The 10 Best Antivirus Software

Updated May 25, 2017

10 Best Antivirus Software
Best High-End
Best Mid-Range
Best Inexpensive
We spent 39 hours on research, videography, and editing, to review the top choices for this wiki. These days, it's not a question of "if" your electronic devices will be compromised, it's simply a question of "when" and "how." We often forget how much sensitive information is stored on all our gear, so protect your PC, Mac, laptop, tablet and smartphone from malicious hackers, adware, spyware and even ransomware with something from our selection of capable and advanced antivirus software. When users buy our independently chosen editorial picks, we may earn commissions to support our work. Skip to the best antivirus software on Amazon.

10. Threattrack Vipre Internet Security

One of the main selling points of Threattrack Vipre Internet Security is its lifetime license that frees you up from having to worry about renewing your subscription every year. It also scans your social media pages for any links that could potentially harm your computer.
  • two-way firewall
  • vulnerability scanner
  • slows down computer boot time
Brand ThreatTrack Security
Model SUN337800F160
Weight 2.4 ounces
Rating 4.1 / 5.0

9. Avira Pro

Avira Pro keeps most of its malware analysis in the cloud instead of on your computer, so your desktop won't be bogged down by its processes. It also features self-defense technology to prevent anything from manipulating or disabling its protection.
  • browser tracking blocker
  • very good independent lab results
  • interface is complicated to use
Brand Avira
Model pending
Weight pending
Rating 3.5 / 5.0

8. ESET NOD32

ESET NOD32 is a straightforward program that lacks many additional features but makes up for it with its lightning fast scanning and small footprint. It monitors your home network and shows you if any of your neighbors are leeching your Wi-Fi.
  • simple to use interface
  • submit unknown files for analysis
  • device control system is confusing
Brand ESET
Model RTL-EAVH-N1-3-1-RBX
Weight 1.6 ounces
Rating 3.9 / 5.0

7. AVG Ultimate

AVG Ultimate is the upgraded version of their popular free software enjoyed by millions of users across the world. This paid version lets you create encrypted storage zones on your computer that are completely inaccessible to any snooping fingers.
  • cleans up junk data to save space
  • very easy to use interface
  • no protection offered for iphones
Brand AVG Technologies
Model ULT17T24EN
Weight 6.9 ounces
Rating 3.8 / 5.0

6. McAfee Livesafe

If you've lost count of the number of devices you own, then McAfee Livesafe is the choice for you. The subscription allows for an unlimited amount of devices in one household, and you can monitor the status of each one from the application.
  • automatically removes junk mail
  • comprehensive file shredder included
  • mediocre anti phishing score
Brand McAfee
Model MTP15EAM1RAA
Weight 0.3 ounces
Rating 4.6 / 5.0

5. Webroot Internet Security Complete

Webroot Internet Security Complete uses automatic remediation to repair infected systems without re-imaging, and securely backs up your files with 25GB of online storage. It also fully scans your computer in less than 5 minutes while other programs can take up to an hour.
  • password protection and encryption
  • does not slow computer down
  • ransomware protection
Brand Webroot
Model 60309
Weight 0.8 ounces
Rating 4.3 / 5.0

4. Trend Micro

There is a growing threat called ransomware that encrypts your essential documents and makes you pay to get the decryption key. Thankfully, Trend Micro comes with a Folder Shield feature that protects essential folders on your computer from outside tampering.
  • identity theft prevention
  • firewall booster
  • social media protection
Brand Trend Micro
Model TRE021800G202
Weight 1.6 ounces
Rating 4.0 / 5.0

3. Symantec Norton Security Deluxe

If you've got persistent malware, Symantec Norton Security Deluxe has a Power Eraser that digs deep within your hard drive to root out anything left behind. It is one of the most trusted brands in security and the benchmark to which other options compare themselves to.
  • refund if security is breached
  • easy to install
  • smart dashboard for program control
Brand Symantec
Model 21364328
Weight 0.6 ounces
Rating 4.6 / 5.0

2. Kaspersky Internet Security

One of the most unique features of Kaspersky Internet Security is its inclusion of a VPN connection that allows for safe and private browsing. Its Safe Money technology also helps ensure all your financial transactions are legitimate.
  • web cam protection against spying
  • alerts for dangerous public wifi
  • parental control options
Brand Kaspersky
Model KL1941ADAFS-1711UAO
Weight 2.9 ounces
Rating 4.9 / 5.0

1. Bitdefender Plus

The default autopilot mode of Bitdefender Plus leaves you alone while you're using the computer and conducts most of its processes discreetly in the background. It also consistently scores the highest marks on tests done by independent labs.
  • built-in password manager
  • excellent anti-phishing module
  • light system load
Brand Bitdefender
Model pending
Weight pending
Rating 5.0 / 5.0

What Is A Computer Virus?

In computers, a virus is a term used to describe a malicious software program which replicates itself, much like human pathogenic viruses. This process eventually infects various computer programs or important aspects of the computer like the boot drive. A virus can also affect programs by modifying them to produce a desired result.

Many malicious software programs, collectively called malware, are under the virus umbrella, though they have their own names. These include Trojan horses, worms, keyloggers, rootkits, ransomware, spyware, and adware. Each of these malware programs has a specific function, and is designed to achieve the results a hacker desires. The key descriptor in any virus is that it is installs unknowingly or without consent from the victim.

The most common type of malware is a Trojan horse file. Much like the ancient Trojan horse of Greece, the computer program hides its true intent until it is installed. Trojan horse files can be anything as simple as an executable file downloaded from the internet, to an email attachment sent from an unknown recipient. Opening these files acts as a backdoor for the Trojan horse, allowing unfettered access to the user's computer.

These files are particularly dangerous, as they can allow an attacker to view the user's personal information such as passwords and banking information. Trojan files can also allow attackers to view their victims IP address, which further exposes them to malware like rootkits and ransomware.

A rootkit is a type of malware that activates on startup every time the computer is powered on. Rootkits can be difficult to detect and extract because they start before the operating system is completely running. Once a rootkit is installed, the attacker has the ability to install hidden files, user accounts, and various processes directly to the operating system. Rootkits can intercept and transmit data from the keyboard, computer terminal and network connections.

Ransomware is a type of malware which targets a specific IP address. The program encrypts personal files using various algorithms which the hacker can reverse. The software then offers to decrypt the information for the user at a high price, effectively placing a ransom on their identity.

How Does Antivirus Software Work?

Most antivirus software programs target the most common types of spyware and adware. The term spyware covers a few main categories. Trojan horses, keyloggers, tracking cookies, and system monitors are all forms of spyware. These programs are designed to gather information about a user without their knowledge and then send that info to an outside entity.

Some spyware is knowingly installed by the owners of public computers in order to monitor users. Possible examples of this include computers at libraries, computer cafes, and shared computers in office buildings. These keyloggers record every key struck on a keyboard. This can potentially compromise credit card information, personal passwords, and private messages sent. Should an antivirus software find a keylogger, the program can quarantine it and ask for your permission to eliminate it.

The other common program antivirus software combats is adware. Advertising-supported software, or simply adware, is a package of software which automatically creates advertisements in order to generate revenue for its creator. In legitimate software programs, certain types of adware and trackers normally exist. These include targeting purchasers of their software for add-ons through the advertisements they see when on the internet or while using their software. The company creates additional revenue, and can provide purchasers who allow this adware substantially lower rates. In malware programs, these ads appear as pop-up windows or windows which cannot be closed.

On the whole, antivirus software eliminates spyware programs through a series of scans, quarantines, and eliminations. An installed antivirus software checks files against a database of known malware programs, sniffing out potentially harmful files. Antivirus software is able to detect malware based on patterns in executable code and the various behaviors of the files themselves.

Benefits of Anivirus Software

Threats to personal security are of the highest concern in the modern era. While many know that including personal information in a password leaves you exposed to account theft, the risks to security do not stop there. Additional actions must be taken in order to ensure safety while using a computer. Installing antivirus software is one such action that can provide many benefits.

Antivirus software regularly scans and eliminates any virus it finds on a computer. This keeps the computer from being slowed down by infected programs or hardware, and prevents damage to the PC or network it is on.

Many antivirus software programs also provide email protection. These programs scan emails, email attachments, and downloaded content prior to it being opened. Using an antivirus software to protect a computer also keeps costs low. The cost involved from calling technical support, physically searching for virus files, and purchasing new computers which have been damaged beyond repair is far more than the cost of any antivirus program on the market.

Antivirus software is an important piece of creating a cloud-based archive as well. Along with security measures like encryption and storage measures such as deduplication, antivirus software provides an added layer of assurance to any company's archive.



Statistics and Editorial Log

0
Paid Placements
5
Editors
39
Hours
8,926
Users
31
Revisions

Wiki Granular Update & Revision Log


help support our research


Patreonlogoorange psj5g7Wiki ezvid low poly earth xdypeb

Last updated on May 25, 2017 by multiple members of the ezvid wiki editorial staff

Our professional staff of writers and researchers have been creating authoritative product recommendations and reviews since 2011. Many of our wikis require expert maintenance, and are authored by individual members of our editorial staff. However, this wiki is currently maintained by multiple members of the ezvid wiki team.


Thanks for reading the fine print. About the Wiki: We don't accept sponsorships, free goods, samples, promotional products, or other benefits from any of the product brands featured on this page, except in cases where those brands are manufactured by the retailer to which we are linking. For our full ranking methodology, please read about us, linked below. The Wiki is a participant in associate programs from Amazon, Walmart, Ebay, Target, and others, and may earn advertising fees when you use our links to these websites. These fees will not increase your purchase price, which will be the same as any direct visitor to the merchant’s website. If you believe that your product should be included in this review, you may contact us, but we cannot guarantee a response, even if you send us flowers.