Samsung T7 Touch review: portable, fast, and secure - The Verge
Samsung T7 Touch review: portable, fast, and secure - The Verge |
- Samsung T7 Touch review: portable, fast, and secure - The Verge
- The Bezos WhatsApp hack linked to a Saudi prince could happen to anyone - Vox.com
- Jeff Bezos iPhone hacking: How to protect your phone from cyber hackers - Fox Business
- BullGuard Internet Security 2020 review - TechRadar India
Samsung T7 Touch review: portable, fast, and secure - The Verge Posted: 23 Jan 2020 09:00 AM PST A good portable SSD should be small, fast, and able to connect to devices through the almighty USB-C port. Samsung's new T7 Touch checks all of those boxes, plus another big one: it's more secure than your average SSD. There's a capacitive fingerprint reader built into the top of the drive, which works like the one you might have on your phone or laptop. After you've enrolled a fingerprint via the free companion app, it will require authentication before it mounts to your computer or phone. This feature — backed by AES 256-bit hardware encryption to lock down your biometric data and the drive's contents — makes it so that not just anyone can plug it in and see what you have stored. It works exactly like I thought it would. Samsung's software for the SSD (compatible with Windows 10, macOS, and Android) is simple to use. The software even comes loaded onto the drive for easy installation, with the exception of the Android version, which is available from the Google Play Store. You'll need to create a password in the software to use the sensor, and you can enroll up to four fingerprints that can unlock it. The most obvious choice might be to log a few of your own fingers. But if you plan to share this with a classmate, your family, or colleagues at your company, the better move is to register other people's fingerprints with the drive, too. That way, it can be passed back and forth without much worrying. As you probably expected, activating the T7 Touch's security settings in the app means that you'll need to authenticate your fingerprint each time you connect the drive to a phone or computer. The LEDs behind the sensor blink repeatedly while it waits for you to verify your identity, and until you do, it mounts as a mostly useless read-only drive that supplies a download of Samsung's SSD software. It's a little more useless in this read-only state than I'd like. Samsung doesn't let you create a customized message that appears automatically, like one to point people in the right direction to return the drive should it get misplaced. Also, if you don't have a fingerprint logged and you forget the password for the drive, simply resetting it isn't an option. It will permanently stay in read-only mode, and you will have to contact Samsung to arrange a manual reset. I tested the 500GB model that costs $129.99. Samsung also offers a 1TB version that costs $229.99 and a 2TB drive that costs $399.99. That's getting up there in price for a drive that doesn't support Thunderbolt 3's faster transfer speeds, though to the T7 Touch's credit, it's not far off what the previous generation T5 sold for. In addition to the new fingerprint security, the T7 is also considerably faster than the T5. For those who aren't familiar with the T5, Samsung's 2017 portable SSD, the T7 Touch still looks and feels like a compact business cardholder. It's easy to pocket, and its slim design lets it slide easily into practically any bag. This new model is wrapped in aluminum that Samsung says makes it shockproof from a drop of up to six and a half feet in height. In the box, you'll find a USB-C to USB-C cable as well as a USB-C to USB Type-A cable in case you need to connect it to a device that doesn't have a USB-C port. Similar as they might look, the T7 Touch's NVMe solid-state drive amounts to a huge boost in transfer speeds compared to the SATA drive used in the T5. We compared several USB-C drives last year to find out what kind of portable drive you should be spending your money on, and those with NVMe storage inside came away the clear winners — even though they cost a premium. This is the technology you want inside of your laptop, your next-gen gaming console, and definitely what you want inside of your next portable drive. Of course, just how fast this (and any) drive transfers relies entirely on what kind of computer you're plugging it into. Samsung's T7 Touch uses the USB 3.2 Gen 2 interface with 10Gbps bandwidth (same bandwidth as USB 3.1 Gen 2, different name). Samsung claims up to 1,050MB/s read and 1,000MB/s write speeds, and it's possible to achieve something close to those marks if these criteria are met:
