
Printers: The underestimated danger inside your company
Printers are an often overlooked pathway into a company network. Whether it is a misconfiguration or a security flaw: There are ways to remedy both.
Printers: The underestimated danger inside your company
Printers are an often overlooked pathway into a company network. Whether it is a misconfiguration or a security flaw: There are ways to remedy both.
The real reason why malware detection is hard—and underestimated
Researchers develop an AI with a 98% malware detection rate and 5% false positive rate. If you think this is a splendid technology for antivirus software, this article might change your mind.
The Psychology of Cybercrime
A good criminal needs to know what makes people tick. There is a great deal of psychology involved in criminal activities - especially when it comes to establishing contact with potential victims.
Cybercrime: The Dangerous World of QR Codes
QR codes are everywhere these days. People use them to open websites, download apps, collect loyalty points, make payments and transfer money. This is very convenient for people, but of course there is a catch: Cybercriminals also try to cash in and have already devised numerous tricks using QR…
Criminals provide Ginzo stealer for free, now it is gaining traction
We identified more than 400 samples for Ginzo stealer within 10 days since 20th March and the numbers are rising. What is behind the free stealer?
Phone Scams: Are you still using your phone for phone calls?
It seems that the number of complaints concerning phone scams is increasing. Let’s try to identify a number of frequently occurring fraudulent practices. What can you do to stop those annoying phone scams?
War in Ukraine: What are the consequences for companies?
The uncertainty surrounding the armed conflict in Ukraine also raises numerous questions: How can companies protect themselves from getting caught between the fronts and becoming a target? There is only one thing that is certain: There are currently more questions than answers.
An attacker's toolchest: Living off the land
If you’ve been keeping up with the information security world, you’ve certainly heard that recent ransomware attacks and other advanced persistent threats are sometimes using special kind of tools. But for the most part, the tools will be very familiar to you.
Research Project: SmartVMI
SmartVMI is getting off the ground: Alongside the University of Passau and innowerk, G DATA is conducting research into improving the state of virtual machine introspection for memory analysis and malware detection.
Android Malware: An underestimated problem?
Is Android malware dangerous? How can I prevent my phone from being infected? How can I remove a malicious app from my phone? What’s the real reason why we see so many malicious apps for Android? All these are questions we will look into during the next minutes.