Technology

Product overview

Welcome to New Zealand’s trusted, independent source of practical consumer information. Join us now to access all our information and Consumer advisers when you need them.  

Security software

15aug security suites hero default

Keep your computer safe and secure.

We tested premium and free computer security software to see how well they protect you on the internet. We also give our top tips for staying safe online.

From our test

Join us now for instant access

Join more than 100,000 members today and you'll get:

  • Independent info
  • Thousands of test results and research you can trust
  • Everything in one easy place
  • Expert support a phone call away if things go wrong


About security software

Why do you need security software? Without it, the data on your computer could be ripe for the taking by hackers or susceptible to viruses, spyware and spam. Some security software also help protect your computer from email scams and malicious websites, which can attempt to access your personal data.

Do I need one?

When it comes to protecting your computer, we recommend security software. These types of software offer a raft of protection measures in one package. They are also easier to manage than individual programs as they only require one installation, one regular update and one subscription payment for you to remember.

Separate anti-malware (also known as antivirus) programs can offer similar levels of protection, but to achieve this you need to install multiple programs – such as a virus scanner, malware removal tools and a firewall – and keep tabs on multiple accounts. You also need to update each program individually.

We think you should always use security software – either paid or free – to protect your computer while surfing the internet.

What to look for

If you’re considering security software, these are important features to consider:

  • Pop-up blocking and ad-blocking: This stops pop-up windows from loading. These windows can contain adware or viruses.
  • Cookie-blocking: This stops cookies (small text files containing information) from being allowed into your computer.
  • Content filtering – also known as parental control software: This allows certain websites to be blocked using whitelist, blacklist, or heuristic controls.
  • Phishing protection: Phishing sites are designed to look like legitimate websites, such as banks or online shops, in the hope you will enter your credit card or bank details. Many security programs block sites known to be involved in phishing.
  • WiFi protection: Allows you to manage your wireless security and detect unauthorised access. This feature may only work with certain brands and models of wireless routers.
  • Game mode: Allows playing games or viewing entertainment over the internet while maintaining security. This can activate automatically when launching an online service and does not interrupt or impact the service.
  • Help access: Decide what level of support you need. Most security software have comprehensive help functions, tutorials, and online assistance. But if things go wrong, is email contact enough or would you prefer personal assistance via a helpline? Don’t assume a helpline is free, even if it uses an 0800 or 0508 number. You may have to pay for support and assistance.
  • Scan on install: Ideally, you’ll be installing your software on a virus- and spyware-free computer. If not, look for software that scans your computer before it installs, or one that updates and scans immediately after installation.
  • Remote file check: Allows you to send a copy of a suspected infected file to the software developer’s lab for diagnosis.
  • Scheduled scan: The software can be set to scan specified folders or files at regular times.
  • Archive scan: Downloaded files are often compressed or archived to save space. Archiving hides the properties of the threat the security software looks for. This scan finds them.

Security for Macs

While Windows computers are more likely to be the target of malware than Macs, there are still some nasties that can affect them. User error or phishing scams can expose Macs to potential danger.

When correctly set up, a Mac requires an administrator password before allowing changes to the system software. It’s essential to only give permission when you know exactly what it is you are allowing and trust the source.

Moreover, Macs can pass on Windows viruses. Note: any Mac running Windows (via Boot Camp, Parallels Desktop or VMware Fusion) needs Windows security protection.

The basics

  • Before installing any new security programs, ensure your computer’s operating system and all other software has the latest updates.

  • Microsoft release security patches on the second Tuesday of each month (called Patch Tuesday) and you should get the most recent updates.

  • Most malware gets on to your computer through email attachments sent by unknown people or by clicking on unsafe links. If you don’t know the sender or website, don’t click!

  • Your bank will never send you an email that links to its websites. Always access your bank’s website by following an existing bookmark or by typing in its web address.

Playing with fire

A firewall prevents unauthorised access to your computer from the internet, such as a malicious program or hacker trying to steal your personal details.

A firewall stops this by monitoring data going into and coming from your computer and filtering out malicious connections. These connections can be attempts to take your data, gain control of your computer or to initiate downloading a virus.

Mobile phone security

Malware has 2 main ways of attacking mobile phones.

