Vulnerabilities / Threats
12/28/2006
09:40 AM
Connect Directly
RSS
E-Mail
50%
50%

ESET Touts Advanced+ Rating

ESET's NOD32 receives Advanced+ rating from AV-comparatives

SAN DIEGO -- In a recent report released from AV-comparatives.org, ESET NOD32 is one out of only four antivirus solutions to receive an Advanced+ rating based on results of tests evaluating proactive, on-demand detection of virus/malware, false positive and scanning speed. A total of 15 antivirus solutions were involved in the comparative review. In addition, ESET also won its 41st Virus Bulletin award, extending its industry leading eight-year track record as the vendor with the most awards.

Released in November 2006, Anti-Virus Comparative No. 12 helps users discern the reality of claims made by leading antivirus providers as they relate to high proactive detection capabilities - many of which have been optimized to achieve desired results.

Speed is a key differentiator among antivirus solutions. The faster a solution performs, the better protection it offers. Many new forms of malware appear on a daily, even hourly, rate. According to the Anti-Virus Comparative report, "...this is why it's important that anti-virus products not only provide new updates, as often and as fast as possible, in order to identify those new threats, but also that they are able to detect such threats in advance with advanced heuristics and generic signature techniques. Without this ability the user has to wait for an updated release of the anti-virus product."

ESET

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio