All reports

04/2025 - 05/2025

Security Evaluation Test Report: macOS Home Anti-Malware

Is Apple’s macOS hack-proof?

This test aims to assess the security built into macOS, the operating system that runs Apple’s desktop and laptop personal computers. We also wanted to evaluate the usefulness and effectiveness of anti-virus (aka endpoint security) on macOS against targeted attacks.

If macOS’ in-built security is sufficiently strong, it might not be technically necessary to use anti-virus. You might be able to rely on the security features built into the operating system.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download [1.57 MB]

If it’s not sufficiently strong then the next question is, “are popular third-party anti-virus solutions good enough to add value?” In other words, do you need anti-virus on a Mac to stop targeted attacks?

We created targeted attacks using common tools available to, and frequently used by attackers in the real world. The testing team then confirmed that these attacks were viable – that they worked against macOS systems with security settings disabled.

Once we had a library of functional attacks we set up two sets of targets. All targets were Mac computers with security settings enabled. We installed anti-virus software on these.

macOS Home Anti-Malware

We chose two popular anti-virus products that frequently appear in reviews. These were Intego Mac Internet Security and TotalAV Antivirus (Free). Both claim to protect against threats in real time, although we’ll see that this claim isn’t always what it appears to be.

Targeted attacks are used to take control of a computer and achieve some aim, such as stealing or damaging data. It is not always necessary for an attacker to retain control (aka persistence) to achieve this goal. So the earlier the anti-virus detects the attack, the better.

How well did macOS protect against the threats? Did the anti-virus products help at all? Read the report above to find out how safe your Mac is.

All reports

06/2025 - 08/2025

Security Evaluation Test Report: Home Anti-Malware (Protection)

Is This Home Report Too Complicated?

Security testing can be easy to explain but hard to execute. Testing can simplify life for organisations needing to buy cyber security products. It helps to create shortlists of competent products worth considering. It can also help explain why security is needed. A good test can demonstrate the sorts of threats real targets face and then show a solution.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download [791.95 KB]

This is Simple?!

But apparent simplicity is often the product of massive complexity. Security products and attacks are very complicated.

This report simplifies an extremely thorough test to make life easier for businesses and individuals that need to buy cyber security protection but without the need to fully understand the nuts and bolts of it.

Proving the Work

We don’t really think most people care about the deep details, but we include them anyway because we’ve put a lot of effort into doing our due diligence for this test report. We’ve been thorough, ticked all the boxes that the industry requires of us, and ticked some extra ones we think are critical.

The standard of our testing is world-leading and we want to prove to you that you can trust this test report – which is why there are explanations and charts for every part of the test. Even for bits you probably don’t care about.

Which solutions to trust?

Effective endpoint protection must do more than respond to known threats. It must adapt quickly, stop attacks early and resist attempts to bypass defences. While no product is perfect, some provide a much higher level of protection than others. This report makes those differences clear.

How we test

We tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real-time.

Choose your reports and reviews carefully

We pride ourselves on a level of transparency that elevates our work above the less open reports available. Don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.

All reports

04/2025 - 06/2025

Security Evaluation Test Report: Home Anti-Malware (Protection)

Marketing vs. Reality

This report focuses on how well popular security products protect home users against real threats. We ran each product through a series of tests designed to reflect the kinds of threats real users face every day.

These include widespread malware attacks and more sophisticated intrusions that do not rely on obvious warning signs. The way we test remains transparent, consistent and publicly documented. We explore anti-malware marketing vs. reality

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download [778.12 KB]

Some of the products offered strong protection with minimal disruption

In this report we included two products that frequently appear at the top of online recommendations for ‘best anti-virus’ and similar. We’ve never tested them before.

Choosing the right security software

Should be evidence-based and not driven by advertising. Independent testing helps cut through the marketing hype and offers a clearer view of which products truly provide effective protection. We explore anti-malware marketing vs. reality.

How we test

We tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real-time.

Choose your reports and reviews carefully

We pride ourselves on a level of transparency that elevates our work above the less open reports available. Don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.

All reports

01/2021 - 03/2021

Home Anti-Malware Protection 2021 Q1

How they sell security (and we buy it)

The world of cyber security sales is unclear at best

Our reports help you choose the best home anti-malware solution. This latest one looks at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).

There aren’t many resources available to help make such buying decisions. Security marketing is fraught with misleading claims. That’s not just our opinion. “Snake oil” is a common refrain among attendees of security conferences and the large companies that buy security to the tune of over one trillion dollars a year.

Choose the best home anti-malware solution

SE Labs is particularly well connected in the security world. It’s partially how we have gained the trust of the security vendors themselves, and their own customers. We sit right in the middle of things, alongside the analysts who help businesses choose which vendors to work with. This is why your favourite reviewers use SE Labs lab data to help them with their anti-virus reviews and other security articles. Very few organisations get to see under the hood of personal security products. We’re here to help, and provide that insight.

We pride ourselves on a level of transparency that elevates our work above the less open reports available. But don’t just take our word for it. This report has gone through the AMTSO certification process to ensure that we say what we’re going to do; do it; and can prove it. Our results help vendors improve their products and buyers choose the best for their own needs.

Read this SE Labs assessment of world-leading endpoint security products and discover how they handle well-known threats and targeted attacks.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download [1.00 MB]

Contact us

Give us a few details about yourself and describe your inquiry. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us