The survey received 1247 responses from visitors to AV-Comparatives' website. After filtering invalid responses, 1065 responses remained. Most respondents were from Europe and used Windows 7 and Firefox browser. The most commonly used antivirus programs were free versions like Avast, AVG, and Microsoft Security Essentials, as well as paid versions from Symantec, Kaspersky, and ESET. Respondents expressed most interest in on-demand detection tests and retrospective tests evaluating heuristics. They found AV-Comparatives, Virus Bulletin, and ICSA Labs to be the most reliable testing organizations.
The document is a summary of a security survey conducted in 2013 by AV-Comparatives. Some key findings include:
- Over 4,700 computer users worldwide participated in the anonymous online survey.
- Most users are aware of online security risks but some still do not use security software. Detection rates, malware removal, and performance are the most important factors for users.
- Windows 7 and 8 are now the most widely used operating systems. Free antivirus programs are growing in popularity and trust compared to paid solutions.
- Detection testing, real-world protection testing, and tests evaluating heuristic capabilities are the most important types of antivirus testing for users. Performance issues remain a top complaint.
-
Studying online distribution platforms for games through the mining of data f...SAIL_QU
Our studies of Steam platform data provided insights into online game distribution:
1) Urgent game updates were used to fix crashes, balance issues, and functionality; frequent updaters released more 0-day patches.
2) The Early Access model attracted indie developers and increased game participation; reviews were more positive during Early Access.
3) Game reviews were typically short and in English; sales increased review volume more than new updates; negative reviews came after longer play.
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
The document summarizes the findings of a study on the state of mobile application security. Some key findings include:
1. Many organizations feel pressure to rush mobile app releases before proper security testing due to customer demands, resulting in insecure apps.
2. Most organizations do not adequately test apps, with many apps not being tested at all or tested too late. On average, less than half of organizations' apps are tested and 30% of tested apps contain vulnerabilities.
3. While organizations spend on average $34 million annually on mobile app development, only 5.5% or $2 million is typically allocated to security, showing security is underfunded.
4. Most organizations lack sufficient mobile security expertise and
The document discusses the results of a global survey of 3,011 mobile app users in North America and Europe. Some key findings include:
- 80% of users use mobile apps up to 15 times per day and expect apps to respond within 2 seconds.
- 34% choose apps based on peer reviews and ratings, and app performance is critical for 96% of users.
- 29% experience app issues weekly, and 80% will stop using an app after 3 problematic experiences.
- Poor performance leads to quick app abandonment and negatively impacts brands for many users.
The document summarizes the findings of a study on the state of mobile application security. Some key findings include:
- Many organizations feel pressure to rush app releases before proper security testing due to customer demands, resulting in insecure apps. Only about half of apps are tested, and 30% contain vulnerabilities.
- Training and resources for mobile security are lacking, with only 41% of respondents saying their organization has sufficient expertise and 29% having resources to prevent vulnerable apps.
- Employees' use of personal apps and BYOD increases risks, but 55% of organizations lack acceptable use policies for mobile apps.
- Effectiveness in securing apps is rated low despite high concerns about threats like malware. Keeping end-users happy is
This document outlines 50 essential content marketing hacks presented by Matt Heinz, President of Heinz Marketing Inc. at CMWorld. It provides an agenda for the presentation and covers topics such as content planning, measurement, formats, distribution, influencer engagement, repurposing content, and getting sales teams to leverage content. The goal is to provide new tools, tricks and best practices to help convert readers into customers through effective content marketing.
The document is a summary of a security survey conducted in 2013 by AV-Comparatives. Some key findings include:
- Over 4,700 computer users worldwide participated in the anonymous online survey.
- Most users are aware of online security risks but some still do not use security software. Detection rates, malware removal, and performance are the most important factors for users.
- Windows 7 and 8 are now the most widely used operating systems. Free antivirus programs are growing in popularity and trust compared to paid solutions.
- Detection testing, real-world protection testing, and tests evaluating heuristic capabilities are the most important types of antivirus testing for users. Performance issues remain a top complaint.
-
Studying online distribution platforms for games through the mining of data f...SAIL_QU
Our studies of Steam platform data provided insights into online game distribution:
1) Urgent game updates were used to fix crashes, balance issues, and functionality; frequent updaters released more 0-day patches.
2) The Early Access model attracted indie developers and increased game participation; reviews were more positive during Early Access.
3) Game reviews were typically short and in English; sales increased review volume more than new updates; negative reviews came after longer play.
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
The document summarizes the findings of a study on the state of mobile application security. Some key findings include:
1. Many organizations feel pressure to rush mobile app releases before proper security testing due to customer demands, resulting in insecure apps.
2. Most organizations do not adequately test apps, with many apps not being tested at all or tested too late. On average, less than half of organizations' apps are tested and 30% of tested apps contain vulnerabilities.
3. While organizations spend on average $34 million annually on mobile app development, only 5.5% or $2 million is typically allocated to security, showing security is underfunded.
4. Most organizations lack sufficient mobile security expertise and
The document discusses the results of a global survey of 3,011 mobile app users in North America and Europe. Some key findings include:
- 80% of users use mobile apps up to 15 times per day and expect apps to respond within 2 seconds.
- 34% choose apps based on peer reviews and ratings, and app performance is critical for 96% of users.
- 29% experience app issues weekly, and 80% will stop using an app after 3 problematic experiences.
- Poor performance leads to quick app abandonment and negatively impacts brands for many users.
The document summarizes the findings of a study on the state of mobile application security. Some key findings include:
- Many organizations feel pressure to rush app releases before proper security testing due to customer demands, resulting in insecure apps. Only about half of apps are tested, and 30% contain vulnerabilities.
- Training and resources for mobile security are lacking, with only 41% of respondents saying their organization has sufficient expertise and 29% having resources to prevent vulnerable apps.
- Employees' use of personal apps and BYOD increases risks, but 55% of organizations lack acceptable use policies for mobile apps.
- Effectiveness in securing apps is rated low despite high concerns about threats like malware. Keeping end-users happy is
This document outlines 50 essential content marketing hacks presented by Matt Heinz, President of Heinz Marketing Inc. at CMWorld. It provides an agenda for the presentation and covers topics such as content planning, measurement, formats, distribution, influencer engagement, repurposing content, and getting sales teams to leverage content. The goal is to provide new tools, tricks and best practices to help convert readers into customers through effective content marketing.
The document discusses prototyping and provides examples of different types of prototypes including paper prototypes, digital prototypes, storyboards, role plays, and space prototypes. It explains that prototyping is used to make ideas tangible and test reactions from users in order to gain insights. Prototypes should be iterated on and fail early to push ideas further and save time and money. Both low and high fidelity prototypes are mentioned as ways to test ideas at different stages of the design process.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
The document is a summary of a security survey conducted in 2013 by AV-Comparatives. Some key findings include:
- Over 4,700 computer users worldwide participated in the anonymous online survey.
- Most users were aware of security risks but about 3% did not use any security software.
- Detection rates, malware removal, and performance impact were the most important factors for users when choosing security software.
- Windows 7 and 8 were the most commonly used operating systems, and Firefox and Chrome the most popular browsers.
- Over half of respondents paid for security software while free solutions grew in popularity. Improved performance was the most requested improvement to security software.
Live 2014 Survey Results: Open Source Development and Application Security Su...Sonatype
The survey saw its highest participation yet with 3,353 respondents. It was conducted between April 1st and April 30th, with 1,513 responses before the announcement of the Heartbleed bug on April 7th, and 1,839 after. The results revealed that most organizations are not well prepared for vulnerabilities like Heartbleed, as the majority do not have strong open source policies, do not actively monitor components for vulnerabilities, and do not track components in production applications. However, there are signs the industry may be reaching an "inflection point" and increasing focus on application security and governance of open source components.
What are the advantages of non functional testingMaveric Systems
Software testing is a study conducted to provide information about products or services to interested parties. It provides a view of the private sector to enable people to understand the risks associated with having to use it.
