G-Data 2015 >> Official Thread

Discussion in 'other anti-virus software' started by Frank the Perv, Jan 13, 2015.

  1. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA
    A few more details of the Stiftung Warentest test are out.

    It Appears that 17 AVs were tested. But unless you pay the the results, we won't know the exact rankings.

    From a translation:

    17 anti-virus programs in the tested against malicious attacks: This security software helps protect you best

    Whether viruses, trojans or other malware.Today, consumers have to constantly worry about attacks from the outside.The correct antivirus software considers the damage but within limits.Stiftung Warentest tested 17 security packages and its winner found.

    Once visited the wrong website or opened the wrong e-mail attachment and already is a dangerous virus on the computer.Or even worse, a Crypto Locker is spreading on the computer and locks the PC.For an alleged blackmailer exemption require up to 700 Euros.

    17 antivirus packages in the test
    In order to be prepared for attacks, a good anti-virus software is recommended.The Stiftung Warentesth as tested 17 security packages from different providers, including two free ones.The testers have intentionally exposed to contaminated computer disks, email attachments, and web pages.

    G-DATA is the test winner
    This ordeal was over best "G DATA Internet Security 2015 ".The software was commissioned by the Stiftung Warentest the final grade 1.8, the virus itself is rated 1.4. Another advantage is the quick update of the virus signature.

    http://www.focus.de/digital/interne...ftware-schuetzt-sie-am-besten_id_4572854.html


    A couple of other test notes:

    -They like Avira Free... sort of.
    -They don't like what Bitdefender uninstalled
    -They don't like what Norton installed
    -They think you should stay sicher my friends


    That is all.

    -Frank
     
  2. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA

    That's annoying.

    ~ Removed Off Topic Remarks~

    -Frank
     
    Last edited by a moderator: Mar 29, 2015
  3. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    I suppose you can download the original international multilingual installer from the German site or one of the English sites, using your G Data access data (user name and password).
     
  4. Joxx

    Joxx Registered Member

    Joined:
    Sep 5, 2012
    Posts:
    1,718
    A German website ranking two German products at the top, fortunately they're independent.
     
  5. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA
    Yeah, I noticed that too.

    I would hope the publication would be above that.

    I don't know anything about Stiftung Warentest, but I would guess it is German based but European in audience.

    But I dunno.

    =================

    In other news, G-Data is fighting the Zombie Botnet Apocalypse.

    We suspect that the infected systems are intended for use as zombie PCs in the Andromeda/Gamarue botnet.

    http://www.tweaktown.com/news/44291...cs-zombies-expanding-global-botnet/index.html
     
    Last edited by a moderator: Mar 29, 2015
  6. coolcfan

    coolcfan Registered Member

    Joined:
    Nov 1, 2008
    Posts:
    130
    The customer support replied "these features need to be tested carefully locally before being added (to the chinese version)".
    Maybe these feature can cause trouble for some widely used softwares. Actually users have reported issues with G-Data and LoL (a online game with Tencent's game hack protector).

    Some say the product keys of chinese version can't be used on international version. I didn't try it. Knowing these, I bought a license for something else for my home computer yesterday. But I'll still watch this product.
     
  7. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA
    Important G-Data news.

    Carlos Lijphart is leaving the G-Data Netherlands operation.

    There is a rumor that our own Stupendous Man = Carlos Lijphart.

    As Stupendous moves up in the world, hopefully he will not forget us here at Wilders.


    ===============
    Carlos G DATA Netherlands Lijphart leave and start their own business

    http://dutchitchannel.nl/526470?field=Binary1&width=712&maxheight=260
    Share this post

    Carlos Lijphart, Sales & Marketing Manager at G DATA Netherlands, the company is going will be leaving after 7.5 years. Carlos will start their own business and thus have no time for his role in G DATA.However, he will continue working on the sale of G DATA keep his new company, though he will not limit themselves to this.

    Carlos Lijphart has spent the past 12 years in IT sales worked in the service of employers and is ready for the challenge of entrepreneurship. He says: "The Consumer Electronics Market is the part of the industry that appeals to me most. The continuous innovations and the associated challenges of practical things like battery life to the security of data everywhere and nowhere by increased mobility, are fascinating. I would just like to own something in business and the switch are on the one hand between supplier and reseller on the other. "

    Jan Van Haver, who Carlos took 7.5 years ago and currently Director Strategic Projects is at G DATA, Carlos is thankful for his efforts over the years: "Carlos has been a major force for G DATA in the Netherlands. Especially in the early period, when G DATA only just had entered the Dutch market, Carlos has done everything to put G DATA on the map, while it was not always easy. G DATA will always be grateful to him for that. "

    Dirk Cools, current Country Manager Benelux G DATA says about Carlos: "The enthusiasm and positive energy of Carlos contagious. We are therefore pleased that we also after his departure from G DATA still regularly with him will be in touch. We wish him every success in his new venture and look forward to working together. "

    Carlos Lijphart occurs today officially out of service. He will be holding for the first time present at the ICT Trade Day in Utrecht.

    http://dutchitchannel.nl/526470/car...ata-nederland-en-start-eigen-onderneming.html
     
  8. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    Well, that's the thing with rumors, often, they tend not to be true.
    I can tell you, Stupendous Man ≠ Carlos Lijphart.
    I am rather sure about that.

