

I even submitted a ticket to the company about it since after attempting to contact Comodo, I didn't get very far with them. In fact, HMPA does so well, that about less than a month ago, it was actually preventing the current version of my Comodo Ice Dragon Browser from even opening, citing a shell-code mitigation. Hitman Pro Alert actually does prevent a lot of bad exploits from taking place on a system level as well as from within all installed browsers. It is a very small program that just sits there and works effectively. MBAM Pro is not really necessary when running Eset. Hitman Pro.Alert as I said is very much still beta.

I think its worth to mention that it was MBAE premium that was included in the PCSL test not the free version.īut if you/we really need MBAE and/or HMPA I think its best for each user to decide that. The ESET Exploit Blocker is not only for browser but covers more apps than that. Obviously you should keep the ESET Exploit Blocker enabled at all times.īetween the Free MBAE and HMPA I would go with HMPA then I have V3 in mind. If I remember correctly then I believe HitmanPro license holders will be able to use HMPA v3 for free when it is released. In that sense the ESET Exploit Blocker covers more such as e-mail clients, pdf readers etc. The Free version covers only Browsers, Browser Addons, and Java. They have both a free and premium version, the MBAM website has a comparison chart of what the difference is between the two.

Edited Augby SweXĬoncerning Malwarebytes anti-exploit.

This information is further processed and correlated, which enables us to spot previously unknown threats, so called zero-day attacks, and provides our lab with valuable threat intelligence. When triggered, the behavior of the process is analyzed and, if considered suspicious, the threat may be blocked immediately on the machine, with further metadata about the attack being sent to our LiveGrid® cloud system. Instead, it monitors the behavior of processes and looks out for suspicious activities that are typical for exploits. It adds another layer of protection one step closer to attackers by using a technology that is completely different to techniques that focus on detection of malicious files themselves. I don't think that matters as it looks for behaviors and activities that are typical for exploits.Įxploit Blocker is designed to fortify application types on users’ systems that are often exploited, such as web browsers, PDF readers, email clients or MS Office components. Every browser and other software will have different exploit "holes".