I tested this drive out with a 2019 MacBook Pro, which features two Thunderbolt 3 ports that can handle far more bandwidth than Samsung's T7 Touch is capable of piping through. Using Blackmagic Disk Speed Test, the T7 Touch boasted an average write speed of 807MB/s and read speed of 903MB/s. That's below what Samsung advertises above, but it's what I expected. It's possible that the larger-capacity models in this lineup could perform slightly better since large-capacity solid-state drives are allegedly faster, thanks to having more NAND layers to write to. But overall, these numbers are on par with performance from a 1TB Intel 660p NVMe SSD fitted in an enclosure. Arbitrary read and write speeds are nice to have, but the most transparent kind of test is seeing how long it takes to transfer a large file from the drive to the laptop and from the laptop back to the drive. It took nine seconds on average to copy a 13GB file on the MacBook Pro, roughly a 40 percent improvement compared to the T5 SATA SSD doing the same test. To copy the file to the T7 Touch, it took 11 seconds on average, an approximate 35 percent increase in speed compared to the T5. I also ran this test with the aforementioned Intel 660p NVMe SSD mounted in an enclosure, and the results were within a second of what the T7 Touch managed. At first, the takeaway here doesn't look great for Samsung; a large 1TB NVMe drive and an enclosure to pop it into costs just a bit more than this 500GB drive, yet performs just about the same — if not slightly better. Building your own drive will afford you more storage for less money, but so long as you're all right with taking a hit in storage capacity, Samsung's latest portable drive gets you added security and a more compact design. Having a fingerprint sensor won't make this a must-have product for everyone. But if you're sold on the form factor and the speed improvements Samsung made here, you should know that a version of the T7 that won't support biometrics is coming in Q2 2020. It will likely be slightly more affordable (though Samsung hasn't yet confirmed the price) and will even out the value better compared to a DIY NVMe drive. Still, for the time being, Samsung's new model isn't much more expensive than its predecessor, and the added features and faster transfer speeds amount to a product you likely won't regret buying. Vox Media has affiliate partnerships. These do not influence editorial content, though Vox Media may earn commissions for products purchased via affiliate links. For more information, see our ethics policy. |
The Bezos WhatsApp hack linked to a Saudi prince could happen to anyone - Vox.com Posted: 22 Jan 2020 05:00 PM PST A new investigation suggests that the hacking of Amazon CEO Jeff Bezos's phone stems from a WhatsApp account linked to Saudi Arabia's Crown Prince Mohammed bin Salman and one seemingly innocuous video file. The alleged hack shows that security online is never guaranteed, even on this very popular Facebook-owned encrypted messaging app. And that's something to keep in mind even if you aren't a billionaire. How Jeff Bezos allegedly got hacked, explainedFirst reported by the Guardian and the Financial Times, the investigation found that an iPhone X belonging to Bezos was hacked after it received a video file in a WhatsApp message in May 2018. The business advisory firm FTI Consulting, which conducted the investigation, claims with "medium to high confidence" that the video file came from a WhatsApp account belonging to Mohammed bin Salman, also known as MBS. According to a copy of the full report, compiled by FTI and obtained by Vice, the video itself could not be studied due to WhatsApp's encryption feature, so it remains unclear if it contained malware. Nevertheless, investigators observed that, shortly after the video was sent, abnormally large amounts of data were exfiltrated from the phone. (Data exfiltration occurs when a malicious actor transfers data off of a device, usually without the owner's knowledge.) This exfiltration continued at a high rate for several months. The video was sent to Bezos, who owns the Washington Post, at the same time as the Saudi government was, according to the report, "very concerned" about Washington Post columnist Jamal Khashoggi. Khashoggi was murdered in October 2018. CIA officials later concluded that the killing took place with MBS's approval, an allegation the Saudi prince has denied. Meanwhile, suspicions that the Saudi government had hacked Bezos's phone began in February 2019, after the National Enquirer reported that Bezos was having an extramarital affair. That report appeared to rely on information that could only have been obtained through Bezos's phone. Bezos's security team hired FTI Consulting to investigate his phone shortly after. (The National Enquirer claims its information came from Bezos's girlfriend's brother and that the Saudi government was not involved.) Further adding to the evidence that MBS hacked Bezos's phone: A few days after Bezos was told on the phone that he may have been hacked by the Saudi government, MBS sent him a message over WhatsApp saying (all sic): "Jeff all what you hear or told to it's not true and it's matter of time tell you know the truth, there is nothing against you or amazon from me or Saudi Arabia." The release of the FTI report also caught the attention of two United Nations Human rights experts, who called for further investigation into allegations that MBS hacked into Bezos's phone. Meanwhile, the potential link between the phone hacking and Khashoggi's murder does not appear to be lost on Bezos, who tweeted this the day after the FTI report emerged: MBS allegedly uses WhatsApp to communicate with many high-profile figures, including Boris Johnson, Richard Branson, and President Trump's son-in-law Jared Kushner. One Silicon Valley executive told Recode that other leaders and executives in the tech industry are worried about undiscovered attacks. After all, MBS met with several of them — including Sergey Brin, Tim Cook, and Peter Thiel — when he visited the region in April 2018. If it happened to Bezos, it could happen to you — so here's what you should keep in mindIt's easy to dismiss this maze of revelations involving Bezos and MBS as just another high-profile hack. What's notable here, however, is that the hacking happened within WhatsApp, a service that promotes itself as the safe option for people who are concerned that their messages will be intercepted by hackers. WhatsApp even says in its FAQ, "Privacy and security is in our DNA." (WhatsApp did not respond to a request for comment.) Thanks in part to this promise of privacy and security, WhatsApp is one of the most popular apps in the world, with about 1.5 billion active users worldwide as of February 2018. Its primary security feature is end-to-end encryption, which means messages can only be seen by the sender and receiver while they're in transit — anyone who intercepts them will receive an unreadable encrypted file. Not even WhatsApp can read users' messages. However, this added layer of protection should not be confused with absolute security, as the Bezos hack shows. Assuming the report's conclusions are correct, the end-to-end encryption worked just fine: FTI was unable to decrypt the file apparently sent by the account linked to MBS. But good encryption didn't prevent Bezos's phone from sending gigabytes worth of data to a malicious actor for weeks after the video file was sent. It's worth pointing out that a default setting in WhatsApp allowed Bezos's phone to download the video file — and any malware therein — automatically. You can opt out of this feature to help protect against something like this happening to you. As alarming as the Bezos hacking story seems, WhatsApp users concerned about security might not want to delete the app just yet. Even with WhatsApp's checkered history, several security experts told Recode they don't think the app is particularly problematic. "This is not indicative of a vulnerability in WhatsApp," Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, said. "There is nothing they can do when a trusted contact sends you a carefully crafted malicious link." Maya Levine, a security engineer at cybersecurity company Check Point, said it's not so much that WhatsApp is especially flawed. The Facebook-owned app is simply an attractive target, which makes its vulnerabilities much more likely to be exposed. "It's encrypted messages, so you can get a lot of information if you are able to hack WhatsApp successfully," Levine said. "WhatsApp is probably the most popular encrypted messaging app worldwide and because of that, it's maybe targeted a little bit more by hackers. But I wouldn't say it's less secure." The best takeaway for the average person is not to be lulled into a false sense of security and assume they'll be left alone because they aren't a typical hacker target, said Paul Ducklin, principal research scientist at cybersecurity firm Sophos. Even apps packed with privacy features, he added, aren't completely safe. "Unfortunately, when it comes to cybercriminality these days, nobody's immune and no software that you use is likely to be 100 percent free of bugs," Ducklin said. "Sometimes people get a program like WhatsApp or any of its many competitors, and once they find out it's got all this encryption, they assume that encryption means that the message is secure forever hereafter, when the encryption is about securing the content while it's going between you and the other person. It's important not to hear about a technology and assume that it protects you more than it does." And while nothing is foolproof, there are some things you can do to minimize your risk. "Keep up to date on your updates," Levine said, "both on your phone's operating system itself and your apps." Updates will contain security patches that fix flaws and vulnerabilities, and often roll out soon after they are discovered. Despite WhatsApp's security issues — and WhatsApp is hardly the only encrypted messaging app to have this problem — Galperin doesn't think users should abandon it. Last May, she wrote about a different WhatsApp vulnerability and recommended that people continue to use end-to-end encrypted messaging apps, which she said are one of "the most effective ways to protect the contents of your messages," at least for "most people most of the time." Ducklin, meanwhile, said the best way to prevent sensitive information from being taken from your phone is the time-honored method of not putting it there in the first place. That, and thinking twice about what you're sharing and who you're sharing it with. "Sometimes, the best way to avoid that problem is simply to go, 'Okay, I'm going to share less information,' or, 'I'm not going to share this particular photograph,' or, 'I'm not going to talk about secret personal stuff on this channel. Maybe I'll wait until I meet up with this person face to face,'" Ducklin said. "Modulating your own behavior a little bit is often a lot better than fretting about which of many potentially equal apps you're using to communicate." Bezos may be a unique and desirable hacking target, but the dangers of putting all your trust in an app — even a reasonably secure one — apply to everyone. "The app can't save you from yourself," Ducklin said. Open Sourced is made possible by Omidyar Network. All Open Sourced content is editorially independent and produced by our journalists. |
