Antivirus

G Data Antivirus

Most big-name antivirus companies like to boast about their years of experience, but few can match G Data in this respect. Not only has the German developer been around for more than 30 years, it also claims to have developed the first antivirus program way back in 1985.Fast forward to today and G Data has…


Most big-name antivirus companies like to boast about their years of experience, but few can match G Data in this respect. Not only has the German developer been around for more than 30 years, it also claims to have developed the first antivirus program way back in 1985.

Fast forward to today and G Data has highly-rated consumer security products for Windows, Android and Mac, as well as some very comprehensive endpoint solutions for businesses.

The range starts with G Data Antivirus which we are reviewing here. Despite being the baseline product, it goes beyond the usual PC antivirus fundamentals, with exploit protection, anti-ransomware, URL filtering, a spam filter, and specialist browser hardening to help secure online banking and shopping.

  • You can sign up for G Data Antivirus here

The program uses multiple technologies to keep you safe, including its own engine, the Bitdefender engine, and a CYREN-based layer to better detect outbreaks as they happen.

Single device licenses are top of the normal range at £30 ($39) for a year. Top packages like Bitdefender Antivirus Plus are the same price, but many come in cheaper, and for example Kaspersky Anti-Virus costs £25 ($32.50) to cover one device for a year. 

There are savings available if you’re adding computers or extending the license term, so for example a five PC, two-year license costs only £95 ($123.50). But other vendors do much the same, and covering those devices with Kaspersky Anti-Virus would cost just £80 ($104).

A free trial is available, and there’s the added security of a 30-day money-back guarantee if you run into problems.

G Data Antivirus

Setup

The G Data Antivirus trial was simple to find and download. The installer took a while to download the setup components it needs, but after that everything ran smoothly, with no hassles or complications.

As with many competitors, G Data asks you to register the program by providing your name and email address. The installer also asks for your physical address and phone number, but providing them is optional, and we were able to leave those boxes blank.

Moments after the main setup process was complete, a pop-up window recommended we install G Data WebProtection, a Chrome extension which prevents you accessing phishing, scam and malicious sites. We would much prefer this to be handled at the network level to ensure it covers all browsers and applications, but G Data claims this improves accuracy (we’re unsure how).

Rebooting, we found G Data had added 600MB of code to our hard drive and no less than seven new background processes. They typically consumed a minimal 250MB, but when our system was under load, it did seem to be noticeably slower than usual. We didn’t try to come up with an objective measurement of G

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading
Antivirus

The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
Read More

Continue Reading
Antivirus

Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading