Fighting virtual fires: are you incident-ready?
05/30/2017 - Incident response is becoming increasingly important in a time where data breaches and downtime are the nightmare of many companies. Yet, incident response is often not handled as efficiently or effectively as it should be. In this article we are shining a light on the benefits of a good incident response strategy as well as some considerations to help you get started.Author: Tim Berghoff
Toys vs Privacy: It's that time of the year again
12/16/2016 [UPDATE: 02/17/2017] - As every year, parents are facing a substantial question: what present should we buy for our child? On the other hand, children have very specific things in mind which makes the decision process easier. Hoewver, if electronic toys are involved, parents should use caution: some of the toys their children want to badly are 'smarter' than you would actually like them to be.Author: Tim Berghoff
Highlights in G DATA’s Blog – A short review of 2016
01/09/2017 - G DATA started its blogs six years ago and the team has published numerous articles about IT security, malware, mobile device security, awareness and also the Internet of Things since then. It is time for us to take a look back at the Top 10 most read articles in 2016 – both in the German and the English G DATA Blog.Author: Sabrina Berkenkopf
Ransomware Maktub: Fake Invoices used as bait
12/16/2016 - A current spam wave floods email inboxes: Fake invoices with genuine user data (names and even postal addresses) are used as bait. The attackers furthermore misuse existing companies' names and data to complete the sophisticated scam. Victims will be infected with the Maktub Ransomware, currently not decryptable. Read more about this case in our German G DATA Blog.Author: Tim Berghoff, Sabrina Berkenkopf
Criminals go phishing for loyalty points and your data
12/09/2016 - There have been lots of discussions about couponing and loyalty cards such as Payback. Some find the practise of analyzing your shopping habits disagreeable, others just go hunting for those points and use them for rewards. Now, a few weeks short of christmas, G DATA has uncovered a spam campaign which can end up costing you more than just your virtual points or coupons: your data.Author: Sabrina Berkenkopf
CEO Fraud: using allegedly secret transactions as bait
11/30/2016 - Scammers' profits, based on CEO fraud, are rising worldwide. The losses for companies of all kinds and sizes go into the millions! This holiday season is expected to see a peak in attempted new attacks. Even G DATA was recently hit by such an attack, but its employees reacted attentively and confidently against it. Read more about the current case in G DATA's German SecurityBlog.Author: Sabrina Berkenkopf
Buying presents for Christmas online? Without doubt!
11/24/2016 - Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.Author: Sabrina Berkenkopf
Microsoft Tech Support Scammers Use Screenlocker Ransomware
11/03/2016 - Microsoft recently published a new study about Tech Support Scams and its impact. Besides the well-known telephone, email and website scams, G DATA experts have encountered screenlocker ransomware in this area. Read more in our German G DATA SecurityBlog.Author: Sabrina Berkenkopf
P@55w0rd5 – Blessing or curse?
08/08/2016 - By now, everybody has passwords for something, just like keys to different doors. The more doors you have to unlock, the bigger your keychain is going to be. This in turn pokes holes in pockets and every now and then one of those keys may just slip away. The same applies to passwords. Though they may not take up as much space in your pocket, they take up a lot of real estate in your memory.Author: Tim Berghoff
World of Warcraft: one simple line of code can cost you dearly
07/22/2016 - A few days ago, a new type of gold/item scam made the rounds. Usually scamming in MMORPGs is done using social engineering techniques, e.g. an attacker sells a fake item code for alleged in-game items like mounts to a potential victim for in-game currency. But this most recent kind of attack does not only involve social engineering but also relies on the misuse of a previously undocumented feature...Author: Sascha Curylo & Sabrina Berkenkopf