Tag Archives: Products

More stars for Avira from AV-Comparatives

Avira won additional stars from AV-Comparatives in the independent agency’s latest Performance Test, Malware Protection Test and also had a top-level performance in the monthly Real World Protection Test. Avira Antvirus Pro received the AV-Comparatives highest Advanced+ *** rating in the latest Performance Test, placing in the top category of AV products with the least […]

The post More stars for Avira from AV-Comparatives appeared first on Avira Blog.

Read More

Avira Antivirus 2018: Remastered and redesigned for today’s digital world

Avira Antivirus 2018: Remastered and redesigned for today’s digital world

Avira Antivirus 2018 is here, combining next-generation AI, a new interface, and cross-platform availability to give you even greater — and easier — security. Avira Antivirus makes it simple to be protected online – regardless of your device or your operating system. Stepping out into a dangerous world It’s a dynamic world of growing threats […]

The post Avira Antivirus 2018: Remastered and redesigned for today’s digital world appeared first on Avira Blog.

Read More

Avira Mobile Security for iOS: Powerful protection against phishing attacks and identity theft

Avira Mobile Security for iOS: Powerful protection against phishing attacks and identity theft, Mobile Security für iOS, Mobile Security pour iOS, Mobile Security per iOS

We have released a new version of Avira Mobile Security for iOS. The free of cost security app for iPhone users comes with enhanced capacities to block out phishing sites and keep your identity secure. How secure are you and your iPhone? While iPhones are fairly secure against traditional malware, their owners are still very much […]

The post Avira Mobile Security for iOS: Powerful protection against phishing attacks and identity theft appeared first on Avira Blog.

Read More

Panda Security, leader in Gartner’s Peer Insights program

panda-adaptive-defense

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational damage stemming from cyber-threats, and how the new protection model leveraged by Panda Adaptive Defense and Adaptive Defense 360 can help companies reinforce their IT security posture by classifying and monitoring all processes running on their network. Panda’s new security approach provides complete endpoint visibility and allows organizations to block security attacks and respond to them immediately, implementing more robust security measures to prevent further incidents. This is not just our opinion but the opinion of our customers as well, as shown by the fact that 96 percent of participants in IT software and services review platform Gartner Peer Insights are recommending Panda’s advanced cyber-security solutions to other companies.

But, what is Gartner Peer Insights?

Peer Insights is an online platform of ratings and reviews of IT software and services. The reviews are written and read by IT professionals and technology decision-makers like you.

The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective unbiased feedback from their customers.

“A product taht is great on visibility and proactive protection even againts direct attack. During the POC and Implementation, everything was easy. Even until now, the support is excellent.” – IT Assistant Manager in the Education Industry.

In this regard, Adaptive Defense, Panda Security’s Endpoint Detection and Response (EDR) solution, is the best rated software and receives 28 percent of all reviews submitted by participants. The best-rated features of Panda’s software include its detection, attack containment, remediation and investigation capabilities.   Additionally, Adaptive Defense’s 100% Attestation Service and the fact that it is cloud-based provide great value for its total cost of ownership, allowing customers to save time and money.

Outstanding capabilities to detect attacks and malware that we never though could escape. This tool does everything we need it to do,and as long as it continues to help us save time, I will continue recommending it.- Responsible For Systems in the Government Industry. 

Panda’s EPP technologies, represented by Panda Endpoint Protection, are also highly rated in the reviews. The fact that the solution can be managed from a single, central Web-based console at any time, from anywhere, is highly praised by IT security professionals,

Companies of all sizes and industries say they have become more resilient to cyber-attacks and give Panda a 4.7 out of 5 overall rating, outscoring all other security vendors.

I’d like to participate in the program, but who can write a review?

Reviews must be completed by people working with Panda Endpoint Protection or Panda Adaptive Defense/Adaptive Defense 360 on a daily basis, or people involved in the purchasing decision.

Panda Adaptive Defense delivers on its commitment to provide complete, integrated protection to users, and is at the forefront of advanced cyber-security solutions. It’s not just us who say so.Are you using Panda Endpoint Protection, Panda Adaptive Defense or Panda Adaptive Defense 360 in your organization? Would you like to share your experience with your peers? Click here to access Gartner’s Peer Insights platform and share your cyber-security experience.

The post Panda Security, leader in Gartner’s Peer Insights program appeared first on Panda Security Mediacenter.

Read More

Raise the fun potential with Avira Game Booster

Raise the fun potential with Avira Game Booster

Gaming is fun, but the cost can be substantial. Thanks to the ever rising hardware requirements of new games and the emergence of new technologies like VR (virtual reality) a new PC is needed every couple of years. While a new machine is a great thing, it’s also a significant expenditure. Instead of just plunking […]

The post Raise the fun potential with Avira Game Booster appeared first on Avira Blog.

Read More

Beta Test: New user interface for Antivirus (Windows)

Beta Test: New user interface for Antivirus (Windows), Benutzeroberfläche

We are currently developing a new User Interface for the Avira Antivirus for Windows and we are thrilled to show it to you! It has a modern, fresh look which fits the overall Avira design. This easy to use interface simplifies and reduces the number of interactions you have to make to achieve to most […]

The post Beta Test: New user interface for Antivirus (Windows) appeared first on Avira Blog.

Read More

Antivirus Pro for Mac wins AV Comparatives’ Approved Security Product award

Antivirus Pro for Mac wins AV Comparatives’ Approved Security Product award

Antivirus Pro for Mac has been recognized by AV Comparatives for its malware-stopping ability together with its simple and straightforward operation. We won the Approved Security Product award as part of AV Comparatives’ annual Mac Security and Review. This independent test measures how AV software is able to detect and stop a selection of malware for […]

The post Antivirus Pro for Mac wins AV Comparatives’ Approved Security Product award appeared first on Avira Blog.

Read More

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS

CVE-2017-7069 : An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS

CVEdetails.com the ultimate security vulnerability data source

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the “Kernel” component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Publish Date : 2017-07-20 Last Update Date : 2017-07-24


CVSS Scores & Vulnerability Types

CVSS Score

9.3

Confidentiality Impact Complete
(There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete
(There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete
(There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Medium
(The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required
(Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Denial Of ServiceExecute CodeOverflowMemory corruption
CWE ID 119


Products Affected By CVE-2017-7069


Number Of Affected Versions By Product


References For CVE-2017-7069


Metasploit Modules Related To CVE-2017-7069

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is
MITRE’s CVE web site.

CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is
MITRE’s CWE web site.

OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is
MITRE’s OVAL web site.

Use of this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user’s risk.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.
ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,
INDIRECT or any other kind of loss.

Powered by WPeMatico

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS

CVE-2017-7068 : An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS

CVEdetails.com the ultimate security vulnerability data source

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the “libarchive” component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted archive file.

Publish Date : 2017-07-20 Last Update Date : 2017-07-24


CVSS Scores & Vulnerability Types

CVSS Score

6.8

Confidentiality Impact Partial
(There is considerable informational disclosure.)
Integrity Impact Partial
(Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial
(There is reduced performance or interruptions in resource availability.)
Access Complexity Medium
(The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required
(Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Denial Of ServiceExecute CodeOverflow
CWE ID 119


Products Affected By CVE-2017-7068


Number Of Affected Versions By Product


References For CVE-2017-7068


Metasploit Modules Related To CVE-2017-7068

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is
MITRE’s CVE web site.

CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is
MITRE’s CWE web site.

OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is
MITRE’s OVAL web site.

Use of this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user’s risk.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.
ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,
INDIRECT or any other kind of loss.

Powered by WPeMatico

An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the “Kernel

CVE-2017-7067 : An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the “Kernel

CVEdetails.com the ultimate security vulnerability data source

An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the “Kernel” component. It allows attackers to bypass intended memory-read restrictions via a crafted app.

Publish Date : 2017-07-20 Last Update Date : 2017-07-24


CVSS Scores & Vulnerability Types

CVSS Score

4.3

Confidentiality Impact Partial
(There is considerable informational disclosure.)
Integrity Impact None
(There is no impact to the integrity of the system)
Availability Impact None
(There is no impact to the availability of the system.)
Access Complexity Medium
(The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required
(Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Bypass a restriction or similar
CWE ID 284


Products Affected By CVE-2017-7067


Number Of Affected Versions By Product


References For CVE-2017-7067


Metasploit Modules Related To CVE-2017-7067

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is
MITRE’s CVE web site.

CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is
MITRE’s CWE web site.

OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is
MITRE’s OVAL web site.

Use of this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user’s risk.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.
ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,
INDIRECT or any other kind of loss.

Powered by WPeMatico