Technology Windows Defender can block 85% of known threats

Posted: November 12, 2012 in Antivirus and Security Software, IT Security News, Testing
Tags: , ,

Windows Defender

Can block 85% of known threats

Built-in protection mechanisms implemented in the new operating system, Windows 8, able to withstand a wide range of threats, but they do not make your computer completely invulnerable and do not exclude the need for a separate anti-virus application. This is the conclusion of researchers from BitDefender in the course of the study.

The trials took part three test computer. On one of the machines was running Windows 7, and the other two PCs were running the latest Windows 8 (with Enabling and Disabling the Windows Defender). To conduct a comprehensive inspection used a set of samples of malicious code, including the latest versions of known viruses, “Trojan horses”, worms and “rootkits”.

In order to ensure the purity of the experiment procedure run malicious programs was fully automated, synchronized process experts also perform malicious code on all three computers. After each start attempt was carried out a thorough comparison of the lists of processes and the study of changes in the registry on each of the test systems. Next, the computer will return to its original “pure” state for their next stage of testing.

It turned out that Windows Defender without difficulty blocking 85% of threats. Only 61 out of 385 tested were missed malware embedded system security. Of course, disabling the “defender” leads to a sharp deterioration of performance. After deactivation of Windows Defender successfully triggered samples increased to 234. Finally, it was the least secure operating system Windows 7, allowing to start 262 of 385 hazardous samples.

“Component Windows Defender, which is now included with the operating system Windows 8, does reduce the risk of the system, however, users do not believe in their own invulnerability” – emphasizes Alexandru Catalin Cosoi, head of the security policies of BitDefender.

It should also be noted that in the course of the tests were not considered new and unexplored threats (zero-day exploits), for the distribution of which is most commonly used web browser, and Flash technology and Java. This time, the researchers also did not interest non-executable malicious scripts such as PHP files or JavaScript, is not capable of causing direct damage to the system.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s