Wanna make things VERY clear

ok this really makes my head turn upside down :stuck_out_tongue:

watching this video…
http://www.youtube.com/watch?v=3tJE5axhnQg
…can make us say that malwarebytes probably has higher detection rates than avast :-\

~no beta here, both are the stable versions
~avast did a great job blocking “almost” the malware sites

these makes me think:

~avast 4.8 almost got 100% in detection but…
~avast 4.8 got a 100% detection of wild viruses but…

questions:

~why avast only detected 1 suspicious file in an infected pc(on demand scan)?
~why malwarebytes detected 21 infected files(on demand scan)?

~=- So malwarebytes has greater detection than avast? (what more enabling the real-time protection of MBAM?)

Im NOT against avast or anything, just Wanna make things VERY clear :wink:

i’ll evanesce:

Youtube video aside,my opinion of Malwarebytes lies somewhere between that of the SSupdater stoogies,and the hyperbole of it own website.

It is a great on demand scanner.
If you have the RAM to use,and the cash to lose,
run it real-time.

It is not a full anti-malware.

I have seen that review and all I can say is that the signatures for MBAM were more updated to the new malware that was used in the test. MBAM, from my experience, stays on top of things even better than any of the AV providers and is better at removing stuff that does get in than any of them. Avast! seems to update it’s signatures once a day, MBAM does it a lot more frequently.

No anti virus application is 100% effective as today’s malware writers are very prolific because they want $$$ and Internet crime is hard to prosecute.

So a Layered Defence approach to system security is needed just like deadbolts are good on entry doors to your house.

I use the following as well as making sure that the operating system is up to date:

I manage them with HostsMan and use its browser speedup proxy HostsServer:
http://www.abelhadigital.com

The criminal element on the Internet is now intent on discovering weakness in all applications running on your system and want to exploit them.