Jeff Bezos iPhone hacking: How to protect your phone from cyber hackers - Fox Business Posted: 23 Jan 2020 09:29 AM PST Some people are wondering how hackers tricked the founder of the most valuable brand in the world into watching a video on his iPhone that contained malware. Continue Reading Below Two U.N. experts called for an investigation by the U.S. into information they received suggesting Amazon founder Jeff Bezos opened a malware-containing video message on the Facebook-owned messenger WhatsApp that appeared to come from Saudi Crown Prince Mohammad Bin Salman's personal account in 2018. Check Point, a software company, has conducted extensive research on WhatsApp since 2018 and exposed vulnerabilities in the app that led to scams like this one involving Bezos, as well as updates in the app that have helped fix those vulnerabilities. "Instant messaging and social media – as we've seen in the last three years – these are the mains target today from a phishing attack perspective," Oded Vanunu, Check Point head of product vulnerabilities research, told FOX Business. "We are talking about billions of people using these apps; [they] are used on all types of devices all over the world." "These apps have become like gates to bad actors," he said, adding there is "a big public market for cyber-offensive vulnerabilities weapons. There are big offensive companies all over the world paying money for these kinds of vulnerabilities." The bad actors in this situation gained access to Bezos' phone using a method called "phishing." Phishing is a popular hacking technique that tricks people into opening links and sharing personal information to give hackers access to devices. BEZOS RETAINS CROWN AS WORLD'S RICHEST IN 2019, DESPITE LOSING $38B IN DIVORCE Sixty percent of Americans say they or a close family member has been a victim or a phishing attack, according to a 2019 report from phishing protection company Retruster. Additionally, there was a 200 percent increase in phishing attacks via social media in 2018, according to Phishlabs. "Consumers need to recognize that the very value proposition that makes WhatsApp appealing -- privacy and secrecy of messaging -- is what makes it an extremely desirable target for the bad guys and people with bad intentions," Richard Bird, chief customer information officer at software company Ping Identity, told FOX Business. "Secrets are too valuable of an asset for the bad actors not to at least try." So, if the founder of Amazon can fall victim to phone hacking through social media, how can regular people prevent bad actors from getting access to their phones and personal information? Here are some tips. Keep your apps up to date"The first thing is always to make sure your apps are up to date," Vanunu said. "Vendors are always issuing updates. With updates, there are also security backs. It's very important." WHAT TYPES OF COMPANIES COULD BE TARGETTED BY AN IRANIAN CYBER ATTACK? Phone, computer and tablet systems should also be updated on a regular basis. Be wary of potential phishing messagesIf Bezos' hacking story has taught the public anything, it's that people should be cautious when they are opening emails and messages -- especially on social media apps -- that contain links, videos and other content that requires the user to click or open a new tab on a device. Users should also pay attention to email and general message senders and ask themselves if certain names and addresses are familiar or unrecognizable. "You can't tell people not to open videos and messages that are part of the application," Vanunu said. "But they should bear in mind that when they get messages from people they don't know or groups they don't trust, they should think twice." Bird explained that even on an encrypted device or app, bad actors can still get access to sensitive information. "Secrets are very hard to keep," he said. "Either someone wants them and hunts for them or we slip personally and disclose them. Even with encryption, a secret is still too tempting of a target to someone. WhatsApp is a good encrypted chat platform, but it doesn't change a single thing about the human desire to discover a secret." Watch out for suspicious-looking calls and textsRobocalls and scam text messages have unfortunately become the new norm in recent years. Most of these calls and texts are used to scam people into giving out personal information. Do not pick up phone calls from unrecognizable numbers that look oddly familiar to your own phone number or come from the same area code. Voicemail is always an option for callers who are not scammers. Do not reply to or click on links in text messages that say anything about being the victim of a hacking attempt or being some kind of lucky winner. Clear your cacheThis is a phrase you may hear at work. "Clearing your cache" means regularly deleting browsing history, cookies and other information a device has been trained to immediately recognize when a user opens a particular app or website. This will minimize a user's "virtual footprint," or the amount of data visible to potential hackers. Download a security appThere are phone security apps for Android and Apple smartphones that many people are unaware of, according to Vanunu. GET FOX BUSINESS ON THE GO BY CLICKING HERE "Today on the market, there are some security products you can use that very few people know about and use," he said. It is crucial, however, that users do their research before downloading and signing up for an app since apps themselves can have vulnerabilities