Of mortal domains and cars without admins
From 3 to 5 October, the IT security industry met in Montreál, Canada, for the annual Virus Bulletin Conference. Tim Berghoff was there for G DATA.
Of mortal domains and cars without admins
From 3 to 5 October, the IT security industry met in Montreál, Canada, for the annual Virus Bulletin Conference. Tim Berghoff was there for G DATA.
Interesting approach: Skill Squatting with Amazon Echo
Mishearing something every once in a while is a normal thing for humans. In that respect, Amazon Echo has some human characteristics as well. A research team from the University of Illinois has taken a closer look at Echo, Alexa and the abuse potential for malicious Alexa skills. They have presented…
Afghan millions and the European Lottery from Cuba
We currently see an uptick of phishing emails which aim to trick unsuspecting victims into giving up personal data. Two of those mails show that scammers never seem to grow tired of cooking up new stories.
Error 404: Online gamers at risk!
For a long time, gaming was just considered “a bit of a laugh” or “something for the kids”. Unsurprisingly, the security aspect did not receive a lot of attention – it just wasn’t seen as a problem or particularly relevant. But today’s gamers are not just two players sitting side by side as a dot…
Scammers ask people to call - and we are happy to oblige.
For the past few weeks, headlines have been awash with reports about ransomware and other disruptive malware. Since malware in a worry for many people, scammers naturally try to profit off this trend. We had our own Tim Berghoff pose as a victim. Read his full report here.
Fighting virtual fires: are you incident-ready?
Incident response is becoming increasingly important in a time where data breaches and downtime are the nightmare of many companies. Yet, incident response is often not handled as efficiently or effectively as it should be. In this article we are shining a light on the benefits of a good incident…
Toys vs Privacy: It's that time of the year again
As every year, parents are facing a substantial question: what present should we buy for our child? On the other hand, children have very specific things in mind which makes the decision process easier. Hoewver, if electronic toys are involved, parents should use caution: some of the toys their…
Highlights in G DATA’s Blog – A short review of 2016
G DATA started its blogs six years ago and the team has published numerous articles about IT security, malware, mobile device security, awareness and also the Internet of Things since then. It is time for us to take a look back at the Top 10 most read articles in 2016 – both in the German and the…
Bochum Ransomware Maktub: Fake Invoices used as bait
A current spam wave floods email inboxes: Fake invoices with genuine user data (names and even postal addresses) are used as bait. The attackers furthermore misuse existing companies' names and data to complete the sophisticated scam. Victims will be infected with the Maktub Ransomware, currently…
Criminals go phishing for loyalty points and your data
There have been lots of discussions about couponing and loyalty cards such as Payback. Some find the practise of analyzing your shopping habits disagreeable, others just go hunting for those points and use them for rewards. Now, a few weeks short of christmas, G DATA has uncovered a spam campaign…