Skip to content

ESET HOME Security Essential 榮獲 AV-Comparatives 年度產品殊榮:箇中原因及對家庭用戶的意義

ESET HOME Security Essential 不僅為您的數碼生活提供卓越保護,更巧妙融合了操作簡便性、為進階用戶而設的豐富自訂選項,同時確保對裝置效能的影響微乎其微,備受肯定。

怎樣才稱得上完美的軟件?無論是電郵服務、影片編輯器、購物應用程式還是電子遊戲 ⋯⋯ 首要條件是它必須能出色地完成其本職工作,對嗎?這當然沒錯,但完善的定義不止於此。

今年 2 月 20 日,在 AV-Comparatives 的年度頒獎典禮上,ESET 憑藉其 ESET HOME Security Essential 產品,榮獲備受矚目的 2024 年度產品大獎。這項殊榮不僅肯定了 ESET 超過 30 年的深厚經驗,也彰顯了我們持續為家庭用戶提供頂尖網絡安全防護的努力與承諾。

AV-Comparatives 的評測之所以備受推崇,關鍵在於其全面性。評審團隊鉅細靡遺,針對受評測的網絡安全方案進行了多面向的嚴謹考核,涵蓋了 2024 年一系列測試中的反惡意軟件能力、系統效能、整體使用者體驗以及技術支援水平。

接下來,讓我們深入了解 ESET HOME Security 如何在模擬測試及真實網絡環境中保護用戶免受威脅,它對受保護裝置的效能影響如何,以及其使用者友善的設計奧秘。

 

防患於未然,遠勝亡羊補牢

ESET HOME Security Essential 在多項關鍵防護測試中均表現卓越,包括 AV-Comparatives 的「真實世界防護測試」、「惡意軟件防護測試」及「進階威脅防護測試」。這充分證明 ESET 能夠有效抵禦來自各種途徑、成千上萬種企圖入侵用戶裝置的網絡威脅。

詳細說明如下:

真實世界防護測試(Real-World Protection Test)– 此測試模擬用戶日常瀏覽網際網絡時所面對的真實環境,針對數百個惡意 URL 進行嚴格測試。測試人員亦會記錄過程中是否需要用戶介入處理,例如決定封鎖或允許被偵測到的可疑檔案執行。

惡意軟件防護測試(Malware Protection Test)– 不同於真實世界測試主要經由網絡發動攻擊,此測試的威脅媒介則可能來自網絡磁碟機、USB 隨身碟等,甚至涵蓋惡意軟件已潛伏於本機磁碟的狀況。

進階威脅防護(ATP)測試 (Advanced Threat Protection(ATP)Test)– 此測試亦稱為「增強型真實世界測試」(Enhanced Real-World Test),採用模擬黑客的滲透技術,針對特定外部系統發動攻擊,藉此評估安全產品抵禦此類精密攻擊的成效。同時,測試亦會評估產品防禦針對性進階威脅(例如漏洞攻擊和無檔案式攻擊)的能力。

進階威脅防護測試的結果,亦印證了 ESET 「防患於未然」的策略:我們的技術能在攻擊實際執行前將其攔截。測試中,有多達一半(15 個中的 7 個)被成功攔截的惡意軟件樣本,都是在其執行前的潛伏階段就被阻斷,也就是說,在威脅尚未啟動、仍處於靜止狀態時已被清除。

這種強大的保護能力絕非紙上談兵。ESET 的偵測引擎已成功偵測並攔截眾多進階威脅,Lumma Stealer 便是其中一例。這種在暗網流通的資訊竊取惡意軟件,主要目標是盜取加密貨幣錢包、用戶登入憑證以及瀏覽器的雙重驗證擴充功能。此外,它還會試圖從受感染的電腦中竊取更多敏感數據,並透過多種途徑散播,例如偽裝成熱門開源軟件或付費應用程式(如 ChatGPT 或 Vegas Pro)的破解版安裝檔。

 

