GAME OVER: HOW A COLOURFUL GAME TURNED INTO A SUBSCRIPTION TRAP

App from the Google Play store automatically set up two subscriptions in the Netherlands

27.01.2016

Author: Sabrina Berkenkopf

Premium SMS messages were the first attacks on Android users – almost six years ago, malware with this functionality was the primary risk. Since then of course, the malware landscape for mobile devices has moved on significantly. For this very reason, it is notable that a new type of subscription trap has been evident in the current Google Play store for several weeks now, causing Android users direct financial woe. It is a curious case.  ... read more

INTELLIGENT PRODUCTION – BUT WITH SECURITY!

Safety first in Industry 4.0

29.12.2015

Author: Sabrina Berkenkopf

The increasing digitisation of industry and of the machinery and devices used in it is evidence of the continuous ongoing development of former industrial processes. The benefits of networking cannot be denied – interaction between multinational locations, intelligent systems with self-diagnostics, self-maintenance and more, shorter response times when production conditions change, seamless integration of customers and suppliers into the value chain... Basically a commercially operated Internet of Things is being created for Industry 4.0. But has safety found its place there too? ... read more

CYBERGEFAHR - BOOK RELEASED IN GERMAN

G DATA supports IT security information for everyone

18.12.2015

Author: G DATA SecurityLabs

Famous German publisher Springer launched ‘Cybergefahr’ in the D-A-CH countries, a book written by Eddy Willems, G DATA’s Security Evangelist. ... read more

INVOICES THAT MIGHT DOUBLE IN SIZE

How Teslacrypt ransomware is being distributed via email

18.12.2015

Author: Sabrina Berkenkopf, Eruel Ramos

Since G DATA SecurityLabs have just reported about the risks posed by Dridex, there have been new alerts. In the latest campaigns, attackers are trying to take files from computers as "hostages". They do so by distributing ZIP archives with malicious content via email. If the user opens the files, malware is loaded onto the PC and executed, and all the files are encrypted by malware from the Teslacrypt family.  ... read more

DRIDEX – THE COMEBACK KING

How a banking Trojan is making international waves again and again

09.12.2015

Author: Sabrina Berkenkopf

The next wave of finance malware is doing the rounds – and this time the attackers of German-speaking targets have switched to using typical subjects for the end of the year to lure victims into their trap: tax refunds and overdue invoices aimed at private individuals. However, they are also sending emails in English with purported scans from printers that are used as standard in companies. All the primed attachments – Microsoft Office documents – load malware onto the victim's computer and infect it with a banking Trojan from the Dridex family. ... read more

mTAN fraud relies on conventional Trojans

G DATA BankGuard protects customers against banking Trojans.

27.10.2015

Author: Thomas Siebert

In the last couple of days, a fraud has come to light in which mTAN-protected online banking accounts (also known as smsTAN or mobileTAN) have been plundered. ... read more
Search