Antivirus

G Data Antivirus

Most big-name antivirus companies like to boast about their years of experience, but few can match G Data in this respect. Not only has the German developer been around for more than 30 years, it also claims to have developed the first antivirus program way back in 1985.Fast forward to today and G Data has…


Most big-name antivirus companies like to boast about their years of experience, but few can match G Data in this respect. Not only has the German developer been around for more than 30 years, it also claims to have developed the first antivirus program way back in 1985.

Fast forward to today and G Data has highly-rated consumer security products for Windows, Android and Mac, as well as some very comprehensive endpoint solutions for businesses.

The range starts with G Data Antivirus which we are reviewing here. Despite being the baseline product, it goes beyond the usual PC antivirus fundamentals, with exploit protection, anti-ransomware, URL filtering, a spam filter, and specialist browser hardening to help secure online banking and shopping.

  • You can sign up for G Data Antivirus here

The program uses multiple technologies to keep you safe, including its own engine, the Bitdefender engine, and a CYREN-based layer to better detect outbreaks as they happen.

Single device licenses are top of the normal range at £30 ($39) for a year. Top packages like Bitdefender Antivirus Plus are the same price, but many come in cheaper, and for example Kaspersky Anti-Virus costs £25 ($32.50) to cover one device for a year. 

There are savings available if you’re adding computers or extending the license term, so for example a five PC, two-year license costs only £95 ($123.50). But other vendors do much the same, and covering those devices with Kaspersky Anti-Virus would cost just £80 ($104).

A free trial is available, and there’s the added security of a 30-day money-back guarantee if you run into problems.

G Data Antivirus

Setup

The G Data Antivirus trial was simple to find and download. The installer took a while to download the setup components it needs, but after that everything ran smoothly, with no hassles or complications.

As with many competitors, G Data asks you to register the program by providing your name and email address. The installer also asks for your physical address and phone number, but providing them is optional, and we were able to leave those boxes blank.

Moments after the main setup process was complete, a pop-up window recommended we install G Data WebProtection, a Chrome extension which prevents you accessing phishing, scam and malicious sites. We would much prefer this to be handled at the network level to ensure it covers all browsers and applications, but G Data claims this improves accuracy (we’re unsure how).

Rebooting, we found G Data had added 600MB of code to our hard drive and no less than seven new background processes. They typically consumed a minimal 250MB, but when our system was under load, it did seem to be noticeably slower than usual. We didn’t try to come up with an objective measurement of G

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Researchers warn Microsoft Defender vulnerability is already being exploited

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…
Read More

Continue Reading
Antivirus

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …
Read More

Continue Reading
Antivirus

Stop falling for scams when Norton’s antivirus software is 70% off right now

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…
Read More

Continue Reading
Antivirus

New “Zombie ZIP” attack can evade most antivirus scanners

Known as Zombie ZIP, the method hides malware inside a deliberately malformed compressed archive. According to its creators, most antivirus engines currently fail to detect the threat, potentially giving attackers a new delivery mechanism. At the same time, some researchers argue the technique is less a vulnerability and more a…Read Entire Article…

Known as Zombie ZIP, the method hides malware inside a deliberately malformed compressed archive. According to its creators, most antivirus engines currently fail to detect the threat, potentially giving attackers a new delivery mechanism. At the same time, some researchers argue the technique is less a vulnerability and more a…Read Entire Article…
Read More

Continue Reading