Behind every piece of malware—be it a virus, spyware, or any other form of hostile, destructive code—is a sneaky, scheming scoundrel, oftentimes someone you’d never suspect. Antivirus suites promise to defend your PC against all the baddies. We test 10 of the leading products to see which ones are best at keeping your PC safe.
You don’t need a military background to recognize that the Internet has turned intoa war zone. Not only are you always under attack, but the bad guys possess a seemingly endless arsenal of weapons that are constantly changing. Set foot in the wrong website and you might be stepping into a booby trap of malicious Javascript code. Toolbars and greeting cards come laced with spyware, hackers are finding new exploits faster than software vendors can patch the old ones, and rootkits have given virtual villains a way to stealthily penetrate deep into your system at the kernel level.
And if all that weren’t enough, social networking continues to sweep the web, making it even easier for morally bereft miscreants to spread their foul files. Can you really trust that MySpace page you’re viewing not to contain some hidden element ready to do you harm? You even need to be suspicious of IMs, and that includes messages seemingly originating from contacts on your buddy list. It’s enough to make you want to wave the white flag—and if you plan on going into battle alone, you probably should.
But you don’t have to fight the fight all on your lonesome. Several security vendors offer software packages that not only promise protection against viruses, but also purport to run off rootkits, stop spam dead in its tracks, and even circumvent websites from loading hidden malware before it has a chance to run amok on your PC. This got us wondering, just how much protection is actually necessary?
To answer that question, we hit up all the major security vendors and asked them to send us their most robust packages. We also gathered the most popular free antivirus programs for comparison. After all, power users know how to practice safe computing habits, which can go a long way toward PC safety. We’ll cut through the hype to tell you if the protection you get with a paid app is any better than what you can get for free—or if the paid programs, which have become so huge as of late, are too unwieldy and ultimately more troublesome than the viruses they’re meant to combat.
Our Testing MethodologyIt doesn’t matter how effective an AV app is at catching viruses if it means we have to suffer through constant nagging or performance degradation in our day-to-day computing. We’ve identified the five criteria by which security apps should be judged.
System Performance and Scan SpeedWe know you spent time researching components and toiling over your system build, so why let a poorly optimized program transform your hot rod into a horse and buggy? To gauge each AV package’s performance impact, we loaded up a series of action scripts in OSMark (http://tinyurl.com/OSMark), paying close attention to both memory and CPU activity. We then compared the results to that of a clean install.
We’re also interested in how long it takes to complete a full system scan. In today’s dual- and quad-core landscape, you no longer have to sit idly by waiting for a scheduled scan to finish, but if you suspect your system has become ill, you won’t want to do much of anything until your virus scanner produces a clean bill of health. With stopwatch in hand, we measured the time it took each program to run through its routine.
AnnoyanceWhether we’re using our PC for work or play, we don’t want to be bothered with near-constant nagging from our security software. An AV app should integrate seamlessly with the OS and be able to do its job with minimal interaction from the end user, while still offering at least some level of customization. Otherwise, it’s no less obtrusive than the viruses it’s supposed to be protecting against.
In order to assess how much each app intrudes on our day-to-day life, we performed a variety of common tasks to see how the AV software responds, if at all. This includes web surfing, downloading files, running executables, playing games, and everything else you’re likely to do with your PC.
We also took into account how much harassment we can expect to receive when the subscription runs out.
Features and ImplementationAnyone who’s ever shopped for a new car knows what it’s like to be pressured into paying extra for all kinds of upgrades. And just because the salesman is attempting to increase his profit margin doesn’t mean you can’t both benefit from tacking on useful additions, but that only works if you’ll actually use the added amenities. Do you really need six cup holders in a two-seat sports car?
Likewise, there’s no point in owning a security suite stuffed with apps if most of them suck. Not only that, but you need to consider whether this added functionality is easy to use and how much pestering you can expect from disabling unused features. We take all this into consideration.
PricingLet’s be honest, nobody likes to pay for software utilities. It doesn’t matter that we spent an entire week’s pay on two of the hottest videocards so we can squeeze a few more frames per second out of Crysis or that we took out a loan to fund the fastest processor money shouldn’t buy (hey, it comes with an unlocked multiplier!), there’s just something about paying for security software that feels sacrilegious. Maybe it’s because the free alternatives have done so well in the past. Whatever the reason, these paid apps have to prove their worth in the bang-for-buck department. Higher-priced suites should come with a bevy of useful features, offer a high level of customization, be easy to navigate, and, above all, perform competently.