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...AnnaBtki
Mobile is unique. It provides unique opportunities and presents unique challenges. To take these on, mobile product organizations need to align their teams to work together efficiently and adopt best practices in Mobile DevOps. But it’s difficult to develop a roadmap for improvement without understanding current strengths and weaknesses, and benchmarking Mobile DevOps maturity against similar organizations. Our survey was designed to give mobile teams a way to asses their Mobile DevOps performance, productivity, and maturity, and to give steer on where and how to make improvements.
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012Jason Hong
Malware continues to thrive on the Internet. Besides auto-mated mechanisms for detecting malware, we provide users with trust evidence information to enable them to make in-formed trust decisions. To scope the problem, we study the challenge of assisting users with judging the trustworthiness of software downloaded from the Internet. Through expert elicitation, we deduce indicators for trust evidence, then analyze these indicators with respect to scal-ability and robustness. We design OTO, a system for com-municating these trust evidence indicators to users, and we demonstrate through a user study the effectiveness of OTO, even with respect to IE’s SmartScreen Filter (SSF). The results from the between-subjects experiment with 58 par-ticipants confirm that the OTO interface helps people make correct trust decisions compared to the SSF interface regard-less of their security knowledge, education level, occupation, age, or gender.
Authors are Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin Gao
LC Chen Presentation at Icinga Camp 2015 Kuala LumpurIcinga
This document provides an introduction to open source network monitoring. It discusses key topics such as network monitoring, network management, why network management is important, popular open source monitoring tools like Icinga 2, Smokeping and Cacti, potential traps of open source like lack of support and integration issues. It also covers elements of open source maturity, a maturity model, and benefits of open source like cost savings, avoiding vendor lock-in and access to more functionality.
This document summarizes the results of an anti-virus test conducted in March 2012. 20 anti-virus products were tested on their ability to detect malware. G Data had the highest detection rate at 99.7%, while AhnLab had the lowest at 94%. Microsoft had the fewest false positives at 0, while Webroot had the most at 428. Based on detection rates and false positives, products received awards of Advanced+, Advanced, Standard or Tested. G Data, AVIRA and Kaspersky received Advanced+.
The document summarizes an evaluation of anti-malware solutions for Android. It reports that certain parts of their previous paper and testing methodology were considered flawed by vendors, so additional testing is being done. It provides details on the testing methodology used, which involved evaluating products' abilities to detect a collection of over 600 malware samples both during on-demand scans and when the samples were installed. Products were grouped into categories based on their detection rates, with the top category detecting over 90% of samples.
This document summarizes the results of an anti-virus test conducted in March 2012. 20 anti-virus products were tested on their ability to detect malware. G Data detected 99.7% of malware samples, scoring highest. Microsoft detected 93.1% of samples, scoring lowest. The test also evaluated false alarms on clean files. Microsoft generated 0 false alarms, while Webroot generated 428 false alarms, the most of any product. Based on detection rates and false alarms, products received awards of Advanced+, Advanced, Standard or Tested.
Open source software is widely used but faces security challenges as vulnerabilities have been found in widely used open source components. While most companies do not currently monitor open source code for security issues, the open source community is adapting to improve security. New approaches for security processes and tools are emerging and will provide increased choices for addressing open source security over time.
This document provides an introduction to software testing fundamentals. It discusses why testing is important to find defects, how testing promotes quality, and how testing fits into quality assurance. It defines key terms like bug, defect, error, failure, fault, and explains causes of software defects. It discusses when defects arise and the costs of defects. It also covers the role of testing in software development and maintenance, how testing relates to quality, and challenges around determining how much testing is needed. Finally, it discusses using defect data to plan tests and how testing aims to improve quality but can never prove a system is completely defect-free.
This document summarizes the results of testing various anti-malware solutions for Android. It tested the solutions using 618 malicious Android applications and reported the detection rates. Some solutions were able to scan the entire device storage for malware, while others could only scan installed applications and files. The testing was performed on both emulators and real Android devices to verify the results. The document analyzes the detection rates of each solution at the family level to provide more insight than just an overall detection percentage. This allows identifying weaknesses in detecting specific malware families.
