
Trends for SME in 2019 - here's what you should know
Compliance and Cherrypickers are only two of the things that will become IT security topics for 2019. Learn more on the G DATA Blog!
Trends for SME in 2019 - here's what you should know
Compliance and Cherrypickers are only two of the things that will become IT security topics for 2019. Learn more on the G DATA Blog!
When emergency strikes and there is no admin in sight
Many IT emergencies would have far fewer consequences if everybody knew what to do and who to contact. Especially when dealing with security issues, every second counts.
Emotet: G DATA cautions against Word documents from the Internet
In a current malware campaign, users are lured with the promise of an invoice credit. But the infected Word documents are not a real treat - they install malware in the background.
G DATA joins the Cybersecurity Tech Accord
To protect users and enhance the state of Cybersecurity G DATA joins an international group of IT-companies and promises, to always put users first.
The true cost of bad IT security
Investments in IT security are difficult for many companies, mainly because their economic benefits are not always easy to calculate. Current examples show that this can quickly become expensive, as the producer of the iPhone chips had to experience for himself.
Wifi password cracking made easy
Security researchers have discovered a way to calculate a Wifi password with very little effort. Even though this is unnerving, there is no cause for widespread alarm: help is already on the way.
Foreshadow threatens confidential data in cloud environments
After Meltdown and Spectre, two research teams have discovered new security flaws in Intel's processors. The flaw affects all current Core iX as well as XEON CPUs. Learn more about the details of Foreshadow here.
Sudo love your admin
The 27th of July 2018 is a very special day - for the 19th time we celebrate, cheer, and indulge our admins, because we have (hopefully) survived another year without any major IT breakdowns. This unofficial holiday has existed since 2000 and goes back to American originator Ted Kekatos, who worked…
Supplier leaks data of Tesla, Fiat, VW
If you want to attack a major organization, you do not use the main entrance. You want to use the delivery gate. This old piece of wisdom has become a painful reality for Fiat, Tesla, General Motors, Volkswagen, ThyssenKrupp and others.
SocketPlayer – a backdoor wandering off the beaten path
A malware by the name of „SocketPlayer” has sparked the interest of several security researchers. One of our own analysts has taken a closer look at this specimen.