News

Comment: Why "Facebookgate" is more problematic than many assume

Comment: Why "Facebookgate" is more problematic than many assume

The last few weeks have seen quite the outrage about the abuse of personal data harvested from Facebook by Cambridge Analytica (CA). There were also some serious errors in communication. A comment by Tim Berghoff

Čítať viac
Malware numbers 2017

Malware numbers 2017

We counted the number of new malware specimen and the amount of prevented attacks for the second half of 2017. Some trends are emerging.

The number of new malware types continued rising. The high numbers of the first half year were not achieved. CoinMiners have made it into the Top 10 of prevented attacks during the second half of 2017.

Čítať viac
Pirated Wordpress Add-On makes Websites Distribute Malware

Pirated Wordpress Add-On makes Websites Distribute Malware

G DATA researcher analyzes a widespread backdoor. Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.

Čítať viac
"Meltdown" and "Spectre": researchers discover severe CPU bugs

"Meltdown" and "Spectre": researchers discover severe CPU bugs

PCs, smartphones and IoT hardware are affectedInternational researchers have discovered two severe vulnerabilities in the design of many recent CPUs. The vulnerabilities exist in CPUs from most major vendors, including Intel and AMD, and have been lingering there for over a decade. Microsoft has released an update which is also compatible with G DATA solutions.

Čítať viac
Trojan suite comes with new features: Bitcoin theft, ransomware & DDoS

Trojan suite comes with new features: Bitcoin theft, ransomware & DDoS

It is a known fact that criminals want to secure a foothold on a system by establishing a back door. The required tools are also very easy to get hold of – this does not come as a surprise either. However, it never ceases to amaze how easy it is to acquire an almost “custom” malware if you have enough of a criminal in you.

Čítať viac
G DATA now protects your Bitcoin wallet, too

G DATA now protects your Bitcoin wallet, too

Cryptocurrencies such as Bitcoin or Ethereum enjoy an increasing amount of popularity. More online shops make decide to accept Bitcoin (subsuming other crypto currencies as well) as a method of payment. Wherever there is a large demand and potential profit, criminals are usually not far away. They attempt to “steal” users’ accounts (also referred to as “wallets”).

Čítať viac
Warning: Malware-laden version of CCleaner 5.3

Warning: Malware-laden version of CCleaner 5.3

Security researchers found out that that one version of the popular system tuning application "CCleaner" was infected with malware. We take a brief look at this case as well as several other cases from the past.

Čítať viac
Show me who you call and I tell you what you are - how DGA extraction improves security

Show me who you call and I tell you what you are - how DGA extraction improves security

Domain Generating Algorithms are not a new thing by any stretch. They are used by malware authors to make their command&control infrastructure more resilient. Security researchers can also use features of those methods to get an edge over the bad guys. Come on in and catch a glimpse into some cutting-edge research performed at G DATA.

Čítať viac
Security, Standards & Laws for the Internet of Things

Security, Standards & Laws for the Internet of Things

Smart homes and the Internet of Things were once again big topics at this year's IFA in Berlin. Security is beginning to pick up speed, but we are still a long way away from a secure IoT.

Čítať viac
Are complex passwords a thing of the past?

Are complex passwords a thing of the past?

New recommendations for secure passwords have users breathe a sigh of relief "Your password does not meet the security guidelines" - this message will not drive people up the wall anymore after password recommendations have been updated. The 14-year-old password guidelines from NIST are facing an overhaul. This article will explain why.

Čítať viac

Čo v našich produktoch G DATA nájdete

Gdata icon
Gdata icon

Antivírus

Technológia CloseGap. Maximálna ochrana pomocou proaktívnej ochrany a databázy vírusových vzoriek.

Gdata icon

BankGuard

G DATA BankGuard 2.0 zabezpečuje online platobné transakcie - bez potreby inštalácie dodatočnej aplikácie.

Gdata icon

Firewall

Bezpečný Firewall. Monitoruje všetky prichádzajúce aj odchádzajúce spojenia, chráni pred DoS útokmi, detekcií portov a pod.

Gdata icon

Monitoring súborov

Monitorovanie správania sa súborov. Chráni Vás aj pred úplne novými vírusmi.

Gdata icon

Antispam

Integrovaná ochrana pred nevyžiadanou poštou. Modul pre Microsoft Outlook a POP3 a IMAP účty.

Gdata icon

OS LINUX

Antivírus pre Linux - pracovné stanice s operačným systémom Linux sú chránené tiež.

Gdata icon

MailSecurity

Modul MailSecurity je nezávislý na type mailového servera a pracuje na princípe sieťovej brány.

Gdata icon

Centralizovaná záloha

Modul pre centralizovanú zálohu klientských dát pomôže pred rizikom straty dát, zálohuje dáta klientských staníc pravidelne a plne automaticky.

Gdata icon

PatchManagement

Udržujte nainštalované aplikácie neustále aktualizované pomocou centrálnej distribúcie aktualizácií a bezpečnostných záplat.

Gdata icon

Vzdialená správa

Vzdialená správa je možná z hociktorého miesta pomocou webrozhrania - dokonca aj z mobilných zariadení.

Gdata icon

ActiveDirectory

Podpora ActiveDirectory pre prenos existujúcich skupín a automatizovanie inštalácie klientov.

Gdata icon

Centrálna správa mobilov

Centrálna správa mobilných zariadení s OS Android spolu s ochranou proti krádeži, kontrolou aplikácií, telefónneho zoznamu, blokovaním hovorov a pod.