G DATA joins the Cybersecurity Tech Accord
To protect users and enhance the state of Cybersecurity G DATA joins an international group of IT-companies and promises, to always put users first.
G DATA joins the Cybersecurity Tech Accord
To protect users and enhance the state of Cybersecurity G DATA joins an international group of IT-companies and promises, to always put users first.
Cyber attacks on Android devices on the rise
The total count of mobile malware rises about 40 percent in 2018. G DATA Analysts have identified around 3,2 million malicious apps by the end of the third quarter of 2018.
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
Of mortal domains and cars without admins
From 3 to 5 October, the IT security industry met in Montreál, Canada, for the annual Virus Bulletin Conference. Tim Berghoff was there for G DATA.
Next-Generation Antivirus: How G DATA can protect customers from unknown threats
Antivirus programs no longer only work with malware signatures. Read about the next-generation technologies G DATA uses and how you can benefit from them.
Malware figures for the first half of 2018: The danger is on the web
More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
The true cost of bad IT security
Investments in IT security are difficult for many companies, mainly because their economic benefits are not always easy to calculate. Current examples show that this can quickly become expensive, as the producer of the iPhone chips had to experience for himself.
Deeplocker: Interesting, but not yet a threat
AI malware presented at Blackhat security-conference is currently attracting a lot of attention. The clou: This new form of malware uses Artificial Intelligence to decide whether a certain computer will be attacked or not. Although the approach is interesting, G DATA-Experts see no imminent danger.
Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
Abstractism: Cryptomining game removed from Steam Store
The game Abstractism prides itself with minimalistic graphics and limited functionality - but leads to even more work for computers. The reason: In the background, crypto currencies are mined on and the players are ripped off.