Fighting virtual fires: are you incident-ready?
05/30/2017 - Incident response is becoming increasingly important in a time where data breaches and downtime are the nightmare of many companies. Yet, incident response is often not handled as efficiently or effectively as it should be. In this article we are shining a light on the benefits of a good incident response strategy as well as some considerations to help you get started.Author: Tim Berghoff
Wrapping up WannaCry - sort of
05/23/2017 - After the big infection wave that hit thousands of computers all over the world on Friday, May 12, we are taking a look at some things that WannaCry has taught us and some of the aspects that have surprised many.Author: Tim Berghoff
It's Password Day!
05/04/2017 - We are using so many online accounts these days that using secure passwords is absolutely vital. However, recent news coverage shows that weak passwords are still a problem across the board. We at G DATA support International Password day and encourage everybody to read our tips on how to improve your password security.Author: Tim Berghoff, Eddy Willems
Data breach risks - are enterprises out of touch with reality?
03/21/2017 - It is notable that many respondents in a recent survey expressed confidence in their overall cybersecurity strategy. Looking at the coverage of recent data breaches, though, this degree of confidence might seem unwarranted. Still, there is light at the end of the tunnel: both governments and businesses have started putting more emphasis on the topic and awareness has risen considerably within...Author: Giulio Vada (G DATA Italia)
G DATA hosts the Software Craftmanship Meetings of Softwerkskammer Ruhrgebiet
03/17/2017 - Starting this year, G DATA will be hosting events and meetings of the Software Craftmanship Community "Softwerkskammer Ruhrgebiet". This community has set itself the goal of supporting other developers in creating useful solutions that follow high quality standards. In this process, both development processes play a role, as well as the relationship with customers.Author: Kevin Wittek, Matthias Rottländer
WikiLeaks Vault7 Year Zero
03/09/2017 - Agencies spy. That’s a trivial fact. And even if most of the leaked details have been known before, a bad feeling comes up when information is leaked that provides insight about the extent and the systematics of the agencies’ acitivities. Vault 7 Year Zero is the first set of documents and it demands for homework to be done.Author: Eddy Willems, Ralf Benzmüller
The Kings in Your Castle, Pt #4
12/05/2016 - Oftentimes, there is talk about a "sophisticated" malware-based attack against an individual or an organization. The prevalent assumption is that a great deal of development work has gone into the attack tools. In the 4th part of the article series, Marion Marschalek and Raphael Vinot will demonstrate what 'sophistication' means and what it actually looks like.Author: Tim Berghoff
The big coup against the Avalanche botnet
12/01/2016 - Botnets are a real menace. An international group of law enforcement agencies and private IT security parties has dismantled the Avalanche botnet yesterday. Germany alone had suffered damages of millions of Euros from this botnet. After the takedown, users have to clean their PC from the remains. Read about the takedown and information about the malware removal in our German SecurityBlog.Author: Ralf Benzmüller
The Rampage of Locky
11/18/2016 [UPDATE: 11/24/2016] - Locky has been a constant in the malware zoo for a considerable time. And while we are aware that there are still victims being hit by the variant sporting the .ODIN extension, in this post we are going to have a look on its statistical data and an in-depth analysis at yet another two later flavors: .SH*T and .THOR. Furthermore, an update to this article takes a look at the recently released...Author: Jaydee Valdez
P@55w0rd5 – Blessing or curse?
08/08/2016 - By now, everybody has passwords for something, just like keys to different doors. The more doors you have to unlock, the bigger your keychain is going to be. This in turn pokes holes in pockets and every now and then one of those keys may just slip away. The same applies to passwords. Though they may not take up as much space in your pocket, they take up a lot of real estate in your memory.Author: Tim Berghoff