AVG Internet Security 8 review
A fierce protector against web threats, but middling elsewhere.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £51 (£59 inc VAT)
Value for Money
Ease of Use
Most of us have used AVG's free antivirus package, and the same engine underpins the company's full security suite. It also includes a firewall, email integration and antispam, plus a few extras such as rootkit detection and IM protection. Those are good things to have, but considering the basic malware component can be had for free it doesn't seem like great value.
Our malware detection tests only strengthened that impression. A score of just 80% left AVG near the bottom of the class, missing trojans, diallers, backdoors and more. When we probed the test PC with our network scanner, we found five potential vulnerabilities and six open TCP ports - more than any other package. We were less than impressed by the firewall too, which was confusing to configure and intrusive once we'd done so.
We were also turned off by the way the program's browser tool bar includes a Yahoo search box that can't be closed - and "page not found" errors are, by default, redirected to another page with a Yahoo search field. We might excuse that sort of thing in a free program, but not in a paid-for suite.
AVG does have one trump card: web-based detection. Clearly, the company's acquisition of Exploit Protection Labs and its LinkScanner package at the end of 2007 is paying off. By combining URL blacklists with real-time detection, AVG achieved a chart-topping 74% success rate with dodgy websites.
If your prime concern is web-based threats, AVG Internet Security is worth considering, but for all-round peace of mind we'd go with a more balanced package such as Avira.
Author: Darien Graham-Smith
You don't mention uninstalling AVG. On the free antivirus, it is extremely difficult to do. And the old versions stay as well. A company that has so little regard for their customers - who should be able to decide what software they want to use - should be avoided. I think that you should include ease of removal in all your software tests, and especially not include software that cannot be removed on your cover disk.
By RichardKeys on 3 Feb 2012
- Hackers harvest LaCie card data for a full year
- Google to rank encrypted pages higher
- Heartbleed: the race to reissue security certificates
- Heartbleed: what the flaw means for hardware and devices
- Heartbleed: don't change all of your passwords
- 13 May: the day we'll know if Microsoft is really abandoning Windows XP
- IWF: UK child-abuse hosting climbs due to hackers
- Microsoft releases final patches for Windows XP
- Yahoo beefing up privacy in wake of NSA snooping
- 24m vulnerable home routers ready to launch DDoS attacks
- Windows 8.1 Update: an abject surrender
- The insane economics of Sky Now TV
- No such thing as a free app... so pay up if you want quality
- Time to outlaw crapware-laden installers
- Windows Phone 8.1 video: hands-on
- Office for iPad: key information
- Why every PC buyer owes Richard Durkin a debt of gratitude
- HTC One M8 vs Samsung Galaxy S5: 2014's big-hitters compared
- Windows XP end of life: key information
- Cut out the broadband jargon? What jargon?
- Heartbleed: what you need to know and do
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- The men trying to save us from the machines
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords