Unsolved
This post is more than 5 years old
5 Journeyman
•
15.6K Posts
•
45K Points
0
19853
December 4th, 2014 04:00
Review/Comparison of Anti-EXPLOIT programs
"Exploit Kits and targeted attacks on home users and companies nowadays focus on exploiting popular applications such as browsers, browser add-ons such as Flash and Silverlight, Java, Acrobat Reader, Microsoft Office Word, Excel, PowerPoint, media players, etc. The objective is to remotely execute code, transparently to the user and without relying on user interaction, in order to infect the machine with undetected malware. This comparative study looks at the effectiveness of different proactive exploit mitigation technologies included in popular security vendors and specialized anti-exploit tools..."
http://static-cdn.malwarebytes.org/assets/datasheets/2014-12-03/RCEMitigations.pdf
DISCLAIMER: This test was commissioned by Malwarebytes Corp. [the best performer in this test] to test the exploit blocking capabilities of different products against relevant vulnerabilities (i.e. vulnerable applications which are targeted typically by Exploit Kits and targeted attacks). PCSL made the sole research and methodology decision of which CVEs to test and how to test. No exploit code samples were provided by Malwarebytes.
0 events found

