Kaspersky 'slipped' anti-spam test
There have been 14 software that passed the VBSpam anti-spam test and the only 'sliding competitor' is the reputable Kaspersky security software.
Security magazine Virus Bulletin has just announced the results of the testing of the 15 most popular security software in the world today.
According to test experts, Kaspersky software has a low false detection rate but at the same time it also loses many ' genuine ' spams.
However, experts claim they are satisfied with the general capacity of security software on the market. ' In the past 10 years, spam has changed from being just a common harasser to a criminal level and threatening cyber security. In the near future, this problem will not be reduced , 'said Martijn Grooten, the test director,' Even so, the test results show that security companies have put a lot of effort into protecting people use'.
Virus Bulletin appreciates the anti-spam capabilities of software from MailMarshal, SpamTitan, Microsoft, Forefront, Symantec Brightmail and Webroot.
5 ★ | 1 Vote
You should read it
- Kaspersky launched a new anti-spam technology
- Kaspersky Lab recommends that users be wary of fraudulent methods of targeting job seekers
- Update the AVP Tool Kaspersky Virus Removal Tool database manually
- First iPod virus: harmless!
- How to delete malicious programs using Kaspersky Virus Removal Tool
- Kaspersky launched Internet Security and Antivirus 2010 versions
- Kaspersky 2013 is coming soon in Vietnam
- Kaspersky warned the ATM card virus
- How to transfer Kaspersky Free Antivirus to English interface
- How to use Kaspersky Free antivirus software
- Beware of the 7 most common types of spam
- What is spam? How is it understood in Zalo, LoL, Facebook ...
Maybe you are interested
iPhone security tips you're missing out on
This list of common passwords shows how little we understand about online security
Download free Windows Server 2025 security guide
5 Misconceptions About Password Security
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications