• 0

Definitive Best FREE Antivirus 2021


Definitive Best Free AntiVirus Software 2021  

23 members have voted

You do not have permission to vote in this poll, or see the poll results. Please sign in or register to vote in this poll.

Question

goretsky

Hello, 
  
This is the 2021 poll for best free anti-virus (aka anti-malware aka internet security aka endpoint security) security software.  
  
The poll for paid products is located here.  The poll for 2020's best free antivirus is located here
  
If your choice is not listed, please choose "other" and reply below with its name. 

 

This year the poll is multiple choice, so that you can select two (or more) choices.  If you do choose multiple options, please leave a comment with the ones you chose and why.  
  
Regards, 
  
Aryeh Goretsky 

Link to post
Share on other sites

7 answers to this question

Recommended Posts

  • 1
goretsky

Hello,

 

It has been added.  Thanks for the suggestion!

 

Regards,

 

Aryeh Goretsky

 

  

14 hours ago, SnoopZ said:

Surely Bitdefender Free should be on the main list rather than classed as other considering it is well known compared to lots on the list I've never heard of?

 

Well I know not technically Free I use a Free 3 month trial of Bitdefender Total Security and just renew it every 3 months.

 

Link to post
Share on other sites
  • 0
SnoopZ

Surely Bitdefender Free should be on the main list rather than classed as other considering it is well known compared to lots on the list I've never heard of?

 

Well I know not technically Free I use a Free 3 month trial of Bitdefender Total Security and just renew it every 3 months.

Link to post
Share on other sites
  • 0
Mindovermaster

I don't use AV's anymore, but I did like Avast, AVG, and Malwarebytes.

Link to post
Share on other sites
  • 0
cork1958

Used to like Bitdefender, when I did use an AV, but just stick with Defender now a days.

Link to post
Share on other sites
  • 0
TDT

Why is Malwarebytes on this list? The free version is not real-time, only scan on demand, it really doesn't count as a true antivirus solutions in my opinion...

Link to post
Share on other sites
  • 0
goretsky

Hello,

The free version of Malwarebytes Anti Malware is listed because it is regularly mentioned here on Neowin.  ClamWin does not have a real-time scanning component, either.

Keep in mind that none of the twenty applications listed in the poll—including the seven with the word "antivirus" in their name—are technically anti-virus applications.  Something like 93-97% of malicious computer programs encountered on a daily basis by security software are computer viruses (e.g., recursively-self-replicating programs whose children are also self-replicating and possibly evolved copies of that original program [the "classic" definition of a computer virus]). 

 

Most of the malicious software seen by security firms is non-replicating in nature and takes the form of agents, bots, multi-stage downloaders, trojan horses and all sorts of other things that if you knew what they did you wouldn't want them on your computer.

 

The use of terms like "antivirus" and "computer virus" are used solely because that is what the public is familiar with, and using the correct terms helps ensure that your product gets installed and/or purchased instead of one of your competitors' products.  So, the use of those two terms is specifically for marketing purposes only, and not meant to be an accurate description of what the product does or the types of threats it protects against.

 

Regards,

 

Aryeh Goretsky

 

On 02/01/2021 at 21:34, TDT said:

Why is Malwarebytes on this list? The free version is not real-time, only scan on demand, it really doesn't count as a true antivirus solutions in my opinion...

 

Link to post
Share on other sites
  • 0
lissi88

Pure malware and ransomware attacks, I've seen the BlackBerry protect solution work quite well - particular in air-gaped environment. The price can be quite steep and it needs a bit of configuration, but it successfully address zero days pre-execution.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

  • Similar Content

    • By Copernic
      WinLock 8.46
      by Razvan Serea



      WinLock ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with Windows and allows you to add an optional startup message, provide audio notification, and set the time limit. Once that limit is reached, Windows is summarily shut down. You can toggle the timer on and off from the tray. When enabled, there is no way around it without the proper password.
      WinLock also allows to disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, customize Start menu, hide Start button and Switch bar, and much more...

      Block Windows and Lock Files features allow to block virtually any application or any part of it (window, popup message, dialog box), Explorer Windows (My Computer, Recycle Bin etc.), and lock selected files. Restricted sites feature filters Internet content and prohibits access to questionable websites.

      WinLock is available in two editions: Standard and Professional. WinLock Professional offers all features of the WinLock, plus several advanced security capabilities of interest to the professional users. The advanced features of the Professional edition are:

      Support for multi-user environment Internet Explorer restrictions Google Chrome restrictions Search through website for prohibited keywords Guest password USB key authentication Webcam snapshots Flexible removable drive restrictions WinLock 8.46 changelog:

      Disable pinned apps. Apply settings option. Disable right-click in Start menu. Disble F10 key. Microsoft Edge restrictions. Disable Timeline. Full support for unicode websites. Support for Edge 88 and Tor 10. Download: WinLock 8.46 | WinLock Pro 8.46 | ~10.0 MB (Shareware)
      Links: WinLock Home Page | WinLock Pro Screenshot

      Get alerted to all of our Software updates on Twitter at @NeowinSoftware

    • By Usama Jawad96
      Microsoft Edge will now let you know if your password is compromised
      by Usama Jawad

      Yesterday, Microsoft announced a bunch of new features coming to its Edge browser, including sidebar search, history sync, and more. Another nifty capability coming to the browser is Password Monitor, which alerts you if you are using unsafe credentials. The service began rolling out to Insiders back in June 2020 and is now being made available to the general public in Edge 88. Microsoft has detailed the feature in a dedicated blog post.

