Guide 8 min read

How to Safely Download Software and Apps: A Comprehensive Guide

How to Safely Download Software and Apps

Downloading software and applications is a common activity, but it also presents significant security risks. Malicious actors often disguise malware as legitimate software, making it crucial to exercise caution. This comprehensive guide will walk you through the essential steps to ensure you download software and apps safely, protecting your devices and data from harm. Let's dive in, starting with where you should be sourcing your downloads.

1. Identifying Reputable Download Sources

The first and most crucial step in safe downloading is choosing trustworthy sources. Not all websites offering software are created equal. Some are deliberately designed to distribute malware. Here's how to identify reputable sources:

Official Websites

The safest place to download software is directly from the developer's official website. For example, if you want to download VLC media player, go to videolan.org. Official sites are the most likely to offer clean, unaltered versions of the software. Be sure to double-check the URL in your browser to ensure you haven't been redirected to a look-alike domain. Scammers often use URLs that are very similar to legitimate ones.

App Stores

For mobile apps, stick to official app stores like the Google Play Store for Android and the Apple App Store for iOS. These stores have review processes in place (though not perfect) that help to filter out malicious apps. While malware can still slip through, it's far less common than on unofficial app stores or third-party download sites.

Established Download Sites

Certain download sites have built a reputation for providing safe downloads over many years. Examples include Downloads (of course!), Softpedia, and MajorGeeks. These sites typically scan software for malware before making it available. However, it's still wise to exercise caution, as even reputable sites can occasionally be compromised or inadvertently host malicious software. Always read user reviews and check for any red flags before downloading.

Avoiding Suspicious Sources

Be wary of websites that:

Offer software for free that usually costs money. This is a common tactic used to lure unsuspecting users into downloading malware.
Have a poor design or contain numerous spelling and grammatical errors. These are often signs of unprofessionalism and potential scams.
Use aggressive advertising or pop-up windows. Legitimate software providers rarely rely on such tactics.
Lack contact information or a clear privacy policy. Transparency is essential for building trust.

2. Checking for Digital Signatures

A digital signature is an electronic stamp of approval that verifies the software's authenticity and integrity. It confirms that the software comes from the claimed developer and hasn't been tampered with since it was signed. Checking for digital signatures is a crucial step in ensuring the safety of your downloads.

How Digital Signatures Work

Software developers use cryptographic keys to digitally sign their software. This signature is embedded within the software file. When you download the software, your operating system can verify the signature against the developer's public key. If the signature is valid, it confirms that the software is genuine and hasn't been altered.

Checking Digital Signatures on Windows


  • Right-click on the downloaded file (e.g., an .exe or .msi file).

  • Select "Properties".

  • Go to the "Digital Signatures" tab. If the file is digitally signed, you'll see a list of signatures.

  • Select a signature and click "Details" to view more information about the signer and the signature's validity.

A valid signature will state that the digital signature is OK. If you see a warning or error message, it indicates that the signature is invalid, and you should not run the software.

Checking Digital Signatures on macOS

macOS automatically checks digital signatures when you try to open an application. If the application is not signed or the signature is invalid, macOS will display a warning message. You can also manually check the signature by:

  • Right-clicking on the application in Finder and selecting "Open".

  • If the application is not signed, macOS will display a warning message stating that it cannot verify the developer.

What to Do if There's No Signature

If a software file lacks a digital signature, it doesn't automatically mean it's malicious, but it does increase the risk. Exercise extra caution and consider downloading the software from a different source or contacting the developer to inquire about the lack of a signature. You can learn more about Downloads and how we verify software.

3. Scanning Downloads for Viruses and Malware

Even if you download software from a reputable source, it's always a good idea to scan it for viruses and malware before running it. This adds an extra layer of protection and can catch any threats that may have slipped through the cracks.

Using Antivirus Software

Install a reputable antivirus programme on your computer and keep it up to date. Most antivirus programmes offer real-time scanning, which automatically scans files as you download them. You can also manually scan downloaded files by right-clicking on them and selecting the "Scan" option from your antivirus programme's context menu.

