{"id":7767,"date":"2014-06-27T08:47:02","date_gmt":"2014-06-27T12:47:02","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7767"},"modified":"2014-06-27T08:47:02","modified_gmt":"2014-06-27T12:47:02","slug":"can-you-trust-your-security-software","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/can-you-trust-your-security-software\/","title":{"rendered":"Can you trust your security software?"},"content":{"rendered":"<p>We&#8217;re re-publishing the following blog post from Emsisoft&#8217;s blog with permission. Once again, Emsisoft has made us proud that we have chosen them as the only anti-virus and anti-malware we recommend. You can buy or renew your Emsisoft licence and help yourself and us too by <span style=\"text-decoration: underline;\"><em><strong><a href=\"http:\/\/thundercloud.net\/emsisoft\/\">visiting our Emsisoft page<\/a>.<\/strong><\/em><\/span><\/p>\n<h1><\/h1>\n<blockquote>\n<h1>Emsisoft: Quite Possibly The Most Privacy Conscious Anti-Malware Around<\/h1>\n<p>In a post-Snowden Internet, personal privacy is a top concern for more Internet citizens than it ever has been before. More than ever, <strong>people want to know if the software services they are using track their behavior and if that data is being shared with the government or being sold to third-parties.<\/strong><\/p>\n<p>By now, most web users have come to expect and begrudgingly accept data tracking as part of modern-day life. For this reason, many people buy Internet Security products to safeguard their identity; however, few stop to consider a frightening possibility:<strong> Is my anti-malware tracking me too?<\/strong><\/p>\n<p>The 2014 AV-Comparatives Data transmission of Internet security products Survey<\/p>\n<p>AV-Comparatives is an independent not-for-profit organization that checks whether security software lives up to its promises. In today\u2019s infinitely trackable web environment, one of those promises is ensuring the privacy of customer data. In keeping with its mission, AV-C set out to determine just how many security software vendors stay true to that promise. Their method was simple \u2013 run a test, conduct a survey, and compare.<\/p>\n<p>21 leading anti-virus vendors from around the world participated in this comparative; and, while AV-C\u2019s report simply lists the results and does not assign a ranking\u2026<\/p>\n<p><span style=\"text-decoration: underline;\"><strong><a href=\"http:\/\/www.makeuseof.com\/tag\/antivirus-tracking-youd-surprised-sends\/\" target=\"_blank\">Emsisoft is already being recognized as one of the most privacy conscious anti-virus companies around.<\/a><\/strong><\/span><\/p>\n<p>How\u2019d we do it?<\/p>\n<p>Well, for starters, we are open and upfront about our <span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.emsisoft.com\/en\/software\/privacy\/\" target=\"_blank\">End User Licensing Agreement<\/a><\/span>. On top of that, we take great care to transmit as little information about our customers as possible.<\/p>\n<p>Data that we DO transmit is limited to anonymous information that can help us improve our product, prevent it from being pirated, and protect our users from emerging malware.<\/p>\n<p>Data that we DON\u2019T transmit includes: IP addresses, visited URLs, Windows usernames, and most other machine and personal information that can be connected to your identity.<\/p>\n<p>\u201cSuspicious\u201d files that our software submits for analysis are never non-executable personal documents &#8211; we only collect malicious executables so that we can study their behavior to ensure protection, and we give our users the right to opt out of such collection at all times.<\/p>\n<p>We DON\u2019T collect information harvested by malware \u2013 meaning if you submit a malware file that has infected your computer and it has collected your information, we don\u2019t make matters worse by collecting that information too.<\/p>\n<p>Our Commitment: To Become the Most Privacy Conscious Anti-Malware Vendor Around<\/p>\n<p>Those interested in AV-C\u2019s full comparative can <span style=\"text-decoration: underline;\"><strong><a href=\"http:\/\/www.av-comparatives.org\/wp-content\/uploads\/2014\/04\/avc_datasending_2014_en.pdf\" target=\"_blank\">find it here <\/a><\/strong><\/span>(PDF).<\/p>\n<p>We hope that after viewing the facts yourself, you\u2019ll be proud to find that you\u2019re using an awarding winning anti-malware that doesn&#8217;t compromise on its commitment to<span style=\"text-decoration: underline;\"><strong> <a href=\"http:\/\/blog.emsisoft.com\/2014\/02\/28\/the-potentially-unwanted-person\/\" target=\"_blank\">protect its users for third-party profit or governmental interests.<\/a><\/strong><\/span><\/p>\n<p>In time, we hope to become known as the most privacy conscious anti-malware vendor around. At present, this means doing everything we can to keep our users\u2019 digital worlds safe and leaving their personal data where it belongs: with them.<\/p>\n<p>Have a Great (Privacy-Protected) Day!<\/p>\n<p>About AV-Comparatives<\/p>\n<p>AV-Comparatives is an independent not-for-profit organization offering systematic testing that checks whether security software, such as PC\/Mac-based antivirus products and mobile security solutions, lives up to its promises. Using one of the largest sample collections worldwide, it creates a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organizations and scientific institutions. Certification by AV-Comparatives provides an official seal of approval for software performance which is globally recognized.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re re-publishing the following blog post from Emsisoft&#8217;s blog with permission. Once again, Emsisoft has made us proud that we have chosen them as the only anti-virus and anti-malware we recommend. You can buy or renew your Emsisoft licence and help yourself and us too by visiting our Emsisoft page. Emsisoft: Quite Possibly The Most Privacy Conscious Anti-Malware\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/can-you-trust-your-security-software\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1,1670,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7767"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7767"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7767\/revisions"}],"predecessor-version":[{"id":7768,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7767\/revisions\/7768"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}