Phishing URLs re- mained. The phishing campaigns targeted various types of personal data. Among those were (in the fol- lowing order) phishing attempts to gather e.g. login credentials etc. for: PayPal, Online Banking & Credit cards, E-mail accounts, eBay, Social networks, Online Games, and other online services. The lifespan of phishing URLs is getting shorter, and more and more phishing sites are targeted/small campaigns to remain under the radar, which makes it increasingly difficult for Anti-Phishing/URL-Blocker countermeasures to be efficient in time. 1 http://en.wikipedia.org/wiki/Phishing ‐ 2 ‐ 
  • 3. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Tested products The tested product versions are the ones that were available at time of testing (July 2012). The following products were included in the Anti-Phishing test:  Avast Free Antivirus 7.0  G DATA Internet Security 2013  AVG Internet Security 2012  GFI Vipre Internet Security 2012  Avira Internet Security 2012  Kaspersky Internet Security 2012  BitDefender Internet Security 2012  McAfee Internet Security 2012  BullGuard Internet Security 12.0  PC Tools Internet Security 2012  eScan Internet Security 11.0  Qihoo 360 Internet Security 3.0  ESET Smart Security 5.0  Sophos Endpoint Security 10.0  Fortinet FortiClient Lite 4.3.3  Trend Micro Titanium Internet Security 2012  F-Secure Internet Security 2012  Webroot SecureAnywhere Complete 2012 Notes: Panda Cloud Free Antivirus was also tested, but unfortunately, Panda had technical issues during the period of the test. There was a downtime of the server pushing out URL filtering signatures in July. Therefore, the measured results would not reflect the usual phishing protection of the product. Due to that, we decided to do not publish the results of PCAV. ESET v5 does not have a dedicated module for anti-phishing protection yet. However, phishing sites are currently blocked along with other potentially harmful sites (like in most other products), employing various technologies such as webfilter, parental control and detection of suspicious content aimed at the phishing landing pages themselves. The new version (v6.0) of ESET includes dramatically improved anti- phishing protection. We evaluated the new version in parallel: it would have blocked 93,9% of the phish- ing sites. Kaspersky is also going to release a new version (2013) soon, which includes improved phishing protec- tion too. The new version would have blocked 97,4%. Qihoo is mainly targeted to block Chinese phishing sites. Anti-Phishing “False Alarm” Test For the Anti-Phishing False Alarm Test we selected 300 very popular banking sites (all of them using HTTPS and showing a login form) from all over the world and checked if any of the various security prod- ucts blocked those legitimate online banking sites. Wrongly blocking such sites is a serious mistake. From the tested products, only GFI Vipre had one false alarm on the tested 300 legitimate online banking sites: GFI Vipre (one false alarm):  Bank24 from Russia The discovered false alarm has been reported to the respective vendor and is now no longer blocked. ‐ 3 ‐ 
  • 4. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Test Results Below you see the percentages of blocked phishing websites (size of test set: 574 phishing URLs). Please take into consideration the false alarm rates when looking at the below results (products with false alarms are marked with an asterisk). 1. BitDefender 97,4% 2. McAfee 97,0% 3. Kaspersky 94,8% 4. BullGuard 92,2% 5. F-Secure 90,1% 6. Sophos 89,7% 7. PC Tools 89,2% 8. Trend Micro 88,5% 9. Webroot 86,9% 10. Avast 82,2% 11. AVIRA 82,1% 12. GFI Vipre* 79,8% 13. G DATA 72,3% 14. Qihoo 62,0% 15. AVG 61,3% 16. Fortinet 60,3% 17. ESET 58,0% 18. eScan 57,7% ‐ 4 ‐ 
  • 5. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Award levels reached in this test The awards are decided and given by the testers based on the observed test results (after consulting statistical models). The ranking system for this Anti-Phishing test was: Anti-Phishing Anti-Phishing Anti-Phishing Anti-Phishing Ranking system Protection under 50% Protection Cluster 3 Protection Cluster 2 Protection Cluster 1 zero FPs Tested Standard Advanced Advanced+ 1 to 3 FPs Tested Tested Standard Advanced 4 to 6 FPs Tested Tested Tested Standard More than 6 FPs Tested Tested Tested Tested The following awards are for the results reached in this Anti-Phishing Test: AWARD LEVELS PRODUCTS BitDefender McAfee Kaspersky BullGuard F-Secure Sophos PC Tools Trend Micro Webroot Avast AVIRA G DATA GFI Vipre* Qihoo AVG Fortinet ESET eScan - * downgraded by one rank due to a wrongly blocked banking site (FP). ‐ 5 ‐ 
  • 6. Anti‐Phishing Test – July 2012  www.av‐comparatives.org  Copyright and Disclaimer This publication is Copyright © 2012 by AV-Comparatives e.V. ®. Any use of the results, etc. in whole or in part, is ONLY permitted with the explicit written agreement of the management board of AV- Comparatives e.V., prior to any publication. AV-Comparatives e.V. and its testers cannot be held liable for any damage or loss, which might occur as a result of, or in connection with, the use of the information provided in this paper. We take every possible care to ensure the correctness of the basic data, but liabil- ity for the correctness of the test results cannot be taken by any representative of AV-Comparatives e.V. We do not give any guarantee of the correctness, completeness, or suitability for a specific purpose of any of the information/content provided at any given time. No-one else involved in creating, producing or delivering test results shall be liable for any indirect, special or consequential damage, or loss of prof- its, arising out of, or related to, the use (or inability to use), the services provided by the website, test documents or any related data. AV-Comparatives e.V. is a registered Austrian Non-Profit-Organization. For more information about AV-Comparatives and the testing methodologies please visit our website. AV-Comparatives e.V. (August 2012) ‐ 6 ‐