Malwarebytes Review: The Second Line Defense Cyber Sentinel

Malwarebytes ProgramAs the title may connote, this Malwarebytes Review for the Malwarebytes software is not your standard, robust, all-virus annihilator type of antivirus package, but rather a second line of defense, ‘after-the-action’ type of clean-up software that extricates residue bits of code which still manages to adversely impact your system. The frontline defense of the resident protection suite generally ignores these types of malware code, as they are designed to combat the threat from far more serious viruses.

Malwarebytes In-Depth Review

The process of utilizing this program commences with its rather elementary installation into the client system, and launching it from there. An easy to engage dialogue box provides the interface to begin with. The user is presented with options arrayed around a dozen tabs that indicate what kind of action should be initiated. Simplicity seems to be the keyword in the theme of this software presentation.

Should you opt to scan your system, you are offered the choice of a brisk, cursory scan that scrutinizes the system for the most common sorts of malware floating around. Alternatively you could run a more comprehensive examination of the system, drive by drive, or specific drives, even external and network locations to boot.

The malware sports a ‘protection area’ corralling mode that is proclaimed to be the real-time protection center. The idea is to have an uninterrupted and constant guard against intrusions of malicious code by ‘corralling’ it before it can do extensive damage to the system.

Before running the routine scans, it is prudent to check for the latest updates online as new viruses are spawned on a daily basis and antivirus software are constantly upgraded to combat this ever present threat. There are even reports of high profile anti-virus companies introducing these new viruses to sell their upgrades. The updating section of the software facilitates this process and checks for fresh updates to load new signatures. Your existing resources are reviewed and the relevant dates highlighted for currency status. This section loads the necessary signatures to preserve currency, upgrades your database, cross checks dates and updates, and the amount of signatures downloaded to protect your system against malware.

The ‘corralling’ system of isolating infected files insulates the system from those files. However, it is known to have innocent files wrongly cloistered with malware. The program offers a ‘Quarantine’ option to access the files that the software has isolated and study them for their threat quotient. If a clean file is found there, it can be restored to the healthy section of the system without any deleterious effect on the file itself or the system. This can be done to multiple files or individual ones. The quarantined files can be studied by analyzing the statistics and assessing the content code on the basis of their calls on system functions and resources. The Malwarebytes Anti-Malware software even permits you to limit a scan with parameters that list files to be overlooked for that session. This is to preserve known files with high susceptibility to be captured or files that need to be preserved at all costs.

The business of keeping logs of the scans done is easily maintained in the software. Ordinary editable and formatable text files are created of each scan and preserved as logs to be accessed at anytime.

Configuration of Malwarebytes

The option to configure the settings of the software is very basic. The running internet explorer can be suspended while extricating malware. The display and saving of log files can be automatic and feedback of report statistics can be returned to the Malwarebytes support base. This would help improve the detection and elimination of threats. The scan option is offered in the Internet Explorer’s context menu. There is also an option to program verification processes that scrutinize objects in the memory, registry and file system. A separate scan for odd-fitting and heuristic objects is also possible.

A rather redundant part of the software claims to sport tools for further possibilities of the software. In reality, just one tool with three services exists. They mainly collect feedback like bug reports or false positives findings, along with collection details like name of user, the database location of Malwarebytes, desktop location, start menu location, user root, favorite, application data and temporary file locations.

Removal of Locked Viruses

The single tool available is the FileASSASSIN. This is a built-in facility that can delete locked individual or multiple files on the computer. Although the idea is commendable, it cannot be considered foolproof, as locked files that survive the delete operation, do not unlock, but rather can only be subjected to a restart that unlinks everything for the removal.

Running the application through rigorous tests is a convoluted and involved process. By targeting malware that proliferate on the fringe of the virus world, there are no guideline parameters to aid the process. However a concerted effort has revealed that the software performs with an ‘above average’ ranking when compared with competing products in the market, are free and subscribed.

Malwarebytes Resource Review

It called for meager resources during the test, with demand on CPU resources peaking at 82% and averaging only 63%. Even RAM calls were limited to an average of 51 MB usage. Considering that a 480 MB scan of about 4312 files was completed in two and a half hours, it was the most efficient in terms of time and energy and system resources corralling 434 possible incursions into the system. It is also commendable in the fact that the software does not make rigorous demands on the hardware resources.  A sure sign of early wear and tear on the hardware is the unrestricted call on system resources on a frequent basis, by the routinely working software like anti-virus and malware guards like these.

Malwarebytes Review vs SuperAntiSpyware

An identical hardware environment and an identical sample malware database was provided for the comparative analysis of two closely competing software. The SuperAntiSpyware version fared rather less well against the Malwarebytes Anti-Malware software. It required an average of 72% CPU resources and 73 MB of RAM on an average while taking almost six hours to detect only 394 threats. Similarly, the application Spyware Doctor when subjected to identical evaluative, measures produced a detection level of 559 threats, although it required 120 MB of RAM that peaked at 148 MB, and about 66% of CPU resources, peaking at 82%. However, the absolute downside here was that it took all of 23 and half hours to execute the whole test.

The hardware environment for the testing was a 1.8GHz processor complemented with 1.5 GB of RAM and the exact same malware database was provided for all three applications. This included spyware, backdoors, Trojans, adware to viruses, rogue installers and even worms. An array of 60 rootkits and 7 rootkit sources was mounted for a threat assessment sweep. All three applications provided dismal results with Malwarebytes Anti-Malware unable to detect a single threat along with SuperAntiSpyware. Although Spyware Doctor managed to isolate 4 threats, 2 of them were yet to be compiled sources.

Malwarebytes Review Summary

In an overall assessment, the Malwarebytes Anti-Malware application passes muster as a back-up system to extricate residue malware even if it is unreliable as the sole protection software on the system. It may not produce outstanding results but it is able to root out threats that are indiscernible to many similar applications. Considering the short period for scans, the perky detection system and the application coming free of charge, it is certainly a very good back-up support system for a frontline security apparatus already in place on a computer.

Malwarebytes ReviewThe advantages of the Malwarebytes Anti-Malware application are listed as:

  • Easy installation
  • Fast scans
  • Daily updates
  • Detects esoteric threats
  • Ease of Use
  • Easy on system resource demands
  • Free versions almost as good as paid versions
  • Runs without intrusive restriction on frontline security systems

The disadvantages on the other hand:

  • Cannot be relied on as a stand-alone, fool proof security system
  • The FileASSASSIN feature is yet to be perfected

The newer versions of this software have aggregated its peculiar strong points to highlight its ability to isolate esoteric threats. They scrutinize every working process and execute stops and check at the slightest hint of a threat. The real time protection module takes advantage of the application peculiar and advanced heuristic scanning technology to constantly keep the system free of contamination.

Features of newer versions include:

  • Windows 7 (32 & 64 bit), XP, 2000 and Vista support
  • Lightening speed scanning
  • Able to perform complete scans for all drives
  • Malwarebytes Anti-Malware Protection Module for paid subscriptions
  • Database updates released daily
  • Quarantine to isolate threats and restore them at leisure
  • Ignore lists for both scanner and protection module
  • Setting to enhance Malwarebytes Anti-Malware application performance
  • A small list of extra utilities to help remove malware manually
  • Multi lingual support
  • Works harmoniously with alternate anti-malware utilities
  • Command line support for quick scanning
  • Context menu integration to scan files on demand

A new scheduling engine has been incorporated to facilitate real-time updating, more finely grained scheduled scanning/updating and a streamlined interface. Moreover, a new flash scanning option searches for malicious objects in memory and load point locations. Corporate customers will enjoy its compatibility with (RDP) – Remote Desktop Protocol.

Additionally, a brand new advanced heuristics detection module called Shuriken, is integrated into both scanner and protection module. Website blocking facility and other customizing options are also embedded into the main program. The command line interface is vastly improved to facilitate users to scan and delete automatically. The updating module has been debugged for much smoother operations. Full proxy support with authentication and integration into the GUI is another feature added. Successive versions have efficiently extricated various issues like bugs and glitches to provide an enhanced overall stability of the scanner and protection module. The software has evolved into quite an acceptable option among second-line, back-up andf anti-malware defensive systems in computers. Let us know your feedback and thoughts on our Malwarebytes Review.