News

Vault 7: The CIA’s Cyber Weapons

03/10/2017, Bochum The leaked confidential CIA documents shine a bright light on the agency’s hardware and software hacking activities between 2013 and 2016. They explicitly mention iPhones, Android devices, Linux, Windows as well as Smart TVs as targets. Security vendors are also included in the list. It seems that...


Stiftung Warentest: G DATA Internet Security provides the best virus scanner

02/24/2017, Bochum No other security software protects consumers against digital malware more meticulously than G DATA Internet Security 2017 – that is the result of the latest comparison test run by Stiftung Warentest in “test” magazine (03/2017). Since 2005, the German company’s security solutions have impressed...


Threat situation for mobile devices worsens

02/22/2017, Bochum Around half of people use a smartphone or tablet to go online (source: Bitkom). The Android operating system is the most widely used on mobile devices and hence is a popular target of attack for cyber criminals. G DATA security experts once again recorded a negative record of 3,246,284 new Android...


G DATA does not touch HTTPS

02/13/2017, Bochum A study titled "The Security Impact of HTTPS Interception" states that security solutions from G DATA interferes with transferring encrypted browser traffic by opening up HTTPS. According to the researchers, this would compromise hat security of the connection. G DATA has immediately contacted the...


MWC 2017: Mobile security is an elementary component of digitisation

02/09/2017, Bochum The Mobile World Congress is being held in Barcelona this year under the keyword “Elemental”. The slogan makes it clear – mobile devices have become a permanent fixture in the digital everyday world. In Germany alone, some 50 million people used a smartphone in 2016 (source: comScore). The threat...



New Year’s resolutions for IT security

01/10/2017, Bochum You can make endless lists of worthy New Year's resolutions. Digital security, however, should be the one resolution you really stick with. An all too carefree attitude towards the security of PCs and mobile devices makes life easy for cyber criminals. Is there a comprehensive security solution...


G DATA Security outlook on 2017: Ransomware attacks to rise

12/20/2016, Bochum Locky, Petya, TeslaCrypt, GoldenEye – ransomware was one of the main topics in IT security in 2016. At the beginning of the year several hospitals made the headlines after being hit with ransomware. There is no reason to sound the “all clear” in 2017. Using this type of malware has proven...


Attacks on vulnerabilities in routers are extremely lucrative

12/02/2016, Bochum The attack on routers belonging to Telekom customers demonstrates the vulnerability of the infrastructure of the Internet. Some 900,000 users could not connect to the Internet. So what was behind the attack? What was the perpetrators’ motivation and what financial benefit can cyber criminals gain...


Detecting DDoS attacks in good time

12/01/2016, Bochum Internet users and companies observed and worried about the dramatic effects that DDoS (Distributed Denial of Service) attacks have had on the digital ecosystem in the past month. Large Internet companies and their services were no longer available as a consequence of a cyber attack. Is this just an...