that give bad actors access to personal information. "Consumers need to ask themselves an important question for every app that they use," Bird said. "'Do I trust the solution more than I trust myself when it comes to my safety?' Don't assume the standard security settings in an app as 'safe'; if automatic downloads had been disabled in this case, it appears that this hack could have been avoided." Understand the threatSometimes there is nothing that will stop a bad actor from accessing sensitive information on a device or through an app. "There is a big public market for cyber-offensive vulnerabilities weapons. There are big offensive companies all over the world paying [millions] for these kinds of vulnerabilities," Vanunu explained. "The reality of it is that these kinds of vulnerabilities that target Whatsapp and other apps are sophisticated. It's not fair to say you can prevent these. Usually, it's very hard to prevent it. They are seamless. This is why they are worth a lot of money in the market," he said. |
BullGuard Internet Security 2020 review - TechRadar India Posted: 23 Jan 2020 04:32 AM PST London-based BullGuard is an experienced security company which has been developing consumer antivirus software since 2002. The 2020 range starts with BullGuard Antivirus, a Windows-based product with real-time virus protection, malicious URL filtering, and, surprisingly, a performance booster for games and other demanding full-screen applications. BullGuard Internet Security 2020 adds a firewall, parental controls, cloud integrated backup (supports Dropbox, OneDrive, Google Drive) and basic PC optimization. It has builds available for Windows, Android and Mac. The top-of-the-range BullGuard Premium Protection throws in a home network scanner, while a comprehensive identity protection service looks out for unauthorized use of your email, phone numbers, credit card details, passports, bank accounts and more. All BullGuard 2020 editions include new machine learning technology, which the company says improves zero-day threat detection 'without any impact on the computer's resources and without the need for an internet connection.' BullGuard's VPN can be launched from the interface, too, although you'll need to purchase a separate license to use it. Unlike Kaspersky, Bitdefender and others, BullGuard doesn't have a limited free version of its VPN, or even a trial. BullGuard 2020 Internet Security and Premium Protection also feature a major addition in its new Secure Browser, a customized version of Chromium which uses multiple layers of security to keep you safe online. Forced HTTPS connections and use of Cloudflare's encrypted DNS over HTTPS makes it difficult for others to spy on your browsing, for instance. Malicious URLs are blocked, site certificates are checked, and your internet history is encrypted to keep it safe from snoopers. BullGuard Internet Security is priced from a relatively low $60 for a three-device, one-year subscription. There's no introductory discount on the site, so competitors can sometimes look cheaper, but you'll usually win out in the long term. Bitdefender's equivalent Internet Security suite is priced at $40 for year one, for instance, but renews at $80. (We also noticed that our trial version regularly offered us 30% off as a 'BUY NOW!' incentive. We don't know if that's a permanent deal, but even if you're sure you're buying, install and run the trial first - it could save you a little cash.) You can save even more money by adding devices and years. A ten device, three-year license costs just $282, for instance, or $9.40 per device per year. A 30-day trial build gives you a quick and easy way to find out if this is the right antivirus for you. That should be long enough, but even if you run into problems later, you're further protected by a 30-day money-back guarantee. SetupSome antivirus tuck their trial builds away, maybe hoping you'll hit the Buy button instead. BullGuard is different. Scroll down the Internet Security website, reading about the product, and at the bottom you'll find, in very large letters, 'Haven't decided yet? Now you can try it for FREE.' We tapped the Download Now button and had the BullGuard Internet Security installer downloaded within seconds. Like many competitors, BullGuard requires that you hand over your email to create an account before you can activate the trial, but that was also straightforward and there were no other setup hassles. BullGuard Internet Security installed a long list of components on our test system. After rebooting, we found no less than eleven new background processes and some surprising extras, including an Outlook add-in (more on that later.) While this looked a more heavyweight setup than many competitors, most of BullGuard's various processes didn't grab much in the way of RAM or other system resources, and we didn't notice any significant impact on our system speed. It's important that an antivirus is able to prevent itself being disabled by malware. We tried deleting core BullGuard files, closing processes, stopping services and other tricks, but weren't able to compromise our security. It was a good start, but then we uncovered a problem. Security vulnerabilitiesBullGuard Internet Security enables users to define exactly what they want to be checked in Quick and Full system scans, and we noticed these settings were stored in plain text files without any special