The Latest in IT Security

Posts Tagged ‘g data’

Where does a network stop these days? Where does the business network stop? This is not easily definable anymore. Today, networks lacks clear crisp boundaries and it becomes more and more difficult to define what the real inside and outside of the corporate network is. It even becomes more and more difficult for normal users […]

Read more ...

YouTube’s popularity helps the scamsters to promote their dubious online pharmacies. G Data has reported earlier about this kind of spam being disguised as Twitter administration messages or up-to-date news. So, it is another example of well-known brands and public interest used as magnet for scam activities – And YouTube, with its more than two […]

Read more ...

G Data is one of the members of AMTSO (www.amtso.org), an organization currently comprised of around 40 members, representing testers, vendors, academics and publishers involved in anti-malware research. Eddy Willems, G Data Security Evangelist, was at the last AMTSO members’ meeting which was held in Prague. As always, a lot of work was done during […]

Read more ...


Categories

SUNDAY, APRIL 06, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments