Antivirus Review 2017: blackmailer software is on the rise, but the provider ofsecurity software has learned. Who defends the domestic PC best against Ransomware, infected websites, and other dangers?
Best Antivirus 2017: The best virus scanner
After all, there is a little hope. Antivirus vendors offer some ransomware variants decryption tools to. The malware scene has become “violent” in the past years, so at least the user appears before the screen, because blackmail programs, in English ransomware, have been on the advance for years. Ransomware attacks directly to the data of the user and makes it unreadable – with encryption.Then the user is also directly attacked. A message will appear on the screen asking the victim to ransom. Some encryption Trojans such as Jigsaw delete the hourly file, to further put the victim under pressure. Resistance seems futile. Because the newer versions of Ransomware use strong encryption algorithms, so you can often restore the affected files without the blackmailer.
Before 2013 one was mainly afraid of another type of Trojans. Trojans, who secretly in the PC minister and first silent. They spy credit card information, eavesdrop the user’s bank transactions, or use the conquered PC to attack servers anywhere in the world. These Trojans are still active and their impact is bad enough. However, secret trojans usually leave the data of the users in peace. And the secret data traffic of the malware users without special knowledge about network technology often do not even notice. Harmful viruses, which directly attacked the data of the users, that is, deleted or changed, were rather rare before 2013.
Rootkits in reverse
A particularly tricky variant of the “silent” Trojans is the rootkits, which are deeply embedded in the operating system and thus make their discovery more difficult. But this threat has now lost much of its horror. Because rootkits are many years in decline, reports McAfee (PDF). McAfee is responsible for the widespread use of 64-bit systems and current operating systems, such as Windows 8 and Windows 10, which provide protection against rootkit programs. In the malware reports of many other manufacturers the category of rootkits is no longer mentioned. Unlike Ransomware. This kind of malware is located just on the upswing.
Ransomware-makers have season
The blackmail programs have been around since the year 2014. The growth rates are scary. Trend Micro calls its report for the first half 2016, even the kingdom of ransomware (Trend Micro, Reign of ransomware, TrendLabs 2016 1H Security Roundup) and reports the fact of an increase of 172 percent in the ransomware family – only the first half of 2016 Kaspersky Security Bulletin 2015 says Kaspersky has discovered about 50,000 computers with Ransomware in its corporate networks through its security programs. This is more than twice as many infections with this type of malware as in 2014. Approximately 58 percent of computers in corporate networks were attacked in 2015.
How does the Ransomware get to the computer? Trend Micro has investigated the causes in the realm of Ransomware and found nothing surprising. In the known infections, which account for only 47 percent of the cases analyzed, email spam was the most frequent vehicle in the first half of 2016 (71 percent). With 18 percent infected by exploit kits, this means that infected sites are infected. An exploit kit is a software collection that runs on web servers. If a PC is connected to one of these infected servers, the scripts running there look for vulnerabilities, for example, in the browser of the user. The malicious software can access these computers via its vulnerabilities. According to Trend Micro, the remaining infections are caused by exploits (5 percent), ie software security gaps, infected apps and Teamviewer software (3 percent each). The manufacturer asserts that these infections do not point to a security breach in Teamviewer. Rather, hacked Teamviewer accounts had been used to distribute the Surprise extortion trojan.
Protection against Ransomware
Because Ransomware uses the same creeps as other malicious software, the proven recipes are also sufficient to defend. Use an anti-virus program, either a free or one of our test candidates. All programs in the test can scan and block e-mails for malicious attachments. If you accidentally clicked on a dangerous link, there is still a chance. Virtually all test candidates have browser plugins that can prevent the loading of dangerous sites. With a little luck, the plugin recognizes the threat. Otherwise, as the very last line of defense, advertising and script blockers such as Noscript and Adblock Plus continue to help. Nevertheless, the most important tool, as always, is the healthy understanding of people: If an e-mail is suspicious, you should delete it and not open it at all. The same applies to obscure weblinks. Very important: Patch operating system, browser, and other programs regularly. This reduces the likelihood to become a victim of an exploit kit. Some programs in the test field can scan the system for obsolete software, reducing the risk of infection.
And if you have downloaded a blackjack? Even then you have a chance with the candidates in our test field. Virtually all antivirus programs can detect malware on their behavior, for example when it starts to encrypt files in the background. One example is BitDefender Total Security 2017, which specifically monitors document and image folders and prevents encryption.
But what happens if the malware on the virus scanners pre-routed and actually encrypted files? Then it is called to keep peace and not to pay a ransom. Now you need a good backup of your important data. However, set your backup software to hold multiple versions of your backed up files. If the encryption of your files has started without you having noticed, your files could be overwritten by encrypting encrypted files.
Even if your data has been encrypted and any backup is missing, there is still a glimmer of hope. Many security companies provide decryption tools that allow you to restore many infected files. These include, for example, Kaspersky,Emsisoft,AVG and Trend Micro.
Smart things in sight
The internet of things (Internet of Things, IoT), ie computerized household appliances from the surveillance camera to the heating control, have long been in the sights of safety researchers. For some devices, manufacturers have negligently neglected safety. The actions of the Mirai-Botnets in September and October of this year have now become clear. End of September 2016, the site of the security experts was Brian Krebs attacked by thousands of IoT devices. The attacks were so violent that the site had to be taken off the grid at short notice. In October, the Internet service was then Dyn the victim. As a result, there were disruptions to large Internet providers such as Amazon, Twitter, Github, and Airbnb. Among the infected devices were Brian Krebs not only classic IoT devices but also printers and routers.
The incident shows that antivirus programs nowadays need to protect not only the PC but the entire home network. An entry gate is, for example, the domestic ADSL router with which most devices are connected. This is why we have added you- tine scanning functions to the evaluation this year.
In the gallery, you will find the ranking of our eleven test candidates. Detailed information on the detection and prevention of the individual Suites,