      Password Monitor is the outcome of collaboration between the Edge product team and a former Microsoft Research incubation group called the "Cryptography and Privacy Research Group". The underlying technology is based on homomorphic encryption and is built on top of the Microsoft SEAL homomorphic encryption library.

      Simply stated, Password Monitor contacts a server periodically and verifies that the credentials you have saved in Edge are not present in a database of breached credentials. If they are, the user is immediately alerted and asked to change them. It is important to note that neither Microsoft nor any other third-party can see your credentials, with the technology also secure against man-in-the-middle attacks so a malicious actor cannot hijack your password during transit between your browser and the server.

      Microsoft has also modified its SEAL library to ensure multi-platform support on various architectures including ARM, x86, and Mac, and it is also compatible with low-end devices. The firm has described the principles of homomorphic encryption in its blog post as well for our more cybersecurity-savvy readers. Microsoft has emphasized that the process consumes minimal network bandwidth, optimizes CPU utilization, and that the Password Monitor service is capable of handling a "large number" of client requests.

      Password Monitor will be made available to Edge users on a rolling basis so it will not be immediately visible to everyone. You can head over to the dedicated supported page to find out how to enable it.

    • By News Staff
      Cybersecurity: The Beginner's Guide ($23.99 Value) free offer ends today
      by Steven Parker

      Claim your complimentary eBook (worth $23.99) for free, before the offer expires on 01/19.



      It's not a secret that there is a huge talent gap in the cybersecurity industry.

      Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.



      This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.

      By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

      This free offer expires on Jan 19.

      How to get it
      Please ensure you read the terms and conditions to claim this offer. Complete and verifiable information is required in order to receive this free offer. If you have previously made use of these free offers, you will not need to re-register. While supplies last!

      >> Cybersecurity: The Beginner's Guide ($23.99 Value) - free download <<
      Offered by Packt Publishing, view their other free resources. Expires 01/19/20.

      Not for you?
      That's OK, there are other free eBooks on offer you can check out here, but be aware that these are all time-limited offers. If you are uncomfortable sharing your details with a third-party sponsor, we understand. Check out the Neowin Store for our preferred partners.



      Home Gym Giveaway | Ultimate Gaming Giveaway (feat. PlayStation 5 & Xbox Series X) Ivacy VPN - 5 year subscription for just $1 per month NordVPN - 2 year subscription at up to 68% off Private Internet Access VPN - subscriptions at up to 71% off Unlocator VPN or SmartDNS - unblock Geoblock with 7-day free trial Subscribe to Neowin - for $14 a year, or $28 a year for Ad-Free experience Disable Sponsored posts · Neowin Deals · Free eBooks · Neowin Store

      Disclosure: A valid email address is required to fulfill your request. Complete and verifiable information is required in order to receive this offer. By submitting a request, your information is subject to TradePub.com's Privacy Policy.

    • By zikalify
      Google to limit Chrome sync API following audit
      by Paul Hill



      Google has announced that it will be limiting access to private Chrome APIs that enable features such as Chrome sync and Click to Call so that only its browsers can use them. The decision follows an audit by the company which uncovered that third-party Chromium-based browsers were using the APIs.

      The web giant said that users of some third-party browsers were able to sign in to their Google Account and store and retrieve their Chrome sync data in their third-party browser. The data they could access includes bookmarks and presumably passwords. Google isn’t happy this is happening and has said that the APIs that enable these features will be restricted from March 15, 2021.

      For users that have already accessed these features, their data will still be available in their Google Account and will continue to be stored locally in their third-party browser. To continue using the restricted features, users will have no other option than to switch to Google Chrome or Chromium.

      Google Chrome’s Engineering Director Jochen Eisinger who authored the post did not share which browsers were using these APIs but Chromium has become an extraordinarily popular choice to build browsers on top of. Microsoft’s Edge, Opera, Vivaldi and Brave are some popular web browsers that are built atop of Chromium but they each have their independent syncing services.

    • By News Staff
      Free download - Cybersecurity: The Beginner's Guide ($23.99 Value)
      by Steven Parker

      Claim your complimentary eBook (worth $23.99) for free, before the offer expires on 01/19.



      It's not a secret that there is a huge talent gap in the cybersecurity industry.

      Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.



      This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.

      By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

      This free offer expires on Jan 19.

      How to get it
      Please ensure you read the terms and conditions to claim this offer. Complete and verifiable information is required in order to receive this free offer. If you have previously made use of these free offers, you will not need to re-register. While supplies last!

      >> Cybersecurity: The Beginner's Guide ($23.99 Value) - free download <<
      Offered by Packt Publishing, view their other free resources. Expires 01/19/20.

      Not for you?
      That's OK, there are other free eBooks on offer you can check out here, but be aware that these are all time-limited offers. If you are uncomfortable sharing your details with a third-party sponsor, we understand. Check out the Neowin Store for our preferred partners.



      Home Gym Giveaway | Ultimate Gaming Giveaway (feat. PlayStation 5 & Xbox Series X) Ivacy VPN - 5 year subscription for just $1 per month NordVPN - 2 year subscription at up to 68% off Private Internet Access VPN - subscriptions at up to 71% off Unlocator VPN or SmartDNS - unblock Geoblock with 7-day free trial Subscribe to Neowin - for $14 a year, or $28 a year for Ad-Free experience Disable Sponsored posts · Neowin Deals · Free eBooks · Neowin Store

      Disclosure: A valid email address is required to fulfill your request. Complete and verifiable information is required in order to receive this offer. By submitting a request, your information is subject to TradePub.com's Privacy Policy.