AVG Internet Security 8 review
A fierce protector against web threats, but middling elsewhere.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £51 (£59 inc VAT)
Value for Money
Ease of Use
Most of us have used AVG's free antivirus package, and the same engine underpins the company's full security suite. It also includes a firewall, email integration and antispam, plus a few extras such as rootkit detection and IM protection. Those are good things to have, but considering the basic malware component can be had for free it doesn't seem like great value.
Our malware detection tests only strengthened that impression. A score of just 80% left AVG near the bottom of the class, missing trojans, diallers, backdoors and more. When we probed the test PC with our network scanner, we found five potential vulnerabilities and six open TCP ports - more than any other package. We were less than impressed by the firewall too, which was confusing to configure and intrusive once we'd done so.
We were also turned off by the way the program's browser tool bar includes a Yahoo search box that can't be closed - and "page not found" errors are, by default, redirected to another page with a Yahoo search field. We might excuse that sort of thing in a free program, but not in a paid-for suite.
AVG does have one trump card: web-based detection. Clearly, the company's acquisition of Exploit Protection Labs and its LinkScanner package at the end of 2007 is paying off. By combining URL blacklists with real-time detection, AVG achieved a chart-topping 74% success rate with dodgy websites.
If your prime concern is web-based threats, AVG Internet Security is worth considering, but for all-round peace of mind we'd go with a more balanced package such as Avira.
Author: Darien Graham-Smith
You don't mention uninstalling AVG. On the free antivirus, it is extremely difficult to do. And the old versions stay as well. A company that has so little regard for their customers - who should be able to decide what software they want to use - should be avoided. I think that you should include ease of removal in all your software tests, and especially not include software that cannot be removed on your cover disk.
By RichardKeys on 3 Feb 2012
- Ignore the research: don't use weak passwords
- Mobile malware stealing data from legitimate apps
- "Dumb" smart devices threaten security
- Selling your Android phone? Factory resets aren't enough to wipe your data
- Microsoft to release six updates this Patch Tuesday
- MP: government lacks cybersecurity backup plan
- Tech skills shortage hurting cybercrime policing
- Apple updates OS X Mavericks, iOS 7
- Microsoft's "draconian" No-IP takedown hits millions
- McAfee: beware dodgy app stores and fake Flappy Birds
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out
- Five worst SMB security threats... and how to solve them
- Heartbleed: what you need to know and do
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords