Do you still need to pay for antivirus software in 2024?

Last month, the United States Department of Commerce announced a ban on Kaspersky software.
As of September 29, ZDNET's Lance Whitney reported, Kaspersky will no longer be able to provide antivirus signature updates and code updates for the banned products to customers in the United States.
Apparently people do, but good luck finding reliable information on the market for antivirus software in 2024.
Most of the data I was able to uncover came courtesy of the developers of said software, which is not the most reliable source.
That survey says roughly 54% of Americans use the default virus protection that comes with the device they're using, while 46% use third-party antivirus programs.
Of those people who go to the trouble of installing extra protection, only a little more than half pay for the privilege.
Older Americans are significantly more likely to use third-party antivirus programs and pay for the software.
That demographic is also more likely to still pay for a landline, and the chances you'll get stuck behind an over-65 person who's writing a check at the grocery store are, by my estimation, about a million times higher than the odds you'll experience the same thing with a person under 45.
Full disclosure here: I'm in the over-65 demographic, with a full head of gray hair, and I haven't used third-party antivirus software in decades.
Regardless of which device category we're talking about here, you're likely to be just fine with the default protection that's included as part of the platform.
The leveling-up process started about seven years ago, and the Microsoft solution has regularly scored between 99% and 100% since then, making it every bit as effective as third-party rivals, free or paid.
Recent test results show that Microsoft Defender is effective at blocking all of the most popular attack vectors for ransomware and info stealers.
On average, a modern antivirus app blocks 99.2% of the very few incoming threats that get past the other layers of protection.
Most of those attacks are launched by sophisticated criminal gangs and are aimed at businesses, using vulnerabilities that are more likely to be in third-party software than they are in the OS itself.
Russian hackers used SolarWinds management software to hack Microsoft and other high-value targets.
A widely used app called MOVEit, from Progress Software, was exploited in a breach that affected thousands of big companies and government agencies last year, and there's a brand-new vulnerability that has just been reported.
A signature-based antivirus app isn't going to provide protection against those targeted attacks.
Instead, IT departments in large organizations need sophisticated network-based software that allows administrators to monitor for signs of an intrusion in real time.
Small fry users are reasonably well protected via default security measures, mostly because determined attackers see no financial benefit in picking on such puny victims.
If you're still paying Norton, McAfee, or Kaspersky for antivirus protection on your home PC, maybe it's time to let that subscription expire.


This Cyber News was published on www.zdnet.com. Publication date: Mon, 01 Jul 2024 15:10:05 +0000


Cyber News related to Do you still need to pay for antivirus software in 2024?

Do you still need to pay for antivirus software in 2024? - Last month, the United States Department of Commerce announced a ban on Kaspersky software. As of September 29, ZDNET's Lance Whitney reported, Kaspersky will no longer be able to provide antivirus signature updates and code updates for the banned ...
3 days ago Zdnet.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Do you need antivirus on Linux? - I've been using Linux as my primary operating system since 1997 and I have never installed a desktop antivirus solution on any computer. The only exception to that rule has been when I deploy a Linux mail or file server, where I might add something ...
4 months ago Zdnet.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
GitHub code-signing certificates stolen - Another day, another access-token-based database breach. This time, the victim is Microsoft's GitHub business. On December 6, 2022, repositories from our atom, desktop, and other deprecated GitHub-owned organizations were cloned by a compromised ...
1 year ago Nakedsecurity.sophos.com
Less is more: Conquer your digital clutter before it conquers you - In case you missed it, last week was Data Privacy Week, an awareness campaign to remind everybody that any of our online activities creates a trail of data and that we need to better manage our personal information online. Increasingly, we live our ...
1 year ago Welivesecurity.com
Cyber Security Managed Services 101 - Benefits of an MSP. Maximizing efficiency. Cyber threats and cyberattacks like ransomware targeting SMBs continue to increase in part because malicious actors realize these organizations don't have the means or manpower for security teams. Even ...
1 year ago Trendmicro.com
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
Fake Antivirus Websites Delivering Windows & Android Malware - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Cybersecuritynews.com
Encrypted mail service still okay with giving PII to cops The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
SpiderOak's datacenter upgrade is still borking backups The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
Scattered Spider: Evolving & Resilient Group Proves Need for Constant Defender Vigilance - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Hackread.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
2 months ago Pandasecurity.com
YouTube Channels Hacked to Spread Lumma Stealer via Cracked Software - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
5 months ago Hackread.com
Texas School Safety Software Data Leak Endangers Student Safety - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Hackread.com
30+ Tesla Cars Hacked Globally Using Third-Party Software - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Cybersecuritynews.com
Securing Your Software Development in Compliance with CISA: How OX Security Simplifies the Process - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Securityboulevard.com
Cisco and Megaport Simplify Cloud Networking with Pay-As-You-Go Model - In the ever-evolving world of digital connectivity, Cisco continues to pave the way with innovative solutions not just centered around technological advances, but also around how those advances can easily be consumed by customers. Integrating Cisco ...
4 months ago Feedpress.me
Cybersecurity Predictions And Challenges in 2024 - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackersonlineclub.com
Microsoft's February 2024 Patch Tuesday Addresses 2 Zero-Days and 73 Vulnerabilities - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Securityboulevard.com
Ex-White House election threat hunter on 2024 challenges The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
16-29 February 2024 Cyber Attacks Timeline - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Hackmageddon.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)