The first is through system vulnerabilities or exploits: these use the phone’s own systems to run malicious code. The second is through fake applications that look like legitimate and free (or sometimes even paid) applications in the app store but which turn out to be malware. Google is getting better at removing these apps from its Play Store – but it’s still not perfect.

In its latest test of Android-based security software, independent test lab AV-Test (av-test.org) compared 21 security programs designed to keep your smartphone and tablet safe from attack, focusing on real-world threats and assessing the software’s protection, usability and features.

Some issues this test looks at are:

  • How good is the security program at detecting a representative set of malicious apps discovered in the past 4 weeks (the AV-Test reference set)?
  • Does it affect battery life?
  • Does it slow the device during normal use?
  • Does it generate too much traffic?
  • Does it issue false warnings while legitimate software from Google Play is being installed or while the mobile’s being used?
  • Can personal data can be backed-up to SD card or cloud storage?

Tip: When choosing a mobile security program it’s important to look at not only malware protection but also other daily-use security features such as anti-theft measures, parental controls, backup and encryption.

Top security tips

Some tips on how to keep your computer secure:

  • Update regularly: threats are continually evolving. Set your operating system and security software to update automatically.
  • Free programs can be laced with viruses and spyware. Download only from well-known and reputable sites.
  • Make sure none of your online passwords are the same – for example, your online banking password shouldn’t be the same as your email password.
  • Always use “strong” passwords which include lower case and upper case letters as well as numbers. If you find it difficult remembering multiple passwords, consider using a password manager.
  • Don’t click links from emails, Twitter, Facebook or any other source unless you’re certain of where they came from. This is especially so for “phishing” scams that pretend to be from banks or other organisations. It’s not rude to ask the sender where the link goes if you’re not sure.
  • Hovering over a link with your mouse will usually reveal (in the bottom left corner of your browser) exactly where the link goes.

Maintaining security

Once you buy security software, there are a few things to do to secure your computer:

  • Follow the set-up steps for antivirus and firewall components – you shouldn’t need to do anything more than OK the list of applications that are allowed to access the internet.
  • Scan your system for spyware, worms and viruses.
  • Switch on any components that aren’t on by default – some products need components activated manually.

On an ongoing basis:

  • Train your anti-spam program by marking messages as junk or legitimate.
  • Scan for viruses and spyware at least once a week – this can usually be scheduled automatically.
  • Approve new programs you install that need internet access through your firewall.
  • Update your security software regularly – this should be automatic but may need to be updated manually.

Technical terms

Here’s some security terminology you may come across:

Adware

Software that delivers advertisements on your computer.

Boot virus

Affects the Master Boot Record of a hard disc, where information about the drive is stored (when you boot from the infected disc, the virus loads before the operating system does).

Botnet

Short for bot network, also known as a "zombie army", it’s a collection of infected internet-connected computers running unauthorised automated software (called robots or bots) that can distribute spam and viruses and launch attacks on computers or networks.

Firewall

A software program and/or hardware device that limits outside network access to a computer by blocking or restricting entrances (ports) to your computer.

Malware

A generic term for unwanted software that secretly executes unwanted actions.

On-access scanning

Constant monitoring of a computer’s memory and file system that activates automatically and scans any file (as it’s opened, closed or moved) to detect virus activity before it can infect the system.

On-demand scanning

Scanning of selected files as required by a user.

Phishing

Attempts to lure users to reveal credit card details, account passwords and personal information by pretending to be an email from a trusted financial institution or service.

Port

A virtual opening into your computer through which information can pass in and out. Used for communicating over the internet. Port can also refer to a physical connection point for attaching devices.

Quarantine

The isolation of files suspected to contain a virus, so they can’t be opened or activated.

Rootkits

Programs that conceal malicious code’s access to files, folders and registry keys (they also make programs, system services, drivers and network connections invisible to the user).

Spam

Unsolicited (junk) email distributed on a large scale and often part of a scam.

Spyware

Software that secretly gathers information about a user from a computer.

Trojan

A malicious program hidden in a benign application. Often used by hackers to enable access to the victim’s computer.

Virus

A software program, script, or macro designed to infect, destroy, modify, or cause other problems with a computer or software program.

×