How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
Malware figures for the first half of 2018: The danger is on the web
More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
IT Security Trends and Predictions for 2017
There were quite some changes in the area of malware, cyber crime, and IT security in 2016. At the same time the technological progress moved in giant leaps. Apart from desktop PCs and notebooks, smart and connected technologies have been established in both private and industrial environments. Read…
G DATA Exploit Protection effectively prevents attacks by infected Magento shops
Thousands of online shops running an outdated version of the Magento eCommerce platform have been infected with malware since 18 October 2015, according to a report by security firm Sucuri (https://blog.sucuri.net/2015/10/massive-magento-guruincsite-infection.html). The infected shops distribute…
G DATA Malware Report July - December 2013
G DATA’s Malware Report H2 2013 includes the most important statistics and information regarding new malware types, websites’ threat potential as well as botnet and banking Trojan activities. Check out the essential facts.
"Potentially Unwanted Programs": much more than just annoying
Technology forums are full of complaints and questions about "Potentially Unwanted Programs", or PUPs. Users complain that "a virus has infected their browser" or "a toolbar has hacked into the PC" and they justifiably feel extremely aggrieved by this. However, this does not involve malware in the…
Mobile malware: the "barrier of the beast" is broken
The timing could not have been more appropriate: June 2013, the sixth month of the year 2013. In this sixth month, experts at G Data Security Labs have seen a landmark for evil surpassed – more than 666,666 unique mobile malware programs for the Android platform have now been amassed in their…
Questionable little system helper does very little but does not come for free
The RegClean Pro scareware was recently advertised on web banners of people search engine yasni.de, which is very popular in Germany. But what claims to be a useful little helper is actually a program with questionable benefits and costs.
Be careful when typing URLs
An error while typing the URL of a popular website in the browser can put your local system in danger. Typo-squatting domains are registered by attackers to make use of frequent mistyping errors by internet users. Well known examples from the past are "mircosoft.com" and "goggle.com", where malware…
A never-ending Facebook story
Most attacks carried out and malware produced have an economic background - someone wants to earn money with it. Advertising networks are a popular way to gain money quite easily without necessarily harming the user, at least not directly. In this current case, we have discovered a sophisticated…