Virus hunting on the net

0
330

A company from Bochum is one of the leading providers of IT Security solutions. The experts register daily for up to 800,000 suspicious files that may compromise computer and company.

With the rapidly advancing digitalization of security authorities and organizations are experiencing more and more attacks from Cyber Criminals. The Internet is full of malicious programs, the computer will attack, infect, and data capture. Not less Smartphones and Tablets are at risk.

In the case of the G DATA Software AG, with headquarters in Bochum, the solutions is one of the world’s leading providers of IT Security that you feel in the cut between 600,000 and 800,000 suspicious files. “Every day,” says G DATA Board member Andreas Lüning. Then the behavior of the pests analyzed. It is also clear whether they belong to an already known virus family. A suspicion is confirmed, the customer will be informed about the risk and protected accordingly.

When he founded, in 1985, together with Kai Figge, the company, “there was the issue of IT Security at all,” recalls Andreas Lüning. It was only when he discovered on his “Atari ST”Computer Virus that had infiltrated his entire disks, “because I have written a program which has removed the Whole.”

What I have brought to companion Figge to the realization, “if You already did that, then that is probably also someone else. Then we will be able to market this program.”

Screens in the “war Room” of the company show the current virus-currents and their direction in the network

Today, G DATA has the Founding city of Bochum 370 and all over Europe around 500 employees. The annual revenue of the IT Security company now amounts to about 40 million euros. With the developed security solutions and the products of the German company is represented in over 90 countries of the world.

Viruses in the sandbox

In the Bochum Central suspicious files first go through special test programs, the tion chamber functioning as a kind of virus-Scan. Or you end up in the so-called Sandbox systems that are sealed off to the outside hermetically, to the pests but to believe that you are actually on the Internet.

“We run these files, and watching your behavior – whether you are building may have a second Internet connection or something to download,” explains Andreas Lüning. “All of this leads to an assessment of whether this is a malicious file that can cause damage.” And then needs to be defused.

The Bochum-based IT professionals to share information with other security vendors and are also in contact with the criminal police at the Federal and state level. You put, in network and operating systems, the computer will attract pests. What kind of “bait”, how and where designed, keeping in Bochum, of course, silence.

The strategy of Bochum, the virus hunter, the Laying of baits is part of

Five years ago, the experts exposed a very big fish in the net, a spy program with the name Uroburos. A Cyber-attack, with the help of the network of Belgian government agencies spied on. In the case of Cyber-attacks, says Andreas Lüning, one could estimate, using the Codes on the System on which such Software is created. In General, if it were Russian or Chinese “sender”. Most of the attacks come from the USA, because Server costs are inexpensive.

The middle class is in need of defense

Companies in the IT security industry are on a growth course, also G DATA, says Andreas Lüning. “The digitalization affects almost all areas of the economy in any way. And our economic success increasingly depends on the functioning of such systems.”

For G DATA protection technologies against Cyber-Criminals are only a building block. Ultimately, it is now the defense capability of the company. These programs are developed that consider the possibility of an attack already in consideration, and then with a prepared emergency scenario, however, prepare for.

Video 02:25 Share

Like company hackers offer Paroli

Facebook Twitter google+ send Tumblr VZ Xing Newsvine Digg

Permalink https://p.dw.com/p/36bGh

Like company hackers offer Paroli

Need Andreas Lüning looks mainly at small and medium-sized enterprises with up to 250 employees that need to be retrofitted in the area of IT Security. In the case of joint development with the company a question in the foreground, standing there Lüning says: “What processes must function to 100 percent, so that the added value of this company works, and also in the case of an attack get?”

Among the customers of the Münster/Osnabrück airport, the motorcycle manufacturer Ducati, whose IT systems are protected to the circuit of G DATA, as well as companies from the health care industry. In addition, customers virus protection programs of the Bochum-based IT professionals to use about one Million private on their computers.

However, Cyber-attacks, as instead it is long only on computers but also on Smartphones and Tablets. In the past year, registered G DATA 4.1 million malicious Apps for the Android operating system. So that the former exceeded the negative record from the year 2017 to 27 percent. Every eight seconds a new malicious Android application which runs on approximately 85 percent of all mobile devices. In the foreseeable future, cannot complain of virus hunters about too little work.