Online Virus Scanners

If you don't have an antivirus programme installed, or if you want a second opinion, you can use online virus scanners like VirusTotal. VirusTotal allows you to upload files and scan them with multiple antivirus engines simultaneously. This can provide a more comprehensive assessment of the file's safety.

Interpreting Scan Results

If the scan results come back clean, it's a good sign, but it doesn't guarantee that the software is completely safe. Some malware is designed to evade detection. If the scan results indicate that the file is infected, delete it immediately and do not run it.

4. Understanding Software Permissions

Before installing any software, carefully review the permissions it requests. Software permissions determine what the application can access on your device, such as your contacts, location, camera, microphone, and files. Understanding these permissions is crucial for protecting your privacy and security.

Permissions on Mobile Devices

On mobile devices, apps typically request permissions when you first install them or when they need to access a specific feature. Pay close attention to these requests and only grant permissions that are necessary for the app to function properly. For example, a photo editing app may need access to your photos, but it shouldn't need access to your contacts.

Permissions on Desktop Computers

On desktop computers, software permissions are often less explicit, but it's still important to be aware of what the software can do. Read the software's privacy policy and terms of service to understand how it collects, uses, and shares your data. Be wary of software that requests excessive permissions or collects data that is not relevant to its functionality.

Least Privilege Principle

Apply the principle of least privilege, which means granting software only the minimum permissions it needs to function. If an app requests permissions that seem excessive or unnecessary, consider uninstalling it or finding an alternative app that respects your privacy.

5. Secure Installation Practices

The installation process itself can also pose security risks. Here are some secure installation practices to follow:

Custom Installation

When installing software, choose the "Custom" or "Advanced" installation option whenever possible. This allows you to review and modify the installation settings, such as the installation directory and any optional components. Avoid using the "Express" or "Typical" installation option, as it may install unwanted software or change your system settings without your consent.

Uncheck Bundled Software

Many software installers include bundled software, such as toolbars, browser extensions, or other applications. These bundled programmes are often unnecessary and can be annoying or even malicious. Carefully review each step of the installation process and uncheck any boxes that offer to install bundled software. Be especially careful to read the fine print, as some installers may try to trick you into installing unwanted software.

Disable Unnecessary Features

After installing software, review its settings and disable any unnecessary features that could pose a security risk. For example, you may want to disable automatic updates, remote access, or data collection features. Consult the software's documentation or frequently asked questions for instructions on how to disable these features.

6. What to Do if You Suspect Malware

If you suspect that your computer has been infected with malware, take the following steps immediately:

  • Disconnect from the Internet: This will prevent the malware from spreading to other devices on your network or sending your data to attackers.

  • Run a Full System Scan: Use your antivirus programme to perform a full system scan. This will scan all files on your computer for malware.

  • Remove Detected Threats: If the scan detects any threats, follow your antivirus programme's instructions to remove them.

  • Change Your Passwords: Change the passwords for all of your online accounts, especially your email, banking, and social media accounts. Use strong, unique passwords for each account.

  • Monitor Your Accounts: Keep a close eye on your bank accounts and credit card statements for any unauthorized transactions.

  • Seek Professional Help: If you are unable to remove the malware yourself, or if you suspect that your computer has been severely compromised, seek professional help from a computer security expert. They can help you remove the malware and restore your system to a safe state.

By following these guidelines, you can significantly reduce the risk of downloading malware and protect your devices and data from harm. Remember to always exercise caution and be vigilant when downloading software and apps. When choosing a provider, consider what we offer and how it aligns with your needs.

Related Articles

Tips • 3 min

Managing Your Download History: Organisation and Security

Comparison • 3 min

Australian Internet Providers: Comparing Download Speeds and Reliability

Overview • 8 min

Downloading and the Law in Australia: Copyright and Legal Considerations

Want to own Downloads?

This premium domain is available for purchase.

Make an Offer