G Data Malware Report
The G Data SecurityLabs published the Malware Report for the first half of 2015. Here are the most important findings.
G Data Malware Report
The G Data SecurityLabs published the Malware Report for the first half of 2015. Here are the most important findings.
Internet of (Things) Trouble ... the continuing story
A half year ago we wrote about the expected problems related to IoT. And guess what? Unfortunately we were right. It even became worse in the past 6 months. Nearly everything what was described back then became exploited. And that’s not a good thing.
Vulnerability in Android media engine Stagefright
Current media reports talk of a vulnerability that should be taken seriously and that allegedly affects 95% of all Android mobile devices. For this reason the problem has huge implications; nevertheless, it is important to react to this information with a level head. G DATA is providing tips to…
Staying alert when buying banners: Google's advertising service misused for distributing malware
The recent case of malware distribution via Google AdSense advertising banners is an arresting example of how quickly a huge number of websites across the world can become embroiled in cyber attacks. A supplier of the advertising network has apparently been compromised. The attackers deployed the…
Casper: the newest member of the cartoon malware family
Casper is considered to be EvilBunny’s and Babar’s successor, believed to be originating from the same group of programmers – possibly connected to a French intelligence agency. Two very interesting changes the malware has undergone: it now has a modular structure which allows the attackers to…
IT Security, Foosball and Charity: VB 2014 had it all
The VB International conference is a worldwide institution when it comes to IT-Security and its 24th edition held some remarkable highlights. Technical and corporate audiences were able to follow high-class talks and presentations about threats and dangers the industry faces, possible solutions and…
Cuckoo Sandbox Evasion PoC available
In the beginning of this week we discovered a security flaw in the famous malware analysis framework „Cuckoo Sandbox“. We disclosed this bug to the developers on the 7th of October 2014. Not even three hours later the patch was verified and the updates were supplied by the developers.
G DATA Malware Report July - December 2013
G DATA’s Malware Report H2 2013 includes the most important statistics and information regarding new malware types, websites’ threat potential as well as botnet and banking Trojan activities. Check out the essential facts.
The Heartbleed Bug
The current news about the OpenSSL vulnerability dubbed Heartbleed unsettles many PC users. The vulnerability is as severe as a vulnerability can be. But it is fixed and website admins and software providers have started updating their OpenSSL version. Nevertheless, the problem is bigger.
The Android “Master Key” Exploit
Over the last few days much has been written about a serious security hole in the Android operating system that can give attackers complete access to affected mobile devices. Bluebox, the discoverers of the security hole, estimate that 99% of Android devices since v1.6 are vulnerable to the…