IObit Malware Fighter

By James E. Gaskin Tweet PC users now understand they need malware protection except for that one guy in every group that drives you crazy , yet few want to pay for that protection. Thus, there are free anti-malware programs abound. IObit has been making a family of protection tools for over a decade, and their updated IObit Malware Fighter 3 has become one of the leading solutions for consumers and small businesses. IObit calls Malware Fighter “the world’s leading Anti-Malware tool,” but that term is subjective rather than verified by an independent source.
iobit anti malware


Just about every significant feature beyond the basic antivirus engine comes only in the Pro edition. Given the poor performance of Pro, I saw no reason to look at the less capable free version.

And there is a Bitdefender connection; one of the Pro-only features involves running a licensed version of Bitdefender’s antivirus engine. The window has plenty of empty space. A status indicator dominates the middle, with a big scan button below. At the left is a vertical menu that just shows icons, sliding out full labels when you point to it. And a bar at the bottom shows you the status of the three protection engines, IObit’s antivirus and ransomware protection engines plus the engine licensed from Bitdefender.

Several important features aren’t enabled by default; you need to fix that. First, turn on the Bitdefender engine, which requires a reboot. You also must configure the component that protects files from modification by ransomware. I discuss that configuration step below. Note that the last menu item, titled Action Center, is just an upsell page encouraging you to install other products, some from IObit, some from other vendors.

For example, on one test system the collection included Dashlane , adaware Web Companion, and Aomei Backupper. Another installation offered to install Opera. Tools from IObit include an uninstaller, a disk defrag tool, and a utility to check for outdated drivers. No Help From Independent Labs Getting good scores in independent lab tests is important, but so is simply appearing in the lab reports.

If a product appears in a test report, it means the lab felt it was worth evaluating, and the company felt it was worth funding the report. Malware Fighter, by contrast, appears in none of the lab tests. Lab Test Results Chart Kaspersky recently swept the field, with perfect scores in every test that I follow. Bitdefender missed that honor by a hair, down by a half-point in a single test. When I see results like that, I use my hands-on testing more to get a feel for the product than to rate its efficacy.

With nothing from the labs, my tests are the only way I can see how well Malware Fighter works. Poor Malware Protection Scores I start my malware protection test by opening a folder containing a collection of malware samples that I gathered and analyzed myself. In most products, the tiny file access required to display the sample in Windows Explorer is enough to trigger a real-time protection scan.

Bitdefender, for example, quickly wiped out 79 percent of the samples on sight. I was surprised to find that even with Bitdefender protection enabled, Malware Fighter only eliminated 7 percent of the same samples. I checked with my contact at Bitdefender, who responded thus: Also, it is relevant how the technology integration is done, because the final output on how threats are handled is very specific to each product.

IObit totally missed almost half the samples, allowing them to run rampant on the test system. Even when it did claim to quarantine the malware, it failed to remove executable malware files in several cases, and even left one supposedly quarantined threat running. In the end, it detected 54 percent of the samples and earned 4. Cylance, F-Secure, and Bitdefender detected 93 percent of these samples, and scored 9. IObit’s own Advanced SystemCare managed 8.

The program did pop a warning about a few samples trying to configure themselves to launch at startup. However, I didn’t count this as detection, because it displayed the same warning about legitimate programs.

Malware Protection Results Chart Unlike the independent lab researchers, analyzing malware isn’t my sole job. It’s just a task I must perform from time to time, and it’s laborious. As a result, I use the same samples for quite a while. To get an idea of how an antivirus handles the most recent malware, I use a feed of malware-hosting URLs supplied by MRG-Effitas , choosing those discovered in the last day or two.

For each URL that’s still valid, I record whether the antivirus kept the browser away from danger, pounced on the malware download, or failed to do anything. The Surfing Protection feature’s stated aim includes protecting your browser from “various online threats,” suggesting it should prevent access to at least some of the nasty URLs. It did not. The antivirus jumped in to kill off many downloads, frequently wiping them out before I could even hit Save.

But it only got 61 percent of them. Interestingly, while IObit Advanced SystemCare Ultimate did a lot better in the malware protection test, it, too, scored 61 percent against the malware-hosting URLs that were current when I reviewed it.

And it, too, did all its work by analyzing downloads, none by blocking access to dangerous websites. I checked with IObit, and my contact there expressed surprise that Surfing Protection didn’t steer the browser away from dangerous URLs.

He requested some examples, so I submitted 60 URLs where Surfing Protection did nothing, but the local antivirus wiped out the malware download.

It took a week to hear back from my IObit contact, who said that the company would concentrate on this part of the app and keep working to improve it. The URLs for this test are different every time, but they’re always the most recent, and I use or more to get a good sample. Bitdefender took down 99 percent of the samples in its latest test. Norton managed 98 percent, and Trend Micro came close with 97 percent. A score of 61 percent is very low. Super Slow Scan When you install an antivirus utility, you should always run a full scan at the start, just in case the system is already infected.