卓越效能,輕巧流暢

這款「年度產品」的真正價值,不僅在於其強大的防護效能,更在於確保這些保護機制在運作時,既不會明顯拖慢受保護裝置的運作速度,也不會頻繁發出誤報干擾使用者。

要建立一套能在惡意軟件部署的每個階段(可能多達數百個步驟)都有效攔截的安全機制已屬不易,更需要頂尖專家團隊的精密調校,才能在高效封鎖惡意軟件的同時,避免影響合法軟件的正常運作或產生誤報。為了評估產品在這方面的表現,AV-Comparatives 的評審也特別檢視了各產品在預設配置下的誤報率。正如 AV-Comparatives 總結報告所言:「誤報所帶來的麻煩,有時不亞於真正的病毒感染。」

在這方面,ESET HOME Security Essential 贏得了「低誤報」項目的銀牌肯定。在 2024 年度的所有測試中,評審總共只錄得 15 次誤報。相較之下,部分其他受測產品在單一測試中就可能出現約 30 次誤報。

不僅如此,ESET 在效能測試中同樣獲得肯定。即使在執行檔案複製、安裝應用程式、瀏覽網頁等日常電腦操作時,ESET 對系統資源的佔用率極低,影響輕微,因此也贏得了獎項。

 

ESET HOME Security Essential 在 AV-Comparatives 評測中榮獲以下獎項:

  • 2024 年度產品獎 (Product of the Year 2024),在全部七項測試中均取得最高級別的 Advanced+ 評價
  • 進階威脅防護測試金獎 (Gold Award for the Advanced Threat Protection Test)
  • 低誤報銀獎 (Silver Award for Low False Positives)
  • 真實世界防護測試銅獎 (Bronze Award for the Real-World Protection Test)
  • 效能測試銅獎 (Bronze Award for Performance Test)

 

絕佳使用者體驗

評估一款軟件的優劣,使用者體驗是不可或缺的關鍵環節。那麼,AV-Comparatives 如何評價 ESET HOME Security Essential 的使用體驗呢?

「評審人員對其為非專業使用者設計的簡潔、直觀的使用者介面,以及為進階使用者提供的廣泛自訂和掃描選項印象深刻。」

評審們形容 ESET HOME Security Essential 是一款設計精良、簡單易用的安全方案。它為入門用戶提供了安全的預設值、清晰直觀的操作介面,並且「說明」功能和存取權限管理等核心功能都觸手可及。而對於專業級用戶,設定選單中則提供了豐富的進階選項與強大的存取控制功能。正因如此,ESET HOME Security Essential 能同時滿足普通用戶與技術達人級家庭管理員的需求。

 

年度產品的真諦

總結來說,何謂完美的軟件?它必須無縫地融合強大功能、簡易操作與穩定可靠性。它能精準滿足用戶所需,提供直觀友善的操作介面,進而全面提升使用者的數碼體驗。

在保護個人資料、數碼身分和網上財務安全方面,選擇一款兼具上述所有優點的網絡安全方案顯得至關重要。ESET HOME Security Essential 正是這樣一款能為您的數碼生活提供全方位守護的產品。我們很榮幸地宣布,它已成功摘下 AV-Comparatives 2024 年度產品大獎的桂冠。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

This real-life example shows why your Android should not connect to Wi-Fi automatically

The world of smartphones is full of automation and requires reputable Android protection.

Most smartphone users probably know that connecting to any random Wi-Fi hotspot available is not the best idea. But sometimes, an Android device can autonomously connect to a malicious Wi-Fi network without your awareness.

Imagine that you are at your favorite restaurant, your order is complete, and now you want to check your smartphone before the meal comes. However, without your knowledge, someone else is already monitoring everything you do on your device, including the websites you browse, the applications you use, and the credentials you enter.

An attack like this is possible. For example, if ESET malware researcher Lukáš Štefanko used his Cheap Yellow Display (CYD) tool running Evil M5 firmware for malicious purposes. Luckily, acting as an ethical pen tester, he just published a video showing how easy it can be to obtain Wi-Fi networks that smartphones want to reconnect to automatically. With this information, he could create a fake Wi-Fi access point, or an “evil twin” network, to gather sensitive data from a victim’s device.

