Unpacking 101: Writing a static Unpacker for Ldpinch
Packers are commonly used by malware authors to thwart analysis. In our latest TechBlog article we will take a look at how packers work and how to unpack malware without running it.
Unpacking 101: Writing a static Unpacker for Ldpinch
Packers are commonly used by malware authors to thwart analysis. In our latest TechBlog article we will take a look at how packers work and how to unpack malware without running it.
Group chats: Apple's Facetime turns iPhone into a bug
A security flaw in Apple's Facetime can turn the iPhone into an eavesdropping device. It will transmit a live feed from the device's camera and microphone to the eavesdropper. The affected feature has been cut off for now.
Emotet: G DATA explains cybercrime's all-purpose weapon
No other malware-family is as penetrating and has been in development as long as Emotet. The malware has already caused millions in damage in companies around the world. We explain what Emotet can do and why it is so dangerous.
Free to Play: Facebook has to publish internal documents
Facebook has to publish internal documents which outline their business practices regarding „Free to Play“ games. Some of the contents were rather unexpected.
One Graph To Find Them All
Within this follow up post, we dive more thoroughly into one particular problem our Virus Analysts are commonly faced with, namely finding a large quantity of either similar or identical samples. We lay out how we use our graph database to tackle this problem and support our analysts.
Predictions 2019: "The era of simple Android malware is over"
Whether on smartphones, desktop computers, crypto currencies or websites - IT security is becoming increasingly important for end-users. We give an outlook on the most important trends for the year 2019.
Trends for SME in 2019 - here's what you should know
Compliance and Cherrypickers are only two of the things that will become IT security topics for 2019. Learn more on the G DATA Blog!
How to Avoid Doppelgängers in a Graph Database
In this post, we take a look at the problem of getting duplicate data (the doppelgängers) in a graph database like JanusGraph and discuss different approaches to solve it. We will therefore walk through our experiences with upserts at G DATA and how we improved our upserting process…
Captchas are dead...ish.
According to a recently published research paper, some types of Captchas are now obsolete. The reason: machines have learned to solve those Captchas.
Security tip for this holiday season: Uninstall Flash
During the holiday season, users can do themselves a big favor by ditching Adobe Flash, a software notorious for its frequent security flaws. The reason: A zero-day-exploit, which has been spotted at Hacking Team.