Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Panning for virtual gold - using other people's equipment
For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Profit through vulnerabilities
There are many aspects of Meltdown and Spectre that have an unpleasant aftertaste. One of these is the sale of a multi-million dollar Intel stock package shortly before the vulnerabilities in Intel's processors became publicly known.
Pirated Wordpress Add-On makes Websites Distribute Malware
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.
Some 343 new Android malware samples every hour in 2017
The threat situation has continued to be high in the past year, with over 3 million new Android malware samples discovered. 744,065 of these were discovered in the fourth quarter of 2017. This means that G DATA analysts are counting an average of 8,225 new malware samples for the Android operating…
"Meltdown" and "Spectre": researchers discover severe CPU bugs
International researchers have discovered two severe vulnerabilities in the design of many recent CPUs. The vulnerabilities exist in CPUs from most major vendors, including Intel and AMD, and have been lingering there for over a decade. Microsoft has released an update which is also compatible with…
The spy under your christmas tree
In the past few years, makers of internet-enabled toys have made the headlines multiple times, but not in a good way. Privacy and data protection clearly is not the highest priority in this sector. In Germany, the sale of some of those toys has already been banned after they were classified as…
G DATA now protects your Bitcoin wallet, too
Cryptocurrencies such as Bitcoin or Ethereum enjoy an increasing amount of popularity. More online shops make decide to accept Bitcoin (subsuming other crypto currencies as well) as a method of payment. Wherever there is a large demand and potential profit, criminals are usually not far away. They…
Adverts and browser extensions target users of illegal streaming
Redirecting web traffic has been a lucrative business model for quite a while. This is true for both legal applications as well as cases on the fringes of legality. One of our G DATA researchers has taken a look at a current example: an advertisement banner which specifically targets the users of…
Aircraft hack: Attacks on flying infrastructures
It is possible to gain access to an aircraft’s systems from the outside, according to a report from a team of DHS experts. For perhaps obvious reasons, any details about the attack are classified, but reports still leave a bitter aftertaste. In the end, things come down to money yet again.
KRACK attacks against Wifi encryption: here's what you need to know
On Monday, reports emerged about the encryption of WiFi networks being susceptible to attacks. A design flaw in the WPA2 encryption allows the reuse of certain cryptographic keys instead of blocking it. The Belgian research team dubbed the attack “KRACK”.