World of Warcraft: one simple line of code can cost you dearly
07/22/2016 - A few days ago, a new type of gold/item scam made the rounds. Usually scamming in MMORPGs is done using social engineering techniques, e.g. an attacker sells a fake item code for alleged in-game items like mounts to a potential victim for in-game currency. But this most recent kind of attack does not only involve social engineering but also relies on the misuse of a previously undocumented feature...Author: Sascha Curylo & Sabrina Berkenkopf
Sunglasses Spam: 85% Discount? That has to be 100% fake!
05/30/2016 - The experts at G DATA SecurityLabs deal with cyber criminals on a daily basis but there are always seasonal particularities. Especially now in spring, the questionable offers of popular sunglasses entering the market are springing up again via spam mails, social media platforms and even short messages on mobiles. The analysts have followed the tracks, explain background information and provide...Author: Sabrina Berkenkopf
CYBERGEFAHR - BOOK RELEASED IN GERMAN
12/18/2015 - Famous German publisher Springer launched ‘Cybergefahr’ in the D-A-CH countries, a book written by Eddy Willems, G DATA’s Security Evangelist.Author: G DATA SecurityLabs
IoT: The Internet of Things... ehm... Trouble
03/31/2015 - It is 20 years ago that I first included a slide in my presentation about sending spam via a refrigerator. At the time, most people found that ridiculous. Yet last year, it became a reality. Refrigerators have now become 'smart’ and can do a whole lot more than just keep things cool.The Internet of Things (IoT) gives everything an IP address so that everything can communicate with more or less...Author: Eddy Willems
Hotel safes - are they really safe?
07/15/2014 - This is the beginning of the holidays; a lot of people will travel during the next weeks and may stay in a hotel. The rooms are usually equipped with a safe to store valuables such as money, passports or your laptop. Experts of the G DATA SecurityLabs checked the security level of one safe which is made in China and is sold under many different brands. We expose the findings in this article.Author: Paul Rascagneres
The evolution of anti-virus solutions continues
05/08/2014 - "Anti-virus is dead" - again. AV has been dying for the last decades. 15 years ago Dr. Alan Solomon, a highly respected security expert and founder of a pioneering anti-virus software company, made the same statement. AV also deceased when the first behavior-based products entered the market. Whenever there are new threats, the failure of AV products is pointed out and their critical illness is...Author: Ralf Benzmüller, Eddy Willems
"Hacking like its 1964"... by fax!
10/30/2013 - News that renowned companies in the IT security industry had apparently been hacked quickly spread through Twitter and other channels. It soon became clear, however, that the report was inaccurate. There was no hacking involved, but employees of two domain registries who had been tricked in an almost unbelievable way into allowing the manipulation of DNS entries. The KDMS team claimed...Author: Sabrina Berkenkopf
A curious phone call – when a help desk scammer offers you a job
06/19/2013 - A few days ago, someone called my landline number. I saw that the incoming number was ‘unknown’ so I suspected some media representative. However, it turned out to be somebody completely different: a self-proclaimed computer tech support with heavy Indian accent, trying to talk me into following his advice. My inner alarm bells rang, immediately. Let me tell you what I experienced.Author: Eddy Willems
6 minutes on Twitter
05/02/2013 - Twitter has become an important source of information. When its access data was stolen, the Twitter identity of news agency Associated Press was misused to distribute targeted misinformation concerning an assassination attempt. It's incredible how quickly such an incident can affect even the stock market.Author: Ralf Benzmüller
Primed browser extension delivers unwanted Facebook likes
04/16/2013 - A primed browser extension works in the background every time a website is opened, almost without the user noticing. The unaware users see mysterious "likes" in their personal accounts, but where they have come from remains obscure to many at first. Experts at G Data SecurityLabs have been taking a close look at this issue and explain the sophisticated ploy using the example of the Google Chrome...Author: SB, SC