The document is a test report that evaluated 41 Android anti-malware solutions and grouped them into categories based on their average detection rates of malware families. The top category detected over 90% of malware and included solutions from Avast, Dr.Web, F-Secure, Ikarus, Kaspersky, Lookout, McAfee, MYAndroid Protection, NQ Mobile, and Zoner. The next category detected between 65-90% and included solutions from 13 companies. The third category detected between 40-65% and included BluePoint, G Data, and Kinetoo. The fourth category detected less than 40% and the final category did not detect anything.
The document is a test report that evaluated 41 Android anti-malware solutions and grouped them into categories based on their average detection rates of malware families. The top category detected over 90% of malware and included solutions from Avast, Dr.Web, F-Secure, Ikarus, Kaspersky, Lookout, McAfee, MYAndroid Protection, NQ Mobile, and Zoner. The next category detected between 65-90% and included solutions from 13 companies. The third category detected between 40-65% and included BluePoint, G Data, and Kinetoo. The fourth category detected less than 40% and did not include major security companies.
The document discusses prototyping and provides examples of different types of prototypes including paper prototypes, digital prototypes, storyboards, role plays, and space prototypes. It explains that prototyping is used to make ideas tangible and test reactions from users in order to gain insights. Prototypes should be iterated on and fail early to push ideas further and save time and money. Both low and high fidelity prototypes are mentioned as ways to test ideas at different stages of the design process.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
The document is a summary of a security survey conducted in 2013 by AV-Comparatives. Some key findings include:
- Over 4,700 computer users worldwide participated in the anonymous online survey.
- Most users were aware of security risks but about 3% did not use any security software.
- Detection rates, malware removal, and performance impact were the most important factors for users when choosing security software.
- Windows 7 and 8 were the most commonly used operating systems, and Firefox and Chrome the most popular browsers.
- Over half of respondents paid for security software while free solutions grew in popularity. Improved performance was the most requested improvement to security software.
Live 2014 Survey Results: Open Source Development and Application Security Su...Sonatype
The survey saw its highest participation yet with 3,353 respondents. It was conducted between April 1st and April 30th, with 1,513 responses before the announcement of the Heartbleed bug on April 7th, and 1,839 after. The results revealed that most organizations are not well prepared for vulnerabilities like Heartbleed, as the majority do not have strong open source policies, do not actively monitor components for vulnerabilities, and do not track components in production applications. However, there are signs the industry may be reaching an "inflection point" and increasing focus on application security and governance of open source components.
What are the advantages of non functional testingMaveric Systems
Software testing is a study conducted to provide information about products or services to interested parties. It provides a view of the private sector to enable people to understand the risks associated with having to use it.
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...AnnaBtki
Mobile is unique. It provides unique opportunities and presents unique challenges. To take these on, mobile product organizations need to align their teams to work together efficiently and adopt best practices in Mobile DevOps. But it’s difficult to develop a roadmap for improvement without understanding current strengths and weaknesses, and benchmarking Mobile DevOps maturity against similar organizations. Our survey was designed to give mobile teams a way to asses their Mobile DevOps performance, productivity, and maturity, and to give steer on where and how to make improvements.
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012Jason Hong
Malware continues to thrive on the Internet. Besides auto-mated mechanisms for detecting malware, we provide users with trust evidence information to enable them to make in-formed trust decisions. To scope the problem, we study the challenge of assisting users with judging the trustworthiness of software downloaded from the Internet. Through expert elicitation, we deduce indicators for trust evidence, then analyze these indicators with respect to scal-ability and robustness. We design OTO, a system for com-municating these trust evidence indicators to users, and we demonstrate through a user study the effectiveness of OTO, even with respect to IE’s SmartScreen Filter (SSF). The results from the between-subjects experiment with 58 par-ticipants confirm that the OTO interface helps people make correct trust decisions compared to the SSF interface regard-less of their security knowledge, education level, occupation, age, or gender.
Authors are Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin Gao
LC Chen Presentation at Icinga Camp 2015 Kuala LumpurIcinga
This document provides an introduction to open source network monitoring. It discusses key topics such as network monitoring, network management, why network management is important, popular open source monitoring tools like Icinga 2, Smokeping and Cacti, potential traps of open source like lack of support and integration issues. It also covers elements of open source maturity, a maturity model, and benefits of open source like cost savings, avoiding vendor lock-in and access to more functionality.
This document summarizes the results of an anti-virus test conducted in March 2012. 20 anti-virus products were tested on their ability to detect malware. G Data had the highest detection rate at 99.7%, while AhnLab had the lowest at 94%. Microsoft had the fewest false positives at 0, while Webroot had the most at 428. Based on detection rates and false positives, products received awards of Advanced+, Advanced, Standard or Tested. G Data, AVIRA and Kaspersky received Advanced+.
The document summarizes an evaluation of anti-malware solutions for Android. It reports that certain parts of their previous paper and testing methodology were considered flawed by vendors, so additional testing is being done. It provides details on the testing methodology used, which involved evaluating products' abilities to detect a collection of over 600 malware samples both during on-demand scans and when the samples were installed. Products were grouped into categories based on their detection rates, with the top category detecting over 90% of samples.
This document summarizes the results of an anti-virus test conducted in March 2012. 20 anti-virus products were tested on their ability to detect malware. G Data detected 99.7% of malware samples, scoring highest. Microsoft detected 93.1% of samples, scoring lowest. The test also evaluated false alarms on clean files. Microsoft generated 0 false alarms, while Webroot generated 428 false alarms, the most of any product. Based on detection rates and false alarms, products received awards of Advanced+, Advanced, Standard or Tested.
Open source software is widely used but faces security challenges as vulnerabilities have been found in widely used open source components. While most companies do not currently monitor open source code for security issues, the open source community is adapting to improve security. New approaches for security processes and tools are emerging and will provide increased choices for addressing open source security over time.
This document provides an introduction to software testing fundamentals. It discusses why testing is important to find defects, how testing promotes quality, and how testing fits into quality assurance. It defines key terms like bug, defect, error, failure, fault, and explains causes of software defects. It discusses when defects arise and the costs of defects. It also covers the role of testing in software development and maintenance, how testing relates to quality, and challenges around determining how much testing is needed. Finally, it discusses using defect data to plan tests and how testing aims to improve quality but can never prove a system is completely defect-free.
This document summarizes the results of testing various anti-malware solutions for Android. It tested the solutions using 618 malicious Android applications and reported the detection rates. Some solutions were able to scan the entire device storage for malware, while others could only scan installed applications and files. The testing was performed on both emulators and real Android devices to verify the results. The document analyzes the detection rates of each solution at the family level to provide more insight than just an overall detection percentage. This allows identifying weaknesses in detecting specific malware families.
The document is a test report that evaluated 41 Android anti-malware solutions and grouped them into categories based on their average detection rates of malware families. The top category detected over 90% of malware and included solutions from Avast, Dr.Web, F-Secure, Ikarus, Kaspersky, Lookout, McAfee, MYAndroid Protection, NQ Mobile, and Zoner. The next category detected between 65-90% and included solutions from 13 companies. The third category detected between 40-65% and included BluePoint, G Data, and Kinetoo. The fourth category detected less than 40% and the final category did not detect anything.
The document is a test report that evaluated 41 Android anti-malware solutions and grouped them into categories based on their average detection rates of malware families. The top category detected over 90% of malware and included solutions from Avast, Dr.Web, F-Secure, Ikarus, Kaspersky, Lookout, McAfee, MYAndroid Protection, NQ Mobile, and Zoner. The next category detected between 65-90% and included solutions from 13 companies. The third category detected between 40-65% and included BluePoint, G Data, and Kinetoo. The fourth category detected less than 40% and did not include major security companies.
