Bochum Buying presents for Christmas online? Without doubt!
Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.
Bochum Buying presents for Christmas online? Without doubt!
Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.
The Rampage of Locky
Locky has been a constant in the malware zoo for a considerable time. And while we are aware that there are still victims being hit by the variant sporting the .ODIN extension, in this post we are going to have a look on its statistical data and an in-depth analysis at yet another two later flavors:…
Analysis: Ursnif - spying on your data since 2007
A game of cat and mouse has been going on ever since the first ever malware started circulating in the wild and the first Antivirus appeared on the market. Although it may seem that brand new malware families appear on a daily basis, the truth looks somewhat different. A lot of the malware which is…
It's Educational - On the No 1 Argument for Open Source Ransomware
Researchers have published several ransomware projects in the name of education and freedom of knowledge. The question of their usefulness sparks debates among security enthusiasts and researchers since the release of open source ransomware Hidden Tear in August 2015.
Bochum Microsoft Tech Support Scammers Use Screenlocker Ransomware
Microsoft recently published a new study about Tech Support Scams and its impact. Besides the well-known telephone, email and website scams, G DATA experts have encountered screenlocker ransomware in this area. Read more in our German G DATA SecurityBlog.
Meet the latest member of the Locky family: Odin
Towards the end of September, the makers of the infamous Locky ransomware have launched a new campaign to spread a new version of the crypto malware. The most obvious difference is the file extension: to identify encrypted personal files, it will be changed to *.odin. Otherwise it bears much…
The Kings in Your Castle Pt. #1
In an upcoming series of articles on the intricacies of targeted attacks, G DATA’s Marion Marschalek and Raphael Vinot of the Computer Incident Response Center Luxembourg (CIRCL) will shine a light on the internal workings of modern APTs and present their findings during the Troopers Conference in…
Pokémon Go: Catch 'em all – but not at any cost
Some may still know the adorable little pocket critters that were all the rage in the late 90s. Now they’re back as an Augmented Reality game for smartphones. Attackers try to use the popularity of this brand new game for themselves and prey on impatient gamers who cannot wait for the game to be…
“HummingBad“ – Money-making Malware, Made in Asia
During the past few days and weeks reports surfaced according to which a new type of malware has infected millions of smartphones and tablet PCs worldwide. The malware in question is highly lucrative for its makers – each month they can rake in up to 300.000 Euros in revenue. The makers of this…
New "Blue Screen of Death": Genuine Help or Security Risk?
There is hardly anything more annoying than error messages and the associated trouble with programs that crash, work that has been lost and the like. Microsoft appears to be trying to improve the user experience with its blue screen errors. However, they have not got rid of the infamous “BSOD”, but…