Virus DetectionWe don’t care what method each AV application uses to identify and disinfect viruses, so long as it gets the job done. The only way to find that out is to bombard each package with a multitude of payloads representing the thousands of viruses running rampant in the wild. Rather than scour the web trying to build up a repository of infected files, we turned to the experts to lend us a hand.
Virus Bulletin (www.virusbtn.com) is an independent testing lab whose certifications are sought after by antivirus vendors. We scrutinized the latest detection results for each AV app and paid attention to the percentage of viruses caught, which includes Trojans, polymorphic viruses, worms, bots, and more, and then we punished each app with our own collection of malware.
Malware Terminology 101A computer virus is a piece of software or code capable of reproducing itself and spreading to other systems, but the term is often used to describe a multitude of threats. The effects of malware can range from mildly annoying to completely debilitating, sometimes costing corporations thousands of dollars in downtime and manpower to heal the outbreak. Let’s have a look at the different types of infections.
Trojan horse: Named after the mythological wooden horse used to sneak Odysseus and other Greek heroes into roy, a Trojan horse will masquerade as a legitimate program but will unleash a harmful payload once installed.
Worm: Computer worms are self-replicating programs that burrow into systems, seeking out vulnerabilities to exploit. The ability to spread all on their own makes worms particularly dangerous.
Spyware: Ever feel like you’re being watched? If your PC is infected with spyware, you just might be. Even worse, spyware not only monitors your activities but can also hijack your system with redirected web searches and other annoyances.
Polymorphic: To avoid detection, polymorphic malware constantly changes its own code, often using encryption with a variable key. This stealthy technique poses a problem for typical scanners.
How To Avoid VirusesCaptain Obvious says that the best way to prevent infection is to avoid viruses in the first place, but what he doesn’t tell you is how to do it. And even though hackers continue to get more cunning in both delivery and execution, you can tip the odds considerably in your favor by practicing safe and sane computing.
If you receive an unknown or unexpected attachment, don’t open it no matter who it came from. Not only are some viruses capable of emailing themselves to everyone they find in an infected user’s address book, but inexperienced computer users are just as guilty of passing along payloads as hackers are of distributing them.
BitTorrent sites and peer-to-peer networking clients are also common modes of spreading infection. When attempting to download a legitimate program—a Linux distro, for instance —use the link provided at the vendor’s website. Pirated software is a particularly popular source of malware, so if your moral compass doesn’t steer you toward the straight and narrow, the risk of infection should.
And finally, get in the habit of regularly checking for software updates. New exploits are always being discovered in Windows, QuickTime, web browsers, and other common programs.
McAfee Total Protection 2009A mishmash of features leaves us with mixed feelings
Most enthusiasts view McAfee as just another resource hog often found in OEM systems alongside performance-pillaging bloatware. Fair assessment or not, this is the perception McAfee’s up against in trying to win over the PC elite. It helps that the company isn’t blissfully unaware of the importance placed on performance; its latest edition promises to raise the bar with a more efficient engine that won’t drag your system down.
In our testing, McAfee fell in the middle of the pack instead of leading the charge. RAM consumption crept above what we’d consider lean, and while scanning for malware, CPU utilization often hovered around 40 percent. That in itself isn’t criminal, but we felt swindled when all it bought us was the second-slowest scan time of the bunch—although, remarkably, we didn’t see much of a drop in gaming or day-to-day computing performance.
McAfee’s list of features ranges in practicality from the beneficial to the unlikely to ever be used. Occupying the former camp are spyware protection, a highly configurable firewall, email and IM guards, basic parental controls, and a file shredder. But we just can’t get stoked about the virus map, which displays global viral hot spots, or the HackerWatch module, which looks for patterns of attack around the world to report to ISPs. And still other features, like Active Protection for real-time safeguards, will be made available only through future updates—boo!
Living up to its name, McAfee Total Protection 2009 proved a formidable adversary against all types of malware and stopped malicious websites from loading. We also dig McAfee’s SiteAdvisor tool, which not only identifies questionable search results but also gives a detailed report on why the URL is suspect. But no matter how good it protects, we’re not willing to endure slow scanning performance or wait for features that should have been available at release.
Verdict: 6
www.mcafee.com
$70 (3 PCs)
Norton Internet Security 2009Could this be the luxury sedan of antivirus suites?
For the latest version of its AV suite, Symantec went back to the drawing board and completely rewritten the program from the ground up with a focus on speed. Even the installer has been revamped; in an attempt to reduce setup time to less than a minute (we clocked it at 55 seconds), Symantec coded its own proprietary installer instead of using Microsoft’s, as it has
in the past.
