Of mortal domains and cars without admins
From 3 to 5 October, the IT security industry met in Montreál, Canada, for the annual Virus Bulletin Conference. Tim Berghoff was there for G DATA.
Of mortal domains and cars without admins
From 3 to 5 October, the IT security industry met in Montreál, Canada, for the annual Virus Bulletin Conference. Tim Berghoff was there for G DATA.
Botnet: No jailtime for Mirai-creators
Their IoT-botnet created damage worth 100 Million US-Dollars. Yet, the developers will serve no jailtime - because they cooperated with the FBI.
Interesting approach: Skill Squatting with Amazon Echo
Mishearing something every once in a while is a normal thing for humans. In that respect, Amazon Echo has some human characteristics as well. A research team from the University of Illinois has taken a closer look at Echo, Alexa and the abuse potential for malicious Alexa skills. They have presented…
Malware figures for the first half of 2018: The danger is on the web
More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
Wifi password cracking made easy
Security researchers have discovered a way to calculate a Wifi password with very little effort. Even though this is unnerving, there is no cause for widespread alarm: help is already on the way.
Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
The state of WiFi, ten months after KRACK
It has been almost a year since the “KRACK” vulnerability of the WPA2 protocol caused quite the wave in the world’s media landscape. We take a look at how things stand ten months “post-KRACK”. For this, we had a chat with Mathy Vanhoef, the man who discovered KRACK in 2017.
Where we go, we don't need files: Analysis of fileless malware "Rozena"
Fileless malware leverages exploits to run malicious commands or launch scripts directly from memory using legitimate system tools such as Windows Powershell. Code Red and SQL Slammer were pioneers of fileless malware which date back to the early 2000s. Currently, this type of malware is on the rise…
SocketPlayer – a backdoor wandering off the beaten path
A malware by the name of „SocketPlayer” has sparked the interest of several security researchers. One of our own analysts has taken a closer look at this specimen.
Russians in the Router
Security services from USA and UK warn about current attacks of the Russian government on routers, firewalls and intrusion detection systems of companies and public authorities. Successful attacks on the "heart of the network" may have versatile effects and endanger the whole IT ecosystem of…