March 26, 2025 | Awards
Every day, cybersecurity products deliver monitoring and protection services reliably in the background, unnoticed by many end users and company employees. The renowned AV-TEST Institute has been...
March 26, 2025 | Awards
Every day, cybersecurity products deliver monitoring and protection services reliably in the background, unnoticed by many end users and company employees. The renowned AV-TEST Institute has been...
March 19, 2025 | Research
Throughout 2024, our team diligently collected and analyzed data on cyber incidents across Europe, with a particular focus on geopolitical hotspots and regional trends. The annual review of 2024 in...
February 13, 2025 | Antivirus for Windows
In 2024, there was a steady flow of IT security news reporting on how ransomware and info stealers attacked PCs and servers, and encrypted or extracted data. No matter how they ensued, they always...
January 17, 2025 | Antivirus for Windows
The Advanced Threat Protection (ATP) test goes considerably farther than traditional tests: It evaluates security products in 10 realistic scenarios involving ransomware and info stealers, which...
December 10, 2024 | Antivirus for macOS
Our test lab subjected 14 protection products for consumers and corporate users to hundreds of extremely dangerous MacOS malware attacks on systems running Sonoma 14.6. The lab put all the security...
November 20, 2024 | Antivirus for Windows
Cyber attackers are constantly tweaking new attack techniques, honing existing ones or combining them into an attack wave. In the latest Advanced Threat Protection test (ATP), the experts from AV-TEST...
November 19, 2024 | Commissioned tests, VPN tests
In September/October 2024, AV-TEST performed a comparison test of ExpressVPN, IPVanish VPN, Mullvad VPN, NordVPN and Proton VPN. The test focused on their additional capabilities of blocking malicious...
November 07, 2024 | Antivirus for Windows
Many consumer users don't see themselves as being in the crosshairs of cybergangsters. A major fallacy: because attackers are constantly foraging for interesting data, passwords or e-mail log-in...