Trend Micro Anti-Spyware 3.5 review

Some neat features and decent performance

TechRadar Verdict

Solid protection and detection with a few niggles

Pros

  • +

    Some excellent add-ons

Cons

  • -

    Doesn't automatically update on first scan

Why you can trust TechRadar We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

Trend Micro Anti-Spyware 3.5 is the latest version of the program originally born of the once popular Intermute Spy Subtract product.

Boasting a simple, clean interface and solid real-time protection facilities, the program offers a number of cool add-ons and features that help in the fight against spyware threats. CWShredder, which was acquired by Trend Micro last year, is now integrated into the product to help remove CoolWebSearch variants.

The installation on our infected test system went off well, but a caveat to anyone using the product: the Trend Micro Anti-Spyware website makes a point of how the program updates itself frequently and automatically, but don't let this fool you.

The program doesn't update itself automatically during the installation process, nor are you prompted to update when you run the program for the first time. It was only after a little digging around that we noticed that our definition files were more than eight months out of date. A manual update remedied the issue, but it's worth noting, especially before scanning for the first time.

Trend Micro Anti-Spyware 3.5 made quick work of performing a full system scan, completing the process is just under 15 minutes - easily among the fastest of the programs around. The results of the scan were better than most, but not perfect by any stretch.

While the program did manage to detect and remove both keyloggers and our DNS issue, it left our browser hijack intact and missed some adware remnants. We were prompted to restart our system after opting to remove the threats, and found no traces on subsequent scans.

Black and white lists

Trend Micro Anti-Spyware 3.5 also includes both black list and white list facilities, enabling you to designate how detected items should be treated on future scans.

We assumed that we could add previously detected threats to our blacklist, but discovered that these must be added via a manual step prior to removal. Automatic additions to the blacklist based on scanning results would be a much better option.

Venus Spy Trap (the program's real-time protection facility) monitors everything from startup entries to hosts file changes, to file system changes for potential threats, and does a great job of it.

Trend Micro Anti-Spyware also enables a trickle scan feature by default, adjusting CPU usage while scanning to allow other processes to keep working. If you're the type who likes to scan and work simultaneously, this is a great bonus.

As for extras, Trend Micro Anti-Spyware 3.5 includes a built-in file shredder and a one-click privacy cleanup button to help you eliminate details such as browsing history, cookies and so forth.

Unlike many other programs, this version not only supports scheduled scanning, but also set up a scheduled scan job to occur once a week by default. Should help be required, online FAQs and UK-based phone support come to the rescue.

Unfortunately, there's no support for Windows Vista just yet, so only XP and Windows 2000 users need apply.

Tech.co.uk was the former name of TechRadar.com. Its staff were at the forefront of the digital publishing revolution, and spearheaded the move to bring consumer technology journalism to its natural home – online. Many of the current TechRadar staff started life a Tech.co.uk staff writer, covering everything from the emerging smartphone market to the evolving market of personal computers. Think of it as the building blocks of the TechRadar you love today. 

Latest in Security
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
Latest in Reviews
Zyxel FWA510 main image
I tried the Zyxel FWA510 - read what I thought of this WiFi router
Sophos AP6 420E main image
I tested the Sophos AP6 420E - see how this access point debut from Sophos works out
Viltrox 135mm F1.8 Lab lens for Nikon Z-mount, in the hand, attached to a Nikon Z6 II
I tried the stunning Viltrox 135mm f/1.8 LAB lens for Nikon and it’s my new favorite portrait lens, except for one drawback
Hello from the XPPen Magic Note Pad
The XPPen Magic Note Pad is the drawing tablet-maker's first digital writing tablet and after just two weeks, I can't do without it
Scan 3XS GWP TR Ada main image
I tested the Scan 3XS GWP TR Ada - see what I thought of this incredibly powerful workstation
Poly Studio X52 with TC10 main image
I tested the Poly Studio X52 with TC10 - see what I thought of this conferencing solution