This document proposes a system to provide concise risk summaries for Android apps to help users make more informed decisions. Currently, users often ignore lengthy permission information when installing apps. The proposed system would assign each app a risk score and display a brief summary. This could encourage users to choose lower-risk apps and incentivize developers to request only necessary permissions. Four experiments examined the effects of introducing summary risk information and different ways to present it. Results showed risk summaries had a positive impact on user selection processes and curiosity about security.
The document summarizes the results of an on-demand anti-virus detection test conducted by AV-Comparatives in February 2010. It tested 20 major anti-virus products on their ability to detect malicious software. The results showed detection rates ranging from 99.7% to 97.1%, with lower percentages indicating more missed malware samples. A graph visually depicted the differences in missed samples between the products. The report also included sections on false positive testing and scanning speed.
This document summarizes the results of an on-demand malware detection test conducted by AV-Comparatives in February 2010. 20 antivirus products were tested on their ability to detect malware samples from a set containing over 1.2 million files. The summary includes detection rates for each product, with G DATA, AVIRA, and Panda detecting over 99% of malware. It also includes false positive results, with eScan, F-Secure, and others having very few false alarms. Finally, it shows the award levels reached by each product based on detection and false alarms, with some products reaching the highest ADVANCED+ level.
We are excited to announce that our new State of Software Security (SOSS) rep...Ampliz
We are excited to announce that our new State of Software Security (SOSS) report is officially available.
We encourage you to download the report and check out some of the key findings.
For instance, new Research Finds 20x Increase in Software Security Scanning Over the Past Decade.
New Veracode State of Software Security Report
Available Now: https://bit.ly/3tTHT2I
The State of Software Security 2022 SOSS - SolutionNeelKamalSingh8
We are excited to announce that our new State of Software Security (SOSS) report is officially available.
We encourage you to download the report and check out some of the key findings.
Available Now: https://bit.ly/3tTHT2I
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
1. Security Survey 2011 www.av-comparatives.org
Security Survey 2011
Language: English
Last Revision: 10th March 2011
www.av-comparatives.org
-1-
2. Security Survey 2011 www.av-comparatives.org
Introduction
To improve our service we asked our website visitors on their opinion about various topics related to
Anti-Virus Software Testing and Anti-Virus Software in general. The results are very helpful for us and
we want thank all who joined the survey and spent their time to complete it.
Key data
Survey Period: 15th December 2010 – 15th January 2011
Total Survey Submissions: 1247
Invalid responses: 182 (84 invalid, 98 responses from AV-related participants)
Valid responses: 1065
The survey contained a few tricky questions and checks to allow us to filter out invalid responses and
users who tried to distort the results or by giving impossible/conflicting answers. As we were
primarily interested in the opinions of real/common users and visitors to our website, the survey
results in this public report does not take into account the responses of the AV-related participants.
Please note that the survey participants, who kindly filled out our long survey, are only a
representative subset of our website visitors. Please do not overstretch the results of the survey; they
just give an indication based on what the survey participants answered. Be aware that this report also
contains some personal comments and opinions.
The results of the survey are very valuable to us; you will find in this report the results of some of the
survey questions which we would like to share with you.
Sample population
The following three questions cover population aspects, so that we could compare them with our
internal website statistics, and get a feeling for whether the sample set of survey participants is big
enough to represent our visitors. The answers to the questions correspond with our website statistics
in the survey period (indicating that the survey participants are a representative sample of our users).
-2-
3. Security Survey 2011 www.av-comparatives.org
1. Where are you from?
2. Which operating system are you primarily using?
Windows 7 now finally seems to be the operating system that has taken over from Windows XP, at
least for the home users who took part in our survey. In business environments XP is probably still
widely used, although it will be surpassed there too in the next few years. According to the Global
Stats of Statcounter1, about 48% of the users worldwide are using Windows XP and only about 29%
are using Windows 7 so far. The 64-bit variant of Windows 7 is more used than the 32-bit variant,
most probably because under 64-bit it is possible to use more than 4GB of RAM.
