Referrals from our avast! user community help maximize the “free” user base, while many users opt to purchase other avast! home or business security solutions. Notably, nearly two-thirds of avast! users come to us via referrals.



Rest assured with our latest technologies, now available for Mac

For more than two decades, avast! antivirus software has changed the way people think about antivirus. Now we’re changing the way you think about Mac security.

Shield yourself from increasing web-spawned threats

Whereas Macs were more immune to malware threats in the past, now their increasing popularity – i.e. greater market share and particular user demographics – makes them a target for hackers.

Improve your Mac email security

avast! Free Antivirus for Mac scans all your email traffic for viruses and other malware, including any sent as attachments from Windows users, to ensure your Mac stays clean.

Guard your Mac from infected files

Any files you open/execute are scanned in real time, to stop infection before it spreads. And you have the option of determining which files and/or directories you do and don’t want scanned.

Know what’s coming before you click

You knew your Mac’s reputation before you bought it. Now you can know a website’s reputation before you click it. Our new WebRep plugin (supports also Safari™) shows community feedback about websites’ reliability – so you don’t lose time or safety.

Maintain full control of your scanning options

You bought a Mac for its design and functionality, but also because you wanted greater control of what’s happening with your computer. Now you can set preferences for your avast! on-demand scanner.


AVAST is a best for us… FREE ANTIVIRUS



Antivirus or anti-virus software is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, malicious BHOs, hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods.

  • Antivirus kernel based on certified antivirus engine.
  • Resident protection comprising individual modules or “shields”, each of which can be individually configured or disabled:
    • File System Shield — Real-time protection against viruses and other malware threats. Scans files as they run on your computer to keep viruses from being able to execute.
    • Mail Shield  — Scans messages and attachments in E-mail/Microsoft Outlook/Exchange for viruses.
    • Web Shield — HTTP protection (local transparent proxy). Version 4.8 also allows the blocking of URLs. Scans URLs and incoming data for viruses, and aborts connections to the site if one is found.
    • P2P Shield — Scans P2P files from file share programs.
    • IM Shield — Instant Messaging protection. (Scanning of files transferred through instant messaging applications)
    • Script Shield — Scans webpages for malicious scripts, and disables them from infecting your computer, though they can still be used (for example, a clickable button.)
    • Network Shield — Basic protection against well-known network worms. Acts as an Intrusion Detection System.
    • Behavior Shield — Reports suspicious behavior by analyzing the behavior of programs
  • Anti-spyware capabilities
  • Anti-rootkit capabilities (Powered by GMER).
  • Self-Protection — Prevents malware from terminating avast! processes and damaging avast! files.
  • Automatic incremental updates — Updates of both the program and the virus database which is used to identify potential threats — Avast! updates its virus definitions on a regular basis (sometimes multiple updates daily) and this process is automated by default.
  • Audible alarms — Vocal warnings and notices such as “Threat has been detected!” and “Virus database has been updated.”
  • Boot-time scan — Users can schedule a boot-time scan to remove infections that load during Windows startup.
  • Virus Chest — Quarantine; folder where infected files can be stored. The virus chest also stores vital system files to protect them from damage by malware. Users can also add their own files to the virus chest. Once in the chest, a file cannot be executed; double-clicking the file will instead display information about the file.
  • SafeZone — SafeZone is a special web browser in avast! Pro Antivirus 6.x and avast! Internet Security 6.x based on Chromium web browser. It allows users to browse the web in a private, secure environment, invisible to the rest of the users’ system.
  • WebRep browser plugin — WebRep is a community-based website reputation ratings tool implemented in version 6.0 of Avast! Antivirus.[10]
  • Avast! antivirus monitor— Avast! antivirus monitor is a sidebar gadget for Windows 7 and Windows Vista. It comes with Avast! Antivirus 6 and 7.
  • Consumer Alert – Gives the user information if their credit may have been tampered with (US Customers Only)
  • AVAST cloud — Avast! 7 introduces streaming updates from the cloud in addition to daily virus database updates. Throughout the day, AVAST streams updates to users, giving them faster warnings about new malware. This supplements regular virus updates, keeping users informed and protected regardless of their internet connection.
  • FileRep – The FileRep feature enables faster threat identification by sorting new, potentially dangerous files from known safe files. Sourced from the CommunityIQ sensor network, the data helps avast! decide when questionable files should be placed in the AutoSandbox.
  • Remote Assistance — An avast! user can connect to the computer of a second avast! user, allowing the “helper-friend” to help with any computer issues.

A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.

No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer’s performance. Inexperienced users may also have problems understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives.Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.

A comparison of the three products can be found below.

Free Antivirus Pro Antivirus Internet Security
Antivirus and anti-spyware engine Yes Yes Yes
Anti-rootkit protection Yes Yes Yes
File System/Mail Shield Yes Yes Yes
Web Shield Yes Yes Yes
IM/P2P Shield Yes Yes Yes
Network Shield Yes Yes Yes
Behavior Shield Yes Yes Yes
Script Shield Yes Yes Yes
AVAST cloud Yes Yes Yes
FileRep & WebRep Yes Yes Yes
Remote Assistance Yes Yes Yes
AutoSandbox Yes Yes Yes
Sandbox No Yes Yes
SafeZone No Yes Yes
Command-Line Scanner No Yes Yes
Silent Firewall No No Yes
Antispam No No Yes