Independent Test:
Malwarebytes Anti-Exploit vs. Top Antivirus/Exploit Mitigation Product

Exploit Mitigations Test

Exploit Kits and targeted attacks on home users and companies nowadays focus on exploiting popular applications such as browsers, browser add-ons such as Flash and Silverlight, Java, Acrobat Reader, Microsoft Office Word, Excel, PowerPoint, media players, etc. The objective is to remotely execute code, transparently to the user and without relying on user interaction, in order to infect the machine with undetected malware. This comparative study looks at the effectiveness of different proactive exploit mitigation technologies included in popular security vendors and specialized anti-exploit tools.


Download Now!