1
http://www.statcounter.com
-3-
4. Security Survey 2011 www.av-comparatives.org
Although in detection tests there is practically no difference between different operating systems
used, there is definitely a difference in performance, due to which we switched to Windows 7 in 2010
for the performance tests. We may also consider switching to Windows 7 for the dynamic tests in
2012; currently we still perform them under XP, as we want to evaluate primarily the protection
provided by the security products, not the protection provided by a specific OS (if all users used up-
to-date and patched operating systems and software, maybe there wouldn’t be so many successful
malware attacks in the world).
Furthermore, as our tests are geared more towards the average user in general than the more security-
aware readers of our website, the choice of operating system considers the global stats of OS usage.
3. Which browser are you primarily using?
According to the Global Stats of Statcounter, about 46% of the users worldwide are currently using
Microsoft Internet Explorer and only about 30% are using Mozilla Firefox (except in Europe, were users
tend to prefer Mozilla Firefox).
-4-
5. Security Survey 2011 www.av-comparatives.org
4. Which of those acronyms are known to you?
5. Which Antivirus solution are you currently primarily using?
Among the most used antivirus solutions, the survey results suggest that the free available software
versions prevail, e.g. Avast, AVIRA, Microsoft, AVG, Comodo, etc. followed closely by well-known
commercial security solutions like from Symantec, Kaspersky, ESET, McAfee, etc.
The results confirm the assumption that about the half of all users are using free antivirus solutions.
Also a survey from OPSWAT2 came to similar results.
2
http://www.oesisok.com/news-resources/reports/worldwide-antivirus-market-share-report%202010
-5-
6. Security Survey 2011 www.av-comparatives.org
6. Which security solutions would you like to see in our tests?
We list here only the vendors which at least 25% of the survey participants voted for:
The above are the top 15 requested products (from a list of 70 well-known ones).
MalwareBytes is not intended primarily as a full replacement3 of an antivirus product or security suite,
but rather as a complimentary tool focussed on a smaller set of threats and its removal from
compromised systems. Therefore, it would be wrong to compare it to AV products as we usually test.
Unfortunately, although Comodo is a high demanded test candidate in this survey, Comodo did not
apply to participate in our 2011 test series, but they agreed to be tested separately in a Single
Product (On-Demand) Test.
3
http://www.wilderssecurity.com/showpost.php?p=1826047&postcount=2
-6-
7. Security Survey 2011 www.av-comparatives.org
7. Which type of tests are you most interested in?
Based on the responses (users had to choose 4 from 12 tests which they are most interested in),
users do not seem to be interested at all in anti-spam tests. Tests based on the Wildlist and tests
against potentially unwanted applications also seem not to be very interesting for users.
Clearly the great majority of users are interested in on-demand malware detection rate tests, as well
as retrospective tests which evaluate the heuristics etc. Malware removal and performance testing also
have high value. Last year we were not able to perform the malware removal test in time, but
considering how much users want this type of test, we will do our best to conduct a malware removal
test again this year.
Surprisingly, the Whole-Product Dynamic Test, which aims to perform an in-depth test of the security
software under real-world conditions, and which is promoted by the AV industry as the best type of
test to reflect product capabilities, still only gets a modest 5th in the users’ list of requested tests. We
expect that over time, users will start to appreciate this type of test more and more. Anyway, we see
and understand that the users will continue to be interested also in the “conventional” tests which
measure on-demand detection rates etc.
-7-
8. Security Survey 2011 www.av-comparatives.org
8. In your opinion, which of the following testing labs are...
The survey participants had to rate 22 testing labs, with the following three choices:
Reliable/trustworthy/independent
Biased by vendors/unreliable
I do not know them
The five most trustworthy/reliable/independent testing labs according to the survey participants:
1. AV-Comparatives
2. Virus Bulletin / AV-Test
3. ICSA Labs / West Coast Labs
VirusBulletin and AV-Test were rated similarly, as well as the two certification labs ICSALabs and
WestCoastLabs (which is why we put them on same level). AV-Comparatives got by far the highest
positive rating, but as the survey was produced by us and the survey participants are our website
visitors, this was to be expected – although other surveys on unrelated websites have also rated AV-
Comparatives on top (thank you!).
