
Trends for SME in 2019 - here's what you should know
Compliance and Cherrypickers are only two of the things that will become IT security topics for 2019. Learn more on the G DATA Blog!
Trends for SME in 2019 - here's what you should know
Compliance and Cherrypickers are only two of the things that will become IT security topics for 2019. Learn more on the G DATA Blog!
How to Avoid Doppelgängers in a Graph Database
In this post, we take a look at the problem of getting duplicate data (the doppelgängers) in a graph database like JanusGraph and discuss different approaches to solve it. We will therefore walk through our experiences with upserts at G DATA and how we improved our upserting process…
Captchas are dead...ish.
According to a recently published research paper, some types of Captchas are now obsolete. The reason: machines have learned to solve those Captchas.
Security tip for this holiday season: Uninstall Flash
During the holiday season, users can do themselves a big favor by ditching Adobe Flash, a software notorious for its frequent security flaws. The reason: A zero-day-exploit, which has been spotted at Hacking Team.
When emergency strikes and there is no admin in sight
Many IT emergencies would have far fewer consequences if everybody knew what to do and who to contact. Especially when dealing with security issues, every second counts.
G DATA Techblog: Malware Analysis with a Graph Database
Graph databases are growing in popularity because their connection-oriented data model is a natural fit for many domains where the connections between entities are of central importance. We discuss in this post whether a graph database can help us to analyse malware, both manually and for machine…
DeepRay foils cyber crooks' business plans
Machine Learning against Malware: G DATA has introduced its latest Next-Generation Technology. DeepRay can effectively detect the obfuscation of malware samples and thus protect customers from new threats in real time.
Emotet: G DATA cautions against Word documents from the Internet
In a current malware campaign, users are lured with the promise of an invoice credit. But the infected Word documents are not a real treat - they install malware in the background.
G DATA joins the Cybersecurity Tech Accord
To protect users and enhance the state of Cybersecurity G DATA joins an international group of IT-companies and promises, to always put users first.
Cyber attacks on Android devices on the rise
The total count of mobile malware rises about 40 percent in 2018. G DATA Analysts have identified around 3,2 million malicious apps by the end of the third quarter of 2018.