After that, the real-time protection should keep out any new problems. Malware Fighter strongly encourages this initial scan. The status indicator on the main page won’t go green until you take care of that task. I time each product’s full scan on a system without malware, because some products interrupt the scan and await user instruction when they find a threat.

The average time for current products to complete a full scan is just under 50 minutes. Malware Fighter took more than two hours, making it one of the slowest, even slower than Microsoft Windows Defender Security Center , which took 90 minutes. When your antivirus has an effective real-time protection system, you can figure that after that initial full scan you’re protected from further attack. Given Malware Fighter’s spotty real-time protection, I would suggest performing a full scan regularly, when you can spare the time.

During my antiphishing test, I saw proof that it was alive and well. Or at least it was alive. It didn’t do well. Phishing sites don’t include malicious code. Rather, they aim to trick unwary users into giving up their credentials for banking, gaming, even matchmaking websites. If you think you’re logging into PayPal, not noticing that the URL is wrong, you’ve given away your account. Sure, these frauds get caught and taken down, but they just pop up again with a new fake URL.

For testing purposes, I gather the newest reported frauds I can find, aiming to get ones that are too new to have been widely blacklisted. I launch each simultaneously in four browsers. The product under test protects an instance of Internet Explorer with phishing protection disabled; the other three use phishing protection built into Chrome, Firefox, and Internet Explorer. I aim for verified phishing sites. During the test, I could see that Surfing Protection was active.

The status bar at the bottom, the one that reports URLs the browser is downloading, would go through a moment where it displayed “Waiting for extension IObit Surfing Protection. Clicking it revealed the message “This site is safe. It earned an unprecedented 0 percent score in the antiphishing test.

All three browsers did much better. Recently, Kaspersky Anti-Virus also took an unprecedented score in this test, with percent success.

Bitdefender managed 99 percent, while Trend Micro and ZoneAlarm got 98 percent. Success is clearly possible; IObit demonstrates that utter failure is also possible. However, I’ve beefed up my testing since that time, and my current tests reveal some weaknesses in ransomware protection.

Like Bitdefender, Trend Micro, and others, Malware Fighter can block unauthorized access to your documents, images, and other files. But unlike the others, its list of protected folders is empty by default. If you don’t add Documents and other important folders, you don’t get full protection. In the previous review, I griped that the default settings failed to protect text files and various image file types.

This time around, it checks the protection box for all the file types, for which I’m grateful. For a sanity check on products that aim to block unauthorized file access, I use a simple-minded fake ransomware program that simply XOR-encrypts all text files in the Documents folder, and a very simple text editor, both of which I wrote myself.

Malware Fighter correctly detected attempts by these programs to modify protected files, and prevented them when I clicked Block. Next came the big guns; testing with real-world ransomware. Normally I turn off real-time antivirus protection, simulating a situation where the ransomware is so new it doesn’t get caught. I couldn’t find a way to turn off all real-time protection with Malware Fighter, but it hardly mattered, because even with the Bitdefender engine turned on, it only prevented a third of my ransomware samples from running.

It did prevent the other ransomware samples from meddling with files in the Documents folder. However, I forgot to add Desktop, so one sample encrypted text files on the Desktop.

Two ran unopposed and displayed their ransom demands. Oddly, Malware Fighter detected and quarantined one of the ransom-demand documents, while ignoring the ransomware program. In my ransomware protection testing, I’ve encountered products that fail when ransomware launches at startup.

To test that possibility, I moved my Petya ransomware sample into the startup folder. Malware Fighter did quarantine Petya when I simply launched it.

No Help From Independent Labs

Publisher Description Gear up! It’s time to talk about another cog in IObit’s finely tuned computer management machine. If you think IObit is to your liking, then you will be happy to know that Advanced System Care brings them all into one package. Since you’re still reading this, let’s jump to what concerns this software product. IObit Malware Fighter is designed to detect all manner of worms, trojans, spyware and other insects that might have nested in your operating system. It also holds an eye over your internet browser and applies some modifications in order to keep infections at bay. Malware Fighter can perform intelligent scans which target vulnerable areas, Full scans which target everything and Custom scans that are user defined.

VIDEO: IObit Malware Fighter Database Update 1853 April 5, 2019

IObit Malware Fighter is a practical security tool that, in addition to protecting your computer from any possible online threats, Malwarebytes Anti-Malware icon. IObit malware fighter not fully protected anymore? IObit anti-malware engine is a really useful anti-virus tool to offer your Window 10//8/7 computer a real-time. IObit Malware Fighter Pro is the lead product in the company’s It boasts both the IObit and Bitdefender antivirus engines, anti-ransomware.

Leave a Reply

Your email address will not be published. Required fields are marked *