
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Some 343 new Android malware samples every hour in 2017
The threat situation has continued to be high in the past year, with over 3 million new Android malware samples discovered. 744,065 of these were discovered in the fourth quarter of 2017. This means that G DATA analysts are counting an average of 8,225 new malware samples for the Android operating…
Leak from an unexpected direction: Fitness network "Strava"
For many people, fitness trackers are a part of their everyday life. They are supposed to help us to work out more and to live healthier. When such devices can be abused to map out military installations, though, they are a big problem.
Safe as Houses?
In the last few weeks and months, discussions have been going on about surveillance, federal trojans as well as mandatory backdoors. Some initiatives have received harsh criticism. These discussions cast bad light on Germany as a good operating base for security solutions. Germany has to remain the…
G DATA now protects your Bitcoin wallet, too
Cryptocurrencies such as Bitcoin or Ethereum enjoy an increasing amount of popularity. More online shops make decide to accept Bitcoin (subsuming other crypto currencies as well) as a method of payment. Wherever there is a large demand and potential profit, criminals are usually not far away. They…
Fighting Botnets - A never-ending story
Many media outlets focus on trends such as ransomware. While this is undoubtedly an important topic, it overshadows another equally important threat: botnets. For more than 15 years, botnets have been playing a role in the international cybercrime scene. The “Botconf.eu” conference, which is…
IT is not IT Security
Many small and medium sized companies are missing the boat in terms of their IT security. In an area where there is expert knowledge required, many IT generalists are put to use. A rethink is needed. The first steps towards a change are underway, but many IT departments are still fighting an uphill…
Android: Risk level increases
The threat level for Android devices has increased again: G DATA security experts have counted 810.965 new malicious files in the third quarter of 2017. This constitutes a 17% increase in comparison to the previous quarter. Meanwhile, with a share of 73% in Q3, Android has become the most popular…
Fighting virtual fires, Part 2: how to get ready
In our lates blog article we will take a look at very practical aspects of Incident Response and shine a light on some of the details of this complex topic. So, what does Incident Response look like when you're "out there"? Come on in and take a look.
Are complex passwords a thing of the past?
"Your password does not meet the security guidelines" - this message will not drive people up the wall anymore after password recommendations have been updated. The 14-year-old password guidelines from NIST are facing an overhaul. This article will explain why.