protection. An attacker could replace the default settings with his own, turning off just about every scan option, greatly reducing the chance that they would detect anything at all. As an example, running an initial Quick Scan on our review system with the default settings took around 7 minutes. After replacing the Quick Scan file with our own, where every possible scanning option was turned off, it checked so little that the scan was complete in about 5 seconds. In another more serious problem, we were able to disable BullGuard's file system filter driver with a single standard Windows command (requiring admin rights.) As a result, the package wasn't able to detect malware as it was downloaded, unzipped or otherwise saved to, or opened from our hard drive. It's important to put these issues into perspective. The scan settings vulnerability only affected on-demand scans, for instance, leaving BullGuard's real-time protection to work as usual, blocking threats as they appear. And even if an attacker also disabled the filter driver, BullGuard wasn't left entirely defenseless. URL filtering would still block attempts to download malware from known dangerous sites, and the behavior monitoring layer remains constantly looking out for suspicious processes. We raised our concerns with BullGuard, anyway, and the company responded quickly. It rolled out a fix for the filter driver issue almost immediately, closing the more serious security hole. The lesser scan settings issue had already been fixed in BullGuard's Small Office Security product, the company explained, and the consumer products will get the same update in the next release. We're happy to accept that the risks here were largely theoretical. It would take some effort to exploit these vulnerabilities, and there's not the slightest evidence that's ever happened. They still constitute worrying mistakes, though, especially leaving the filter driver unprotected. If BullGuard missed this issue, are there other problems it's failed to spot? We have no idea, but it has to be a concern. InterfaceThe BullGuard 2020 interface looks a little cluttered, with at least eight tiles representing its various features: Antivirus, Firewall, Vulnerabilities, Backup, Game Booster, PC Tune Up, Parental Controls and Secure Browser. (If you've got a BullGuard VPN account then you can launch that from the console, too.) This approach works well in some ways. Every tile has a drop-down list of common functions, allowing users to run a Quick Scan, check for vulnerabilities, open the Secure Browser or perform other essential tasks directly from the main console. And icons indicate the status of each product area, ensuring you can see how your system is performing at a glance. Still, this feels like a waste of valuable screen real estate. We suspect most users will leave the firewall, vulnerability scanner, PC Tuneup tool, and Game Booster to run entirely in the background, for instance, so why are those tiles taking up half the interface? It would make more sense for the console to focus on the tasks people carry out most often, and leave the more advanced options - like managing firewall rules - tucked away in a menu or behind a separate tab. ScanningWhatever you might think of the BullGuard Internet Security interface, it's not difficult to use. If you need to check your system, a drop-down list on the Antivirus tile displays the actions you can take – Quick Scan, Full Scan, Custom Scan, Quarantine, Settings – and you can launch any of these in a couple of clicks. Hidden away in the Settings is an option to add further scan types, which BullGuard calls Antivirus Profiles. You could use this to create custom scans where you get precise control over which areas of the system are checked, the files to examine, the way the scan is run and what the program does if it finds any threats. This is a valuable feature which gives you all kinds of options. You could create a scan which focuses on a key area of interest, perhaps folders of documents or executables, or network drives which might not be checked otherwise. You might be able to improve performance by excluding data-packed drives or folders you're sure aren't at risk, and you can experiment with some interesting low-level tweaks. For instance, by default our review system used four threads for scanning. Reducing that would cut system load during a scan, while adding more threads might speed up the scan process, and BullGuard's ability to play around with this setting will help you find the right value for you. BullGuard also provides real-time protection, and for the most part that worked as we expected. Dangerous downloads were automatically scanned and blocked, for instance, and the package immediately detected malware we unpacked from a password-protected archive. We noticed one limitation, though, in email scanning. BullGuard Internet Security doesn't scan incoming emails at the network level, instead using email client add-ins (Outlook and Thunderbird are supported.) If you're using another client, or the add-in doesn't work or gets disabled, your emails won't be checked. If you read your emails in a browser, this won't be an issue. And even if you're affected, BullGuard's real-time protection should detect and block any malicious attachments as soon as they're saved or opened. Still, it could mean some users will lose a layer of security they'll often get with