

Once a year we go on a hunting expedition for new samples and use them to rebuild the virtual machine testbeds that we use for ongoing evaluations. We need to use the same malware samples over time to get an apples-to-apples comparison between different products, but we don’t want to test a product twice with the same samples, lest it get an unfair advantage. We don’t just take the publisher’s word that a product works-we put it up against real-world challenges, including actual malware samples captured in the wild. How to Set Up Two-Factor AuthenticationĪt PCMag, we’re devoted to hands-on testing of products and services, and evaluating security software is a huge part of what we do.How to Record the Screen on Your Windows PC or Mac.How to Convert YouTube Videos to MP3 Files.

