Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/16/2016
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

AV-Comparatives Sixth International IT Security Survey Results Released

Tuesday, February 16, 2016 – Innsbruck-based testing lab AV-Comparatives has released the results of its 2016 survey of worldwide computer users’ preferences and requirements for operating systems, browsers and security products.

Between 7th and 21st December 2015, AV-Comparatives asked computer users to answer questions about their preferred software and security requirements. 

Respondents came from all over the globe. As was the case last year, about half came from Europe, and a fifth North America, with the USA having the most participants from any one country (16.7%).

Over 70% of participating users described themselves as computer enthusiasts or professionals. Getting on for half of all respondents already use Windows 10, and over three quarters prefer either Google Chrome or Mozilla Firefox to a Microsoft browser.  

Android remained the most popular mobile OS amongst those taking part, accounting for over two thirds of users. Over two thirds of the users surveyed deploy a mobile anti-malware program, with Avast being the most popular solution worldwide.

With regard to desktop security programs, over 60% of respondents pay for their protection (up from last year). The top 5 products overall (Kaspersky Lab, ESET, Bitdefender, AVIRA and Avast) remain the same, although AVIRA and Avast swap places. Not surprisingly, these 5 products also represent the products that survey respondents would most like to see in our tests.

As was the case last year, over a third of users stated that their security program had successfully protected them against a threat within the last week, whilst 50% said their antimalware solution had never failed to protect them. Again, this indicates that the chance of encountering malware is high, but that good security software will provide effective protection against it.

AV-Comparatives’ Real-World Protection Test was seen as most relevant by respondents, with over 80% regarding it as most interesting to them. This was followed by the File Detection test (over 70%), and Performance (just under 66%). All three of these tests are obligatory in Our Main Test Series.  The results indicate that readers value the variety of tests performed, without relying too heavily on one single test type.

When it comes to reliable and trustworthy sources of information on security products, respondents rated all the German and English-language computer magazines at between 3 and 4 (5 being the top score), while reviews on forums and YouTube were seen as less reliable (under 3). 

Once again we were delighted to be chosen by respondents as the most reliable and trustworthy testing lab (4.7), while AV-Test and Virus Bulletin also scored received scores of 4 or above.

We are grateful to everyone who took part in the survey, and will use the results to help refine and perfect our tests and reviews in 2016.


About AV-Comparatives

AV-Comparatives is an independent organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises. Using one of the largest sample collections worldwide, it creates a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organizations and scientific institutions. Certification by AV-Comparatives provides an official seal of approval for software performance which is globally recognized.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Tell him only Kevin Mitnick and the President know the launch codes.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...