1.) OK
2.) OK
3.) Did not detected the download eventhough I have Web Shield and File Shield with PUP enable >:( Comodo blocked file execution though.
4.) I do not have WebRep active so I was able to see the site.
5.) Yeap, it failed cloud protection >:(
The PUP was blocked by CFW. 8)
Malware download was blocked by avast. 8)
Phishing was blocked by CFW. 8)
avast failed the cloud test. ???
avast failed the the drive-by download test but CFW blocked it. 8)
Avast did a great job, but one of my 3 PC running AVG failed like there was nothing there.That PC was also running Comodo firewall and window defender. Its now running avast.
While I’m away from Avast Free for a while and I’ll be home soon I’m currently using the complete CIS and this is very interesting to see what Avast can do and can’t do during the test.
My CIS configuration setting is set to default as ‘Internet Security’ straight out of the first installation are AV, FW, Sandbox & Behavior Blocker, and nothing is set to ‘Proactive Security’ because the Defense+ is currently turn off.
Download of Malware: Ok and after a few second CIS automatically detected as a virus by AV and quarantined (Pass)
Drive-by download (EICAR.COM): CIS automatically detected as a virus through AV, Behaviour Blocker and quarantined (Pass)
Potentially Unwanted Applications: CIS automatically detected as a virus through AV, Behaviour Blocker and quarantined (Pass)
Phishing Page: Automatically detected through Bitdefender TrafficLight add-on through FF, when BT is turn off in FF CIS failed when using FF, and IF your using Comodo Dragon and Ice Dragon as a web browsers it automatically detected as phishing through CIS (Pass)
Cloud Lookups: CIS automatically detected as a virus and placed in the sandbox, CIS also automatically queues it for submission to Comodo Cloud Scanners for automatic behavior analysis detected as a virus and block it (Pass)
Yes, difference here is that we have to toggle and adjust the avast settings beforehand. For instance PUP scanning is off by default. Why they failed 2 of the 5 tests even while they decided to participate there, is completely beyond me. When you take such a decision you’d make sure you passed all tests before entering your logo there, else you will set there caught with red ears…
Because I still use it on other machines at home,at work and recommend it to clients…I have changed to CIS because I was curious about it,I am still a big supporter of avast and still send them samples (Ask Milos if you want)…Not using avast doesnt mean you arent going to go their forums,for me avast is still one of my recommended AV’s even when I dont use it ;D
I see even SpeedyPC isnt using avast but using CIS…No one questioned him about his presence over here IMO :
Anyways,sooner or later I will come back to avast,dont worry
Changing your antivirus application never means the discarded AV is crap or anything,A Great AV is always great irrespective of its user base…avast is always been great and this fact doesnt change in any of my cases
I think the statement for most of malware fighters and AV companies should be:I am fighting to beat malware and not to beat another AV.
Not questioning your position, just liked to know where you stand. I also like we get contributions from folks that see malware through another perspective like the CIS perspective, or DrWeb’s, as we are better to learn about avast!'s blind spots that way. So everyone with affinity to the avast platform is welcome here. I am here because I owe a lot to avast! and what they did for me over the past years of developing my malcode scanning skills to arrive at my malcode knowledge of to-day. I also have additional protection next to avast’s resident av solution and recently installed arp monitoring IDS together with Nixory’s Shield and I am beta-testing ZeroVulnerability Exploit Shield and found that very rewarding. Awaiting your malcode scanning contributions in the “virus and worms” as always. Receive kind regards from,
I’m fully aware that is why I had double check to make sure that I’ve completed the test very carefully because anybody can make a mistake PBKAC
Edit: Polonus or Tech please do me a favour while checking turn on the PUP in the Avast Behavior Shield and run the test again and see what you get, I believe Avast should pick up the PUA
Hello,
if you did 1. and 2. immediatelly so the 2. goes to same URL, so previous cached detection causes not alerting (only blocking the download).
5. should be now working too.
3. and 4. will be fixed (maybe in 130606-0).