    Besides of the times that I'm walking up the stairs or I'm in an elevator, I'm not so much moving up, but I'm rather going in circles.
    So I'm definitely going nowhere, don't you worry a bit.
     
  9. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA
    Ok, well we can all rest easier. We will officially delay the Full Scale Panic.


    Are you REALLY sure? If you open the picture of Carlos Lijphart on your laptop--
    http://dutchitchannel.nl/526470?field=Binary1&width=712&maxheight=260
    ... and then hold it by the mirror, now look back and forth between your mirror reflection and the picture. Do they look alike?

    Ok, enough about that important (although not critical) topic. Off to the next important topic.

    +++++++++++++++++++++++++++++++++

    Summary: Your anti-malware system does you no good if it's successfully compromised. Few security suites use ASLR and DEP in all their executables.

    The main techniques are DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization). DEP protects against many buffer overflow exploits, usually by using CPU features to mark certain areas of memory as not executable. ASLR protects against attempts to execute privileged code at known locations in memory by randomly locating executable code at load time.

    Among the consumer products AV-Test checked, only Eset Smart Security 8 marked 100 percent of executables for both DEP and ASLR, although both Avira Antivirus Pro and Norton Security were over 99 percent and eight more products were above 90 percent. Among the eight business endpoint security solutions examined by AV-Test, only Symantec Endpoint Protection was at 100 percent, with G Data AntiVirus Business close behind. Many products have a shockingly low percentage of protected executables, such as Trend Micro OfficeScan's 18.7 percent and eScan IS's 17.5 percent.

    Conceptually, malware and vulnerability exploits are different beasts although, according to Pedro Bustamante, director of Special Projects at Malwarebytes, about 60 percent of new malware is now coming from exploits, mainly of Internet Explorer, Flash and Silverlight, delivered through common exploit kits. The alternative is generally social engineering, i.e. to trick the user into executing a program.

    ---

    Ok, so the higher the percentage of DEP & ASLR, the more your solution can protect itself.

    In this regard, G-Data has us well covered. While not the best, coming in at 97%+ is pretty darn good. Look how far down the list DQ is..

    av-test.jpg


    You're Welcome.

    Stay Sicher My Friends.


    -Frank
     
    Last edited: Apr 4, 2015
  10. Frank the Perv

    Frank the Perv Banned

    Joined:
    Dec 16, 2005
    Posts:
    882
    Location:
    Virginia, USA

    Mobile banking has become the preferred target for cybercriminals
    The attacks against users of online banking continue to grow, explains Christian Geschkat, product manager of mobile solutions G DATA. Smartphones and tablets are used every day for banking queries, transactions or purchases online and, unfortunately, cybercriminals continue to develop malware specialized in stealing this data type.

    According to G DATA, 2015 will be a year in which more specifically grow malware designed to steal banking and financial data and cyber criminals rely on apps or manipulated false bank to get them. Analyze the 'apps' downloaded an antivirus will, according to analysts at the firm, increasingly necessary. The greatest source of danger are the alternatives stores 'apps' as they are the most common for malware distribution path. G DATA experts have discovered that the most dangerous the Russian and Chinese origin (where, in Occasionally, one in four 'apps' entails a danger to the user).

    In addition to mobile banking, G DATA experts recommend special caution with adware Superfish , which so far has focused only on computers. This virus has been shown that the SSL encryption may be ineffective and that cybercriminals can use it to spy on sensitive data.

    http://www.europapress.es/portaltic...preferido-cibercriminales-20150406155433.html


    The new versions G Data combine features to combat online banking fraud and malicious code, including an anti exploit module, present in all versions. Over 90% of computer attacks that reach your goal enjoying the shortcomings of outdated computer programs maintained by users.

    The update also includes strengthening of keyloggers protection, known as keyboard tracking. These malicious programs specialize in obtaining banking credentials and passwords.

    http://www.segs.com.br/info-e-ti/36...a-linha-de-solucoes-de-seguranca-digital.html


    Stay Sicher My Friends.


    -Frank
     
  11. Pat MacKnife

    Pat MacKnife Registered Member

    Joined:
    Mar 31, 2014
    Posts:
    620
    Location:
    Belgium
    Keep in mind this article is written on the first of april, thats aprils foolday :) so it could be false alarm....
     
  12. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    Well, keep in mind that Stupendous Man was not mentioned at all, in the Carlos Lijphart article.
    And Frank the Perv's post was Friday April 3rd.
    But Frank is always fooling, of course, that's not limited to April 1st. ;)
     
  13. Rompin Raider

    Rompin Raider Registered Member

    Joined:
    May 6, 2010
    Posts:
    1,254
    Location:
    Texas
    No...not Frank! ;)
     
  14. atomomega

    atomomega Registered Member

    Joined:
    Jul 27, 2010
    Posts:
    1,292
    This thread got me interested in running a real-time antimalware again. G-Data looks much mature nowadays.
     
  15. Ripcord

    Ripcord Registered Member

    Joined:
    Jun 18, 2011
    Posts:
    118
    Program/update for Gdata Internet Security here in the U.S.
     
  16. chrlshlmn

    chrlshlmn Registered Member

    Joined:
    Aug 1, 2014
    Posts:
    10
     
  17. chrlshlmn

    chrlshlmn Registered Member

    Joined:
    Aug 1, 2014
    Posts:
    10
    Thank you,I installed it Tuesdaythe 14th and it seems to be doing very good.Keep posted.
     
  18. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    Not only the U.S.
    I got the update to version 25.1.0.3 on Thursday, April 9.

    The new version has some interesting changes.
    The most striking change, to me, is this one:

    Before, one of the options for handling infected files, was "Disinfect (if not possible: place in quarantine)."
    I didn't like that option, because of the fact that a false positive and the resulting 'disinfection' could ruin the specific file, or even your system, in worst case. I preferred the option to only report in logs, or quarantine, depending on the kind of detection.

    But with version 25.1.0.3, the previous option for handling infected files "Disinfect (if not possible: place in quarantine)", is now changed to "Disinfect and copy to quarantine". Actually, that "Disinfect and copy to quarantine" is translated from Dutch (Dutch: "Desinfecteren en naar quarantaine kopiëren"), so I'm not sure if the phrasing is the same in English.

    So "Disinfect (if not possible: place in quarantine)" is now changed to "Disinfect and copy to quarantine".
    What does that mean?
    Does that mean that where before the primary action was to disinfect and if not successful to copy to Quarantine, now the action is to copy the untouched file to Quarantine (consider it as a backup of the untouched file) and then the infected file is disinfected in the original location?
    I asked G Data Support.
    G Data Support confirmed.
    However, G Data Support has a history of sometimes being wrong. They get their info from the main office, but sometimes information gets there late, or is confusing, or perhaps even wrong, who knows.
    So I'm not entirely sure about the new "Disinfect and copy to quarantine".
    The G Data online help file (G Data GUI + F1) is not up to date, it is still mentioning the previous "Disinfect (if not possible: place in quarantine)" phrasing, so that's no help.

    I wonder,
    What do you see in the updated G Data user interface?
    Still the old "Disinfect (if not possible: place in quarantine)"?
    Or the new "Disinfect and copy to quarantine" or something like that?
    What is the exact phrasing in English, German and other languages?
    What do you think that it means?
    The same as I think and that G Data Support confirmed - copy the untouched file to Quarantine and then disinfect the infected file in the original location - or do you think the meaning could be different?
    Has anyone asked G Data Support for their language/ country?

    Please let me know.
    Thanks very much.
     
  19. Ro4dRuNn3r

    Ro4dRuNn3r Guest

    What i see is "Desinfizieren und in Quarantäne kopieren" (Disinfect and copy to Quarantine). Therefore it will copy the untouched file to Quarantine.

    gdata.PNG
     
  20. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    Thank you very much, Ro4dRuNn3r.

    "Desinfizieren und in Quarantäne kopieren" is very much the same as the Dutch "Desinfecteren en naar quarantaine kopiëren" (translated to English: "Disinfect and copy to quarantine").
    Good to see that the original phrase in German is very much the same as the phrase that is used in the Dutch language user interface.

    I guess we can expect the corresponding action is what I think it is - copy the untouched file to Quarantine and then disinfect the infected file in the original location.
     
  21. coolcfan

    coolcfan Registered Member

    Joined:
    Nov 1, 2008
    Posts:
    130
    Wow, no discussion since April.

    My interest on this comes back, since the 2016 version has been released, and the Chinese version are not having critical differences with English version (license can be used across these versions now). And they provide a reasonable price in China. When my current NS subscription ends, I may switch to this.

    So anyone's using it? How's it working on Windows 10?
     
  22. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    Perhaps because Frank is gone?

    I'm still using it. Not on Windows 10, but on Vista and Windows 7.
    And it's OK, but I disabled G Data's real-time protection for "Check for dialers/ spyware/ adware/ riskware", as that component was just too annoying. Even with Manual virus check the real-time protection kicked in for all adware supported installers that I stored. I tried to reason with G Data development about this, indicating that I consider that kind of behavior as mad behavior, but G Data development thinks otherwise, and there's no reasoning with them. So, I decided I don't need G Data's real-time protection for "Check for dialers/ spyware/ adware/ riskware", and I disabled it. That way, G Data's software works fine for me.
     
  23. coolcfan

    coolcfan Registered Member

    Joined:
    Nov 1, 2008
    Posts:
    130
    Thanks!

    Gonna try it on my daily used Win10 VM to see if it's a good choice for my main pc.
     
  24. Magic_The

    Magic_The Registered Member

    Joined:
    Jun 24, 2015
    Posts:
    40
    Hey, how is g data versus exploites? in terms of protection?
     
  25. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,843
    Location:
    the Netherlands
    G Data has an Exploit Protection module, but I can't remember a test of specifically G Data's exploit protection, or a comparison to other exploit mitigation software.
    If anyone knows of such test or comparison regarding exploit mitigation software including G Data's exploit protection, I would be most interested.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.