other vendors. In our brief tests, scan times proved fractionally shorter than average. They didn't noticeably affect the performance of our system, either, and we were able to continue working without active scans getting in our way. BullGuard supports a simple vulnerability scan, which checks your Wi-Fi security, auto-run settings for mobile devices, Windows Update status and whether your drivers are digitally signed. This isn't exactly extensive, and we suspect competitors like Kaspersky and Avast are covering more areas, but if you have nothing similar, the scan could still give you genuinely useful information. FirewallBullGuard Internet Security includes a firewall which blocks for network attacks, and sort-of controls access to your internet connection. We say 'sort of' because although the firewall allows known safe processes to get online automatically, it asks the user about anything it doesn't recognize. That's an issue, both because it's difficult for even experts to tell which processes are legitimate, and, if users are prompted like this regularly, it's tempting to keep hitting the 'it's fine' button without really paying attention. We prefer more intelligent firewalls, like Bitdefender and Kaspersky's offerings, which make these decisions themselves. Aside from this limitation, the firewall does a decent job, blocking most attacks and providing plenty of configuration options if you need them. BackupBullGuard Internet Security comes with a 'cloud integrated' backup feature. It's an application, not a service - there's no web space included - but otherwise it covers all the core basics. Customizable backups enable choosing what you'd like to back up, for instance, from common user folders to whatever else you might need. Backup destinations include your Dropbox, Google Drive or OneDrive holders, or your choice of external drive. A simple scheduler enables running backups automatically, and there are a handful of useful settings covering compression, encryption and versioning. There's nothing too surprising here, and BullGuard's backup can't match the best of the freeware competition. But it works well enough for simple tasks, and having the app available from the same interface as the rest of the suite means it's certainly convenient to use. Parental ControlBullGuard's Parental Controls module uses a range of tricks and technologies to protect your kids online. Website filtering blocks sites by your choice of category (adult, social media, chat, gambling - 24 in total.) You're also able to create custom whitelists and blacklists of sites which should never (or always) be blocked. Application control enables blocking specific apps from running. The module covers a dated-looking list of chat apps by default (it includes Google Talk rather than Hangouts, for instance), but you can change that, or add any other apps you'd like to protect. The Privacy control feature aims to prevent your child sharing key personal details online (names, phone numbers, credit card information, addresses and more.) A flexible scheduler enables controlling access to the internet, or your entire PC, to a specific time of day or a maximum time limit. Choose your preferred settings in all areas and you're able to apply them to your child's Windows user account. BullGuard's Mobile Security has its own features, including the ability to monitor pictures stored or received on your child's phone, and an option to track where your child's device is. But it doesn't synchronize with the main Parental Control service, so for instance you can't set up rules in one place that apply across all your child's devices. Much like BullGuard's firewall and backup modules, the Parental Control module is mostly about the basics. It can perform some useful tasks, but demanding users are likely to be left wanting more. Secure BrowserBullGuard Internet Security 2020 now includes Secure Browser, a customized version of Chromium which the company says, 'enables a safer way to browse the Internet and a much safer platform from which to make online payments.' How is it safer, exactly? The website explains that Secure Browser doesn't 'load' cookies or extensions, perhaps reducing the chance of any privacy leaks. Using Chromium as a base means you lose multiple layers of Google Chrome telemetry, too (optional features, like crash reporting, which send data back to Google.) Secure Browser makes DNS requests using Cloudflare's DNS over HTTPS. The added encryption makes it more difficult for snoopers to monitor your browsing, and it also limits MITM attacks where, for instance, a rogue wifi hotspot might redirect you to a malicious website. The browser forces HTTPS connections where possible, and warns users about mixed content (HTTP content in an HTTPS page.) BullGuard told us that 'we also use the same engine in the secure browser as we do for Safe Browsing to help users avoid malicious websites.' Elsewhere, cache encryption aims to prevent malicious programs from accessing browsing data. We noticed a very limited history leak - a log file included the domains we were accessing, though not the full URLs - but otherwise this worked well. Secure Browser isn't as sophisticated as Bitdefender's Safepay. There's no attempt to prevent malware taking screenshots, for instance. It doesn't include a password manager or a virtual keyboard. There is still some value here, though, and this is only the