AVG Internet Security 8 review
A fierce protector against web threats, but middling elsewhere.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £51 (£59 inc VAT)
Value for Money
Ease of Use
Most of us have used AVG's free antivirus package, and the same engine underpins the company's full security suite. It also includes a firewall, email integration and antispam, plus a few extras such as rootkit detection and IM protection. Those are good things to have, but considering the basic malware component can be had for free it doesn't seem like great value.
Our malware detection tests only strengthened that impression. A score of just 80% left AVG near the bottom of the class, missing trojans, diallers, backdoors and more. When we probed the test PC with our network scanner, we found five potential vulnerabilities and six open TCP ports - more than any other package. We were less than impressed by the firewall too, which was confusing to configure and intrusive once we'd done so.
We were also turned off by the way the program's browser tool bar includes a Yahoo search box that can't be closed - and "page not found" errors are, by default, redirected to another page with a Yahoo search field. We might excuse that sort of thing in a free program, but not in a paid-for suite.
AVG does have one trump card: web-based detection. Clearly, the company's acquisition of Exploit Protection Labs and its LinkScanner package at the end of 2007 is paying off. By combining URL blacklists with real-time detection, AVG achieved a chart-topping 74% success rate with dodgy websites.
If your prime concern is web-based threats, AVG Internet Security is worth considering, but for all-round peace of mind we'd go with a more balanced package such as Avira.
Author: Darien Graham-Smith
You don't mention uninstalling AVG. On the free antivirus, it is extremely difficult to do. And the old versions stay as well. A company that has so little regard for their customers - who should be able to decide what software they want to use - should be avoided. I think that you should include ease of removal in all your software tests, and especially not include software that cannot be removed on your cover disk.
By RichardKeys on 3 Feb 2012
- Gaming DDoS: forget cyber-jihadis, they're just trolls
- Bug hunters paid to target Oculus Rift
- Chrome to warn against crapware downloads
- Microsoft backtracks on blocking out-of-date Java
- WarKitteh, hacked Blackphone and more from Def Con
- Putting the brakes on smart-car attacks and more from Black Hat 2014
- Microsoft targets Windows in next Patch Tuesday
- Don't pay the CryptoLocker ransom
- Microsoft to block old ActiveX controls in security push
- Malware can live in USBs undetected
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums
- How to turn off Google Location Tracking
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Five worst SMB security threats... and how to solve them
- Heartbleed: what you need to know and do
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords