JanusGraph: A small glimpse into the big world of graphs
Read below to learn from Florian Hockmann of G Data how JanusGraph compares with Neo4j, why you should be keeping an eye out for TinkerPop 4, and get expert tips on graph data modeling.
JanusGraph: A small glimpse into the big world of graphs
Read below to learn from Florian Hockmann of G Data how JanusGraph compares with Neo4j, why you should be keeping an eye out for TinkerPop 4, and get expert tips on graph data modeling.
Inside view: How DeepRay detects Emotet campaigns early
With DeepRay, G DATA relies on artificial intelligence to detect malware campaigns at an early stage. Using Emotet as an example, we explain what this looks like on a typical day.
Report: Capture the Flag at hack.lu
Hacking competitions are common at conferences. The rock stars of the CTF scene travel all over the globe to take part in competitions. The goal: having fun and never ever stop learning.
Learning from the best: Attending AllStars 2019
This year's AllStars took place in Amsterdam in September, alongside the two-day Global AppSec conference. The event offers a full day of the best hand-picked lectures from top speakers and researchers in the field of information security. G DATA virus analyst Karsten Hahn was there and presented…
Emotet: How an Emotet infection occurs in companies
The Emotet malware is still considered one of the most dangerous threats to corporate IT worldwide. Analysts at G DATA Advanced Analytics have tracked down how an Emotet infection starts gradually infiltrating corporate networks and then takes them out of operation bit by bit.
Interview with Carl-Benedikt Bender “Machine learning in general is very complex and has a lot of surprises in store”
With its DeepRay AI technology, G DATA is leading the way against rapidly changing malware. Carl-Benedikt Bender, leader of the development team behind DeepRay, explains how the technology works and what specific challenges arose during development.
Ordinypt: Resurgence
Recently, the Ordinypt malware has seen a resurgence in the wild, disguised as fake job applications sent via email to human resource departments in German companies. The malware uses social engineering to corrupt the user’s files and trick them into paying cryptocurrency to restore the corrupted…
Virus Bulletin Conference 2019: The Place-to-be
The annual Virus Bulletin conference (called „VB“ for short) is one oft he most important events of the year when it comes to threat intelligence for researchers and analysts as well as product managers and CISOs from all over the world. As usual, G DATA sent several members of their team. When they…
Windows 7 support: time is running out
Microsoft will stop supporting Windows 7 on 14 January 2020. Anyone still using the operating system will no longer receive security updates after 15 January. We have put together the most important tips to bear in mind when switching over.
Happy Birthday, Internet: a personal look back
The Internet is turning 50 years old. Time then to take a look back at the part of its history that I have witnessed myself.