Step 1: Capturing malware from honeypots
An ideal source of samples is this which offers the most widespread, fresh, and diverse samples that are independent of antivirus software provider. In this case, “the freshness“ of downloaded…
Step 2: Analyzing system logs
Before a potentially harmful sample is qualified for tests, one of the components of a testing system checks if malicious software certainly introduces unwanted modifications to …
Step 3: Methods of carrying out automatic tests
The latest update for the following methods was introduced in January 2019. In comparative tests all products are evaluated in the same working environment. An operating system, additional tools,…