*
[go: up one dir, main page]

Looking for a bargain? – Check out today's top tech deals!

The Best Antispyware Software for 2024

Antivirus and security suites should protect you against all types of malware, including spyware. These are our top tested choices for the best spyware protection.

Related:


The Best Aussie Antivirus Deals Available Now

Check out more security software deals available in Australia here.


Going for a stroll in a park or market might seem to be a public activity, but is it? Unless someone knows you by sight, you’re just one of the anonymous crowd. Surfing the web or going shopping online is a different story. Each site you visit gets your IP address, and many actively grab all the private info they can. Yes, your antivirus should whack any malicious sites and programs, but some skirt the edge of legitimacy. That’s why many security programs enhance their protection with features for detecting and preventing spying behaviors. How they do it varies widely, but we’ve pulled together a collection of security tools that go the extra mile to protect your privacy.

After our reviews of the top antispyware software, read on to learn about the varieties of spyware and the top technology for shutting down the spies.

You Can Trust Our Reviews

Since 1982, PCMag has tested and rated thousands of products to help you make better buying decisions. Read our editorial mission & see how we test.

Deeper Dive: Our Top Tested Picks

  • Bitdefender Total Security

    Bitdefender Total Security

    Best for Wealth of Spyware Features
    4.5 Excellent

    Why We Picked It

    Bitdefender Total Security is our Editors’ Choice pick for security mega-suite, in no small part due to its amazing breadth of features. Of course, it includes all the expected suite mainstays: award-winning antivirus protection, unobtrusive firewall, parental control, spam filtering, and so on. But it also boasts a big collection of spyware-fighting features.

    Like IronVest, it actively puts an end to tracking systems that profile your online activity by embedding ads and other trackers in the web pages you visit. Its SafePay hardened browser isolates your financial transactions from interference using a separate desktop that’s not accessible to other processes. If an unauthorized program tries to peek through the webcam, Bitdefender offers to block it. And its file shredder lets you rub out all traces of sensitive files, foiling even spies with forensic recovery software. Don’t forget the privacy protection from its VPN (though you’ll have to pay extra for unlimited features).

    Who It’s For

    Sure, spyware is a worry, but maybe you’ve got enough worries already. Rather than deal with figuring out separate spyware protection tools, you may prefer to just pick an award-winning security suite that has spyware protection baked in. That’s Bitdefender Total Security.

    • Pros

      • Award-winning antivirus
      • Protects Windows, macOS, Android, and iOS devices
      • Online management and remote control
      • Many bonus features, including VPN and system tune-up
    • Cons

      • Full VPN access requires separate subscription
      • Parental content filter not fully effective
      • Support for iOS is limited
    Get It Now
  • McAfee AntiVirus

    McAfee AntiVirus

    Best for One-PC Households
    4.0 Excellent

    Bottom Line:

    McAfee AntiVirus gets perfect lab scores and does well in our tests, but because it protects only one device, it’s not practical for many users.
    • Pros

      • Perfect lab test scores
      • Excellent scores in our hands-on tests
      • Virus protection pledge
    • Cons

      • Missed one hand-tweaked ransomware sample
      • Windows-only protection with no volume discount
      • Many long-standing features now absent
    Get It Now
  • Norton 360 with LifeLock

    Norton 360 with LifeLock

    Best for Identity Theft Remediation
    4.5 Excellent

    Why We Picked It

    By itself, Norton 360 Deluxe is a PCMag Editors’ Choice pick for cross-platform, multi-device security suite, with a ton of features including some aimed at fighting spyware. The addition of LifeLock makes it a powerful tool for detecting attempts to spy on your personal activities and steal your data. If someone gets access to your bank account, or requests an illicit change of address, or misuses your SSN, Norton with LifeLock warns about it, so you can quickly take action. And if the spies and hackers manage to steal your identity, your subscription entitles you to all the help it takes to put things right.

    But Norton’s skills don’t stop there. A full-powered VPN protects your online communications against interference and spying. It includes a degree of the data broker opt-out management epitomized by Optery. Sneaky peekers won’t get access to your webcam, because Norton will warn you. It even puts your browser in isolation mode when you’re banking, to prevent theft of your data.

    Who It’s For

    You want it all, and you want it now. An award-winning security suite, comprehensive identity monitoring, expert help to recover if identity thieves strike, and an array of spyware-specific security components—that’s Norton for you.

    • Pros

      • LifeLock identity theft mitigation
      • Excellent device-level security protection
      • Full VPN with no bandwidth limits
      • Supports Windows, macOS, Android, and iOS
      • Identity theft remediation guarantee
    • Cons

      • Security protection is limited on iOS devices
      • No parental control or backup for macOS
      • Cannot actually prevent identity theft
    Get It Now
  • Avast AntiTrack

    Avast AntiTrack

    Best for Foiling Fingerprinters
    4.0 Excellent

    Why We Picked It

    Each time you visit a web site, there’s a good chance you’ll trigger an ad or other tracker embedded in the site. Trackers on sites across the internet work together to build a profile. What kind of sites do you like? What do you buy? Where do you comment? They go on to sell these profiles to others, legitimate or shady. If you’d rather not be spied on by these trackers, check out Avast AntiTrack.

    Old-fashioned trackers rely on things like browser cookies to link your various activities, and old-fashioned tracker blockers easily subvert this process. Persistent trackers invented a new technology called browser fingerprinting that identifies you using a collection of data that any site can gather by querying your browser. Avast AntiTrack defeats fingerprinters by subtly varying the information sent by your browser, so you don’t have a consistent fingerprint. And of course it also smacks down the old-fashioned trackers.

    Who It’s For

    Whose business is it what you do on the internet? Nobody but yourself, right? With Avast AntiTrack you can keep nosy spies out of your online activity.

    • Pros

      • Foils websites that track you using fingerprinting
      • Actively detects tracking attempts
      • Can clear cookies and other browser traces
      • Configures Windows for better privacy
    • Cons

      • Tracker blocking visible only in Chrome
      • No transparency regarding Windows privacy settings
    Get It Now
  • Trend Micro Maximum Security

    Trend Micro Maximum Security

    Best for Encrypting Your Data
    4.0 Excellent

    Why We Picked It

    Imagine the chagrin of a thief who sneaks into the office, cracks the safe, and steals a secret document…only to find that it’s written in a cipher she can’t crack. Keeping your important data encrypted is a dandy way to foil spies, and the Vault component of the many-skilled Trend Micro Maximum Security makes encryption simple. Just copy your sensitive docs into the vault and use the digital shredder to securely delete the originals.

    While encryption is a highlight, it’s far from the only boon you get with Trend Micro Maximum Security. To start, this is a full security suite, with antivirus, parental control, system tune-up, and even a spam filter. Nobody, not even the owner of the shady Wi-Fi network you’re using, can spy on your internet communications when you protect them with Trend Micro’s VPN. The Pay Guard hardened browser shields your financial transactions from digital prying eyes, and Data Theft Prevention intervenes any time your predefined personal information is about to be transmitted elsewhere, whether accidentally by you or deliberately by a data-stealing Trojan.

    Who It’s For

    If you’re not so much worried about spyware in general, but more worried about protecting certain files and documents from spies, Trend Micro’s Vault can help. Of course, it doesn’t hurt that you also get a full-fledged security suite with additional spyware-fighting mojo built in.

