Android Trojan reads Whatsapp-Messages
A spyware still in development can read users Whatsapp-Messages and other sensitive data. G DATA researchers analysed the Malware to protect our customers.
Android Trojan reads Whatsapp-Messages
A spyware still in development can read users Whatsapp-Messages and other sensitive data. G DATA researchers analysed the Malware to protect our customers.
Botnet: No jailtime for Mirai-creators
Their IoT-botnet created damage worth 100 Million US-Dollars. Yet, the developers will serve no jailtime - because they cooperated with the FBI.
Interesting approach: Skill Squatting with Amazon Echo
Mishearing something every once in a while is a normal thing for humans. In that respect, Amazon Echo has some human characteristics as well. A research team from the University of Illinois has taken a closer look at Echo, Alexa and the abuse potential for malicious Alexa skills. They have presented…
Malware figures for the first half of 2018: The danger is on the web
More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
Story Point based Cost Estimation
Story points are popular in agile software development to estimate the work, complexity and risk of backlog items. This post discusses an idea to utilize the story point estimations to compute the costs of a project.
The true cost of bad IT security
Investments in IT security are difficult for many companies, mainly because their economic benefits are not always easy to calculate. Current examples show that this can quickly become expensive, as the producer of the iPhone chips had to experience for himself.
Wifi password cracking made easy
Security researchers have discovered a way to calculate a Wifi password with very little effort. Even though this is unnerving, there is no cause for widespread alarm: help is already on the way.
Foreshadow threatens confidential data in cloud environments
After Meltdown and Spectre, two research teams have discovered new security flaws in Intel's processors. The flaw affects all current Core iX as well as XEON CPUs. Learn more about the details of Foreshadow here.
Deeplocker: Interesting, but not yet a threat
AI malware presented at Blackhat security-conference is currently attracting a lot of attention. The clou: This new form of malware uses Artificial Intelligence to decide whether a certain computer will be attacked or not. Although the approach is interesting, G DATA-Experts see no imminent danger.
Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.