Computer security software
Protect your computer from the web’s worst with an internet security package.
Whether it runs Windows or Mac, you need a buffer between your computer and malware on the internet. Security software or an antivirus program can provide protection, but what should you look for and will premium or free software suit? Here's what you need to know to find the right program.
There are a few components to successful internet security – firewalls, scanning for viruses and removing them – that can be done with separate programs. But we think you’re better off with a single suite that manages it all with only one installation and, for premium products, one subscription to pay.
Tip: Before choosing a security package, make sure your computer’s operating system has the latest updates. Ideally, you should also keep your web browser and other important programs updated.
Many packages are available in free and paid varieties. Both are legitimate options, depending on your priorities.
Free version: contains all the same basic functions and is just as secure. However, it will incessantly ask you to upgrade to the paid version and may also come bundled with extra programs you don’t need.
Premium version: aside from removing ads, will come with advanced features. Some, such as ransomware protection, are like insurance policies – not useful on a daily basis, but if you do need them, you’ll really need them. Others, such as password managers, are mostly for convenience or protecting against human error.
Don’t assume your Mac is safe. We found the macOS operating system provides almost no protection against malware, so an antivirus package is important even though there are fewer viruses going around for Macs.
Here’s some security terminology you may come across:
Software that delivers advertisements on your computer.
This prevents your computer sending data to other websites when it detects you’re using internet banking.
Affects the Master Boot Record of a hard disc, where information about the drive is stored (when you boot from the infected disc, the virus loads before the operating system does).
Short for bot network, also known as a "zombie army", it’s a collection of infected internet-connected computers running unauthorised automated software (called robots or bots) that can distribute spam and viruses and launch attacks on computers or networks.
A software program and/or hardware device that limits outside network access to a computer by blocking or restricting entrances (ports) to your computer.
A generic term for unwanted software that secretly executes unwanted actions.
Constant monitoring of a computer’s memory and file system that activates automatically and scans any file (as it’s opened, closed or moved) to detect virus activity before it can infect the system.
Scanning of selected files as required by a user.
Attempts to lure users to reveal credit card details, account passwords and personal information by pretending to be an email from a trusted financial institution or service.
A virtual opening into your computer through which information can pass in and out. Used for communicating over the internet. Port can also refer to a physical connection point for attaching devices.
The isolation of files suspected to contain a virus, so they can’t be opened or activated.
Ransomware is a particularly nasty type of malware that locks the data on your computer using encryption. It then displays a ransom message asking for payment to release your data. The reality is even if you pay the ransom, your data are unlikely to be released. Regular backups are the best means of recovery as you can roll back your data to before they were encrypted. However, security software is still needed to remove ransomware and protect your computer from further attacks.
Programs that conceal malicious code’s access to files, folders and registry keys (they also make programs, system services, drivers and network connections invisible to the user).
Unsolicited (junk) email distributed on a large scale and often part of a scam.
Software that secretly gathers information about a user from a computer.
A malicious program hidden in a benign application. Often used by hackers to enable access to the victim’s computer.
A software program, script, or macro designed to infect, destroy, modify, or cause other problems with a computer or software program.