This year’s release adds a smart scheduler that monitors task utilization in real time and queues up its task if the system is busy. This means if you’re lining up a headshot in your favorite shooter, NIS will take a backseat until system resources are freed. But if a task qualifies as critical, it will run regardless of what you’re doing, so you can continue to crunch
Folding@Home without being a sitting target. And to keep itself honest, Symantec integrates a system monitor showing what percentage of CPU cycles NIS is consuming—nifty!
Live Update has been rewritten too, and in addition to regular updates, Symantec sends out micro updates. These pulse updates ensure that when a new threat is discovered in the wild, you’ll have the necessary signature definition within minutes instead of waiting up to 24 hours for the next refresh.
The program swept through our test system in less than 10 minutes, and subsequent scans completed in less than two minutes! NIS accomplishes this by discerning between trusted and untrusted files and by default won’t rescan files that haven’t changed.
NIS 2009 leaves virtually no security stone unturned. Our biggest knock is that not all features work under Vista x64, such as right-click scanning. Still, if security suites were cars, consider NIS 2009 a decked-out Lexus.
Verdict: 9
www.symantec.com
$70 (3 PCs)
Kaspersky Internet Security 2009Why pay more when you can get the same or better for less?
At $80 for a one-year subscription, Kaspersky charges more than any other suite we tested. If you buy the downloadable version instead of a retail boxed copy, the license is good for up to three users—that’s little consolation to single-PC
households.
Kaspersky also holds the undesirable record for longest install time. What started off as a pokey two-minute install ballooned into an agonizing eight minutes composed of a tediously long update and no less than two reboots.
Once we were finally up and running, Kaspersky began to atone for its pricing and installation sins. Like Norton’s package, Kaspersky significantly shortens subsequent system scans by skipping files already determined to be clean. During an initial run-through, Kaspersky’s iChecker algorithm makes note of certain files’ digital signatures and saves them in a special table. If the signature matches the next time a scan takes place, the file will be skipped over. The result is that a 12-minute system scan was reduced to a blazing one minute and 14 seconds, finally setting a record Kaspersky could be proud of.
Like the other full-featured suites, Kaspersky crams a multitude of tools into a neatly organized package and manages to set itself apart in some areas. Rather than limit email scanning to Outlook and POP3, Kaspersky also analyzes IMAP traffic. It boasts a banner-ad blocker and, through parental controls, the ability to limit how much time children can roam the web. Finally, road warriors will appreciate the option to automatically disable scheduled scans when running on battery power.
Kaspersky provided a formidable wall of defense against both viruses and spyware, keeping our test bed protected against Trojans, dialers, and other Internet-bound ills. But so did some of the less-expensive suites.
Verdict: 6
http://usa.kaspersky.com
$80 (3 PCs)
AVG Internet Security 8.0
An old favorite gets a new look
Now in version 8.0, AVG’s latest release appears to have taken a page or three from Vista. A redesigned interface sports high-resolution icons and a more colorful palette, and even the system tray icon feels borrowed from Microsoft’s newest OS; turn off one of the security modules and the icon turns red, alerting you of impending doom, even if you’ve only disabled the spam filter. That’s just wacky. Thankfully, you can turn off the ominous notification.
No other AV application we tested consumed more RAM, and our performance benchmarks took the biggest hit with AVG installed. During a system scan (which, while not the slowest, dragged along at the tail end of all the suites), CPU utilization averaged 25 percent with sporadic spikes reaching as high as 84 percent. We didn’t know if AVG was scanning or having a seizure.
AVG provides one of the more feature-rich packages of the bunch. In addition to the new scanning engine, you’ll find spam and spyware protection, a firewall, safeguards against drive-by downloads, immunity against IM-bound attacks (IQC and MSN only), a customizable scheduler, and a rootkit scanner. Tying it all together is a back end brimming with options to satiate even the most demanding security connoisseur.
We especially like the concept behind AVG’s web protection; we just wish it worked better. The Active Surf-Shield component scans visited web pages for malicious code and the Search Shield checks Google, MSN, and Yahoo search results for active threats, but enabling them slows down web surfing. And at the time of this writing, Search Shield was not working with Firefox 3.0.
AVG’s detection rate dips below that of the best-performing AV apps during Virus Bulletin’s extensive testing but still earned a VB100 award, meaning it caught all of VB’s in-the-wild viruses with no false positives. ANG also excelled in our own tests. Just make sure you have a modern system to run it on.
Verdict: 7
www.grisoft.com
$55 (2 yrs)
|