Profile cover photo
Profile photo
G Data Software
680 followers -
More than 30 years of IT security from Bochum. Imprint: https://www.gdatasoftware.com/imprint
More than 30 years of IT security from Bochum. Imprint: https://www.gdatasoftware.com/imprint

680 followers
About
G Data Software's posts

Post has attachment
A half year ago we wrote about the expected problems related to IoT. And guess what? Unfortunately we were right. It even became worse in the past 6 months. Nearly everything what was described back then became exploited. And that’s not a good thing.

Post has attachment
Over 190.3 million people in the U.S. own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Following their findings in 2014 that the Star N9500 smartphone was embedded with extensive espionage functions, G DATA security experts have continued the investigation and found that over 26 models from some well-known manufacturers including Huawei, Lenovo and Xiaomi have pre-installed spyware in the firmware. However, unlike the Star devices, the researchers suspect middlemen to be behind this, modifying the device software to steal user data and inject their own advertising to earn money. Today, G DATA is releasing their Q2 2015 Mobile Malware Report, which discusses these findings as well as analyzes mobile malware samples found over the past quarter.

Post has attachment
Mit der Veröffentlichung der Version 45.0.2454.85 des Chrome-Browsers, stopft ‪#‎Google‬ 29 Schwachstellen. Sechs dieser Schwachstellen stuft das Unternehmen als hohes Risiko ein. Cyberkriminelle können hierüber Schadcode einschleusen und ausführen. Neu hinzu kommt auch ein Blocker für automatisch startende Flash-Inhalte. Hiermit können Flash- und andere Plugin-Inhalte nicht mehr ohne Weiteres gestartet werden.

Post has attachment
Entspannt und sicher in den Urlaub - mit all Ihren Geräten. Diese Freiheit bietet nur G DATA MULTI DEVICE SECURITY 

Post has attachment
Every 18 seconds a new mobile malware strain for Android is discovered. Find this and other interesting results in the newest G DATA Mobile Malware Report.

Post has attachment
Malware authors can sometimes be creative in order to manipulate their human targets on the one hand and to circumvent security products, too. The experts of G DATA’s SecurityLabs analyzed a specially crafted Microsoft Word document the attackers used to install a rather famous banking Trojan called Dridex. This malicious document connects to a perfectly legitimate website to download the final payload. We assume that these two elements were chosen to trick security products. This scam is used more and more often to attack businesses, especially SMBs, in various countries.

Post has attachment
After the initial reports on the attacks on the #Bundestag (German Federal Parliament), variants of the #Swatbanker family are now putting the Bundestag's intranet on a watch list. The operators of the botnet are apparently trying to steal access data and server responses associated with this site. It is not clear whether this is a new attack or whether the same attackers who were active in May have expanded their pattern of attack. 

Post has attachment
Congratulations to all users of one of the best security solutions for android. G DATA INTERNET SECURITY FOR ANDROID reached high score in test of AV-TEST GmbH
Photo

Post has attachment
Staying alert when buying banners: Google's advertising service misused for distributing malware.

Post has attachment
The number of new Android malware instances was up by 6.1 percent compared to the first half of 2014. In total, over 1.5 million new Android malware programs were identified by G DATA security experts in 2014. This represents an increase in malware of almost 30 percent compared to 2013 as a whole.

Find more interesting facts in the new G DATA malware report 02/2014
Wait while more posts are being loaded