first version - we expect more features will appear over time. Game BoosterBullGuard's Game Booster is an interesting tool which recognizes when games or other full-screen applications are running, and tries to improve their performance by giving them a greater share of system resources. Although this has nothing to do with antivirus or security, it's aiming to tackle the idea that installing an antivirus will necessarily slow down your PC. The Game Booster works by shifting user processes (and optionally, in this release, system processes) to use the same CPU cores, reducing their demands on your system resources and making a greater share available to the game. It's a smart idea, and independent testing has shown very positive results. Gaming rig builder ChillBlast benchmarked the game-related performance of BullGuard Internet Security against Kaspersky, AVG, Norton, McAfee and even Windows Defender. Not only did BullGuard deliver the best performance, it was even faster than a control system with no antivirus installed. In other words, installing BullGuard Internet Security didn't reduce gaming performance, it actually improved matters. We wouldn't choose an antivirus based on that, alone – security issues should come first, after all – but it's an interesting feature, and could be very appealing to some users. PC Tune UpBullGuard Internet Security includes several Windows cleanup and maintenance tools. An Optimize feature can delete junk Windows and third-party files, clear your browser cache, remove invalid shortcuts and defragment the Registry. It's easy to use, but the freeware CCleaner gave us more control and freed up more files on our test system (12.9GB vs 10.1.) The Cleanup Helper can also remove junk files, though apparently less effectively (it didn't find as many leftovers as the Optimize module.) It has a couple of handy bonus features, though. Drive maps graphically highlight the folders taking up the most space on your system, while the Large Files section lists, well, your largest files. A Duplicate Files Finder scans your system for unnecessary copies of files. It's useful, but basic and with limited options. You can't choose to scan only a particular folder tree, for instance; the module scans your entire system every time, which means it can take a while to run. The Boot Manager logs and displays the load times for your startup applications. There's much more detail than you'll get with Windows 10 Task Manager's Startup Impact feature (see the Start-up tab, and it may help you diagnose slow boot times. If all this sounds like too much hassle, no problem; tell PC Tuneup the type of junk you'd like to remove (browser caches, the contents of Temp folders, crash dump files and more) and it'll remove them automatically. None of this will change your world, and PC experts probably have better tools already. But for everyone else, BullGuard's various speedup modules are easy to use and will do a fair job of cleaning up your system. ProtectionBullGuard isn't assessed by many of the independent testing labs, these days. It hasn't appeared in AV-Comparatives' Real-World Protection Test since 2018, for instance. AV-Test currently includes BullGuard Internet Security in its Windows antivirus reports, though, and they give us some useful pointers to its likely performance. The September-October 2019 results saw BullGuard block 100% of well-known malware in both tests. The package also blocked 100% of zero-day threats in September, and 98.4% in October. While that's very capable, nine vendors blocked 100% of threats in every test, leaving BullGuard in tenth place out of 19. The company did better in some of the earlier 2019 reports, worse in others, and probably the best word to describe its performance is 'mixed.' These lab tests are lengthy and thorough, but they don't always provide the specific information we need, and so we also assess antivirus packages by running smaller tests of our own. BullGuard Internet Security had no problems with our first test, detecting malware samples without difficulty when they were downloaded or unzipped on our review system. Our second more advanced test used a custom ransomware simulator which would attempt to encrypt thousands of documents on our system. By creating this threat ourselves, we ensured it wouldn't be recognized from the file signature alone, making the program an interesting test of BullGuard's behavior monitoring. Unfortunately, BullGuard Internet Security appeared not to notice our threat at all, and paid no attention as it encrypted thousands of test files. We don't mark down apps who fail to spot our simulator, because it's not real malware and we can't say why it wasn't detected. But this was still a little disappointing, not least because BullGuard detected and blocked our simulator during its last review. Final verdictBullGuard Internet Security 2020 is decent value, configurable, and has an unusual extra in its Game Booster. But most of its features are on the basic side, and the security issues we found (now fixed) remain a concern. Factor in the mixed test results and the suite is hard to recommend right now, although the new engine might change that over the coming year. |
You are subscribed to email updates from "secure call app,cell phone encryption software,cell phone encryption software android" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Comments
Post a Comment