Let’s dive a little deeper into these kinds of attacks, and what lessons we can learn from them.

 

Dangers of comfort zones

When creating software, developers always think about usability, user comfort, and user experience. So, it’s only natural that smartphones have an incorporated function to reconnect automatically to previously used and trusted networks.

However, cybercriminals love to exploit situations in which users feel safe and enjoy ever-present automation. The attack displayed by Lukáš Štefanko does the same — this technique preys on the fact that Android smartphones constantly and transparently tell nearby devices which Wi-Fi networks they have connected to, and want to reconnect to, automatically.

Luckily, attacks that require the malicious actor to be physically present at the location aren’t common, but that doesn’t mean that they can’t happen. For example, Australia’s Federal Police (AFP) charged one of its citizens over an alleged evil twin attack on multiple domestic flights and airports in June 2024. His seized devices allegedly contained dozens of stolen personal credentials.

Other times, it can be a state-sponsored operation such as the plot of a UK-based spy ring, as described by a prosecutor during a recent trial. The spy ring, among other things, also operated in Germany, where its members allegedly used an International Mobile Subscriber Identity Catcher or IMSI catcher to intercept mobile phone traffic from a military base where Ukrainian soldiers were training.

 

Other threats

As you can see, connecting and reconnecting to publicly available Wi-Fi networks can pose a danger. And the list of possible threats doesn’t end with rogue hotspots:

Man-In-The-Middle (MITM) attack — In such attacks, cybercriminals intercept communications between a device and the Wi-Fi network, allowing them to access sensitive unencrypted information like passwords, credit card numbers, and personal messages.

Exploitation of vulnerabilities — Cybercriminals can exploit vulnerabilities in less-secure public networks, or vulnerabilities of a targeted mobile device (especially if it doesn’t have updated software), to distribute malware to connected devices. This malware can then be used to steal data, monitor users’ activities, or even take control of users’ devices.

Packet Sniffing — Public Wi-Fi networks often lack proper encryption, making it easier for hackers to eavesdrop on users’ online activities.

How to stay safe

Obviously, the basic security recommendation for Wi-Fi users is to disable automatic connections to Wi-Fi networks, and not use free publicly accessible Wi-Fi networks at all. If this is not possible for any reason, here are a few more tips:

Use a Virtual Private Network (VPN) —VPN creates a secure and encrypted connection between a user’s device and the internet.

Do not share sensitive data — Avoid websites and applications requesting sensitive information such as online banking or shopping sites while on public Wi-Fi.

Stay on top of updates — Keep your software and apps updated. Regular updates often include security patches that protect against known vulnerabilities.

ESET Mobile Security

When it comes to cybersecurity, ESET goes far beyond just simple antivirus — and this also applies to smartphones and mobile devices. ESET Mobile Security is built around the ESET prevention-first approach, stopping attacks before they can do any harm. This goal can be met by securing cybercriminals’ most common points of entry to devices while keeping the security solution simple to use.

ESET Mobile Security is well-prepared for attacks coming from malicious websites, thanks to multilayered protection against phishing, smishing, and scams. For example, Anti-Phishing enhanced by Link Scanner protects users against malicious websites, and Payment Protection delivers a new layer of security for sensitive payment and financial applications.

And the best part? The premium version of ESET Mobile Security utilizing all these features and more is 50% off between March 3 and March 9, 2025!

Enjoy technology with peace of mind

Most would agree that people love comfort, and, in fact, the entire technology industry is driven by users pursuing faster, easier, and more user-friendly solutions for their daily activities. And there is nothing bad about living in the lap of technological luxury; but don’t ignore the threats out there.

Luckily, with a pinch of cybersecurity awareness and a reputable security solution installed on your Android smartphone, you should be fine. Wi-Fi network attacks are well-known, and acclaimed cybersecurity companies such as ESET taking advantage of more than 30 years of experience have you covered.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion邁向Veltar 體驗無縫安全的未來

×

Hello!

Click one of our contacts below to chat on WhatsApp

×