The five most unknown labs according to the survey (which almost nobody had ever heard of):
1. TollyGroup
2. ENEX
3. JCSR
4. eKaitse
5. Cyveillance
To do no “harm” to specific testing labs/websites, we will keep confidential which ones were
considered by the survey participants as the most unreliable and vendor-biased.
-8-
9. Security Survey 2011 www.av-comparatives.org
9. Would you use an AV which does not include any on-demand scanning
feature?
The reason for the above question was that we heard of an idea by some vendors not to provide an
on-demand scanning function anymore in their products. In our opinion, some vendors are not in
touch with users’ needs and wishes, so we wanted to see if the survey participants agree with us that
removing such a feature would not be welcome.
10. If you had any malware alerts in the last 12 months, do you think they
were mostly real or mostly false positives?
Fortunately most alerts seem to have been real ones, but the false alarm incidence seems to be an
issue which is underestimated and underrated by some vendors.
-9-
10. Security Survey 2011 www.av-comparatives.org
11. If your AV product or your operating system asks you if you trust a file
that you downloaded on purpose from the Internet, how do you usually answer?
Apparently not everyone seems to have understood this (we concede that the question was rather
confusing), so take the result with a pinch of salt. Based on our field experience with customers, we
believe that most everyday users often ignore questions and warnings from their operating
system/security software.
It should be noted that there are two common types of security notification that are encountered by
users. Windows will typically ask for user confirmation before executing ANY program file downloaded
from the Internet, without making any assumption as to whether the file is good or bad. For example,
running the setup file for a genuine Antivirus, typically the safest of safe files, brings up a Windows 7
UAC prompt, requiring the user to confirm that the file should be run. This relies entirely on the user
to decide if the file is good or bad; always clicking “No” would mean that the user could never install
any legitimate software that he/she had downloaded from the Internet. The second type of security
notification comes from security software such as antivirus programs or Windows Defender (to be seen
here as a separate application rather than part of Windows). Security programs may warn that a
SPECIFIC file could be dangerous, on the basis of e.g. behaviour/reputation. In this case, the sensible
option is always to click “No” to installation, as a legitimate application would probably not have
produced such a warning.
Our advice to users is: if you see a prompt asking you whether to install software, or warning you
against it, STOP AND THINK before clicking on anything.
Our advice to software manufacturers is: remember that many average users don’t think before
clicking on security prompts; they expect their product will decide for them if something is good or
bad, and block it if it’s bad. The story of “The boy who cried WOLF” applies here: too many false
alarms and user interactions lead to genuine warnings being ignored, its human nature.
- 10 -
11. Security Survey 2011 www.av-comparatives.org
12. What do you find important on AV-Comparatives?
Furthermore, about half of the users said that they like the fact that they can contact us (the testers)
if they want to, and that we have started to provide reports in various languages.
We also noted the nice comments towards AV-Comparatives and we will try to fulfil some of the
expressed wishes. Some requests are not possible to realize (e.g. because they would require too many
unavailable resources; we are not Google ), while some others are already in place on our website/in
reports, but maybe not have been noticed/read by all users.
13. What is important for you in a security product?
Note: “Without cloud” means “without being dependent of cloud/online connection.” This was explicitly
written in the survey, as we knew/expected that most users still prefer products not being dependent
of clouds / online connectivity to provide reliable protection.
- 11 -
12. Security Survey 2011 www.av-comparatives.org
14. What should AV vendors try to improve more, in your opinion?
Users had to select 6 product aspects which in their opinion AV vendors should improve more. The
graph above shows the 6 most selected product aspects. It may be an indication of what users feel to
be weak aspects of the products. Some few further expressed user wishes (under 20%) were: stronger
default configurations, detection of commercial keyloggers etc. (non-detection is a reason to mistrust
AV products), rely less on cloud/online connectivity, lower prices and better customer support.
- 12 -