    • Pros

      • Excellent scores in our phishing and malicious download tests
      • Comprehensive Android security
      • Protection for macOS beyond the basics
      • Unusually feature-rich iOS protection
      • Many useful security features
    • Cons

      • Lab scores from perfect to dismal
      • Poor score in hands-on malware protection test
      • Parental control weak
    Get It Now
  • Bitdefender Home Scanner

    Bitdefender Home Scanner

    Best for Thwarting Wi-Fi Spies
    3.5 Good

    Why We Picked It

    “It’s coming from inside the house” means you’ve got big trouble, really big. Likewise, if a spy gains access to your Wi-Fi network, that’s exactly the level of trouble you’re in. Forget attacks across the internet; this spy is right in your network, and you may not even know it. Unless, that is, you analyze the network with Bitdefender Home Scanner.

    This free scanner examines your home network and lists every device it can find. It also reports on any devices that suffer security weaknesses, weaknesses that might provide entrée for a hacker. You’ll want to go through the list and make sure you know what device each item represents. After that, the scanner notifies you of any new devices that connect.

    Who It’s For

    If you have a home network (and who doesn’t) it behooves you to know just what’s connected. With this free scanner, you’ll get an immediate warning if some malefactor breaches your network security.

    • Pros

      • Lists all devices attached to your network
      • Identifies devices by name and type when possible
      • Flags devices that may be vulnerable
      • Reports new devices connecting to network
    • Cons

      • Security advice the same for most problems
      • Can't block access by unwanted devices
      • Advises purchasing the Bitdefender Box, which is not currently available
    Get It Now

Buying Guide: The Best Antispyware Software for 2024


What Is Spyware and How Does It Work?

Just what is spyware? The term covers a wide variety of sinister software—programs that can do everything from capturing your passwords as you type to peeping at you through a webcam or internet-aware device.

As the name implies, a keylogger keeps a log of all the keys you type, everything from personal messages to username and password combinations. If you have a keylogger running on your system, chances are good that some crooked individual planted it specifically to spy on you. The keylogger can even be a physical device installed between the keyboard and the PC.

We call them keyloggers, but in truth, these nasty programs log a ton of information in addition to keystrokes. Most capture screenshots, save the clipboard's contents, note every program you run, and log every website you visit. The perp can use these various threads of information to, for example, match up a username and password you typed with the website you were visiting at the time. That's a potent combination.

(Credit: PCMag)

As noted, a first-class malware protection utility should wipe out keyloggers, along with all other types of malware. However, some of them add another layer of protection, just in case a keylogger slips past. When this sort of protection is active, the keylogger typically receives random characters, or nothing at all, in place of your typing, and attempts at screen capture come up blank. Note, though, that other logging activities may not be blocked.

Of course, keylogger protection in software can't prevent a hardware keylogger from capturing keystrokes. But what if you don't use the keyboard? A virtual keyboard on the screen lets you enter your most sensitive data by clicking with the mouse. Some products go to extremes, scrambling the key locations or creating a flock of decoy cursors to foil screen-capture attacks. Virtual keyboards are often found in password manager tools as well, so you can enter the master password without fear of having it captured.

(Credit: Kaspersky)

How Do Trojans Steal Your Data?

The historic Trojan horse looked innocuous enough to the soldiers of Troy that they brought it inside the city walls. Bad idea: Greek soldiers exited the horse in the night and conquered the Trojans. The malware type aptly named Trojan horse works in much the same way. It looks like a game, a utility, or a useful program of some kind, and it may even perform its promised function. But it also contains malicious code.

So, now that you've brought it inside your city walls, what can the Trojan horse do? The possibilities are vast, but I'll focus on the ones designed to steal your personal data. They silently sift through your files and documents, seeking information to send back to malware HQ. Credit card details, social security numbers, passwords—the malware coder can monetize these and other kinds of personal information.

One way to foil this sort of attack is to use encryption software to protect your most important files. You'll find encryption built into many security suites, among them Trend Micro Maximum Security and G Data Total Security. Note, though, that it's tough to find and encrypt every shred of personal data. It's a good thing your antivirus usually whacks these nasties before they launch.

A variation on this theme creates what's called a man-in-the-middle attack. All your internet traffic gets redirected through a malware component that captures and forwards personal information. Some banking Trojans take this a step beyond, actually modifying the traffic they handle. For example, the Trojan might transfer $10,000 out of your account but strip that data from the activity log that you see.

You can prevent man-in-the-middle and other types of browser-based spying by using a hardened browser. Implementations vary from suite to suite. Some wrap your existing browser in added protective layers. Some offer a separate high-security browser. And some move your browsing to a secure desktop, entirely separate from the normal desktop. The smart ones automatically offer their secure browser when they see you're about to visit a financial site.

(Credit: Bitdefender)

Routing your traffic through a virtual private network (VPN) is another way to foil many kinds of browser-level spying. You can definitely use a VPN, along with your malware protection, for a suspenders-and-belt approach! More and more security suites are including a VPN component, though some charge extra for full functionality.

What if the worst happens and an evildoer uses your personal information to steal your identity? Norton 360 With LifeLock is all about detecting identity theft attempts early and helping you recover from the effects of such an attack. It's our Editors' Choice among security suites that include identity theft protection.


How Do Advertisers Track Your Browsing Habits?

Have you noticed how when you look at a product on a shopping site, you start seeing ads for it on other sites? Online advertisers really want to present ads that you might click on. To that end, they use a variety of techniques to pin down your browsing habits. They don't necessarily know your name or your email address, but they do know "that guy who keeps shopping for Millie Bobby Brown action figures."

Creepy, right? The good news is you can set your browser to tell every site you visit that you don't want them tracking you. The bad news is they can (and do) totally ignore that request.

(Credit: Avira/PCMag)

The advertising and analysis networks that perform this kind of tracking are necessarily large. It's not too hard to compile a list of them and actively block their tracking, or at least give the user the option to do so. This active Do Not Track functionality is sometimes paired with general-purpose ad blocking. Note, too, that using a secure browser or a VPN can help to throw off the trackers.

The most advanced trackers create a fingerprint by quizzing your browser about all kinds of details, fiddly stuff like what extensions are installed—even what fonts are available. The usual active Do Not Track implementations can't help you against these. If you really, really hate the idea of having your online behavior tracked, consider giving Avast AntiTrack a try. This tool keeps tweaking the data that goes into your browser fingerprint so the trackers lose track of you.

Of course, sometimes you can’t avoid giving out your personal details, like giving your email address and credit card to a shopping site. The etailer may not be spying on you, but others can get hold of that data. Using a tool like IronVest, you can go ahead and shop online without ever giving out your real email address or credit card. IronVest includes active Do Not Track, password management, and more.


What About Spyware That Uses Public Data?

Real-world espionage experts don't spend all their time hiding behind potted plants or focusing binoculars on their targets. They can often gather an impressive dossier just by collating information that's publicly available. Spies call this OSINT, which stands for Open-Source Intelligence. The same is true of a growing class of businesses called data brokers or data aggregators. These snoops can assemble a thorough profile of you, your neighbor, and just about anyone from public information.

These businesses have to obey the law, and that includes the laws about removing your personal information from their files if you ask them. But how do you know to opt out when you don't even know they've got your profile?

(Credit: Optery)

A growing army of privacy services has arisen to help. These services search dozens or even hundreds of data broker sites to find your information and then automate the process of opting you out. Optery is our current favorite in this realm. It handles hundreds of brokers and verifies that your data has been removed. It will even search out your data for free if you're willing to make the opt-out requests yourself.


What's the Best Webcam Antispyware

That webcam on your laptop or all-in-one computer makes video conferencing super easy. You can tell when it's active because of the little light next to it. Right? Well, no. There are varieties of malware that can turn on the webcam and watch you without causing the light to reveal their activities.

Facebook's Mark Zuckerberg famously tapes over his webcam for privacy. If using tape seems déclassé, you can get a sliding webcam cover for just a few bucks. But, with the right security software, you don't need to physically cover the camera.

Products from Sophos and Trend Micro include a component that monitors any program that tries to activate the webcam. Norton has a similar feature. Authorized programs, like your video conferencing tool, get access without a problem. But if an unknown program tries to peek through the camera, you get a warning, as well as a chance to give the spyware a black eye.


Do My Smart Devices Need Antispyware Software?

Your home network supports a collection of very visible computers and mobile devices. Behind the scenes, though, it also supports an even bigger collection of Internet of Things (IoT) devices. Connected garage doors, washing machines, light bulbs—everything's on the network these days. Toys, too. It's cool that your child's new doll can learn her name and converse realistically. It's not so cool when it turns out that the doll is spying on you. (No, the doll's name is Cayla, not Chuckie.)

There are occasional instances like the connected doll where IoT devices deliberately collect data about you. But the lack of security in most connected devices is even more worrisome. Spending extra bucks to secure a smart light bulb makes no financial sense in some manufacturers' eyes. The competitor who skips security can get to market faster and for less. Ultimately, you may pay the cost for their negligence.

Any unsecured IoT device can potentially offer spies a view into your house and your habits. Ironically, hacked security cameras provide a lovely view for hackers. Even something as simple as a thermostat that adjusts the temp when you're home can reveal that you've gone on vacation.

You can't go around installing antivirus on each connected doorbell, refrigerator, and bathroom scale. The only way to truly secure these devices is to install a network security device like Firewalla. Without adding hardware, you can at least keep track of just what lives in your home network.

(Credit: Bitdefender)

Some security products now include variations on the theme of a network scanner. Features include verifying your network security settings, cataloging all devices on the network, and flagging devices that may be vulnerable to attack. If your antivirus or security suite includes this feature, be sure to take advantage of it and learn as much as you can. If you didn't get this feature as part of your protection, consider trying the free Bitdefender Home Scanner.


How Does Antispyware Software Work?

The spyware protection features I've mentioned are important, but they're not the only tools available. I mentioned encrypting your sensitive files. For maximum security, you must also use secure deletion to erase the originals beyond the possibility of forensic recovery. And yes, quite a few antivirus and security suite products offer secure deletion.

If spyware does get a foothold on your PC, it can't hoover up data that isn't there. Many security products can clear traces of your browsing activity, general computer activity, or both. As a bonus, getting rid of unnecessary files can free up disk space and may boost performance.

It's unlikely that a spy would get physical access to your computer and copy sensitive documents to a USB drive. That's something that happens in the movies. But if you have the slightest worry about that possibility, consider choosing a security suite that lets you ban the use of any USB drive that you haven't previously authorized. G Data Total Security, ESET Smart Security Premium, and Avira Prime are among the products that offer this kind of device control.

As I noted earlier, this article focuses on products that employ techniques aimed specifically at different types of spyware. It's not about the best general-purpose security software. In the end, the most powerful tool you can apply to keep yourself safe from spyware is a top-of-the-line antivirus or security suite. These products handle all kinds of malware, including threats much tougher than mere spyware.

Editors’ Note: Based on the increasing censure and criticism of Kaspersky by US government agencies, foreign agencies, and informed third parties, we can no longer recommend Kaspersky’s products. We continue to evaluate these products on their merits and report on them for those who wish to decide for themselves.

Compare SpecsThe Best Antispyware Software for 2024
Our Pick
Editor's Rating
Editors' Choice
4.5 Excellent
Review
4.0 Excellent
Review
Editors' Choice
4.5 Excellent
Review
4.0 Excellent
Review
4.0 Excellent
Review
3.5 Good
Review
Protection Type
Security SuiteSecurity SuiteSpyware ProtectionSecurity SuiteNetwork Security
Hardened Browser
Network Security Scan
Webcam Protection
Keylogger Blocking
Virtual Keyboard
Active Do Not Track
Identity Monitoring

About Neil J. Rubenking

Please enable JavaScript to view the comments.