Drammer: Are hardware vulnerabilities the Achilles heel of Android?

Drammer: Are hardware vulnerabilities the Achilles heel of Android?

10/28/2016 - Mobile devices, especially smartphones, are a very lucrative target for cyber criminals because they are a fixture of everyday private and working life. Researchers at VUSec Labs, the University of California and Graz University of Technology have succeeded in exploiting a security hole in Android smartphone hardware. The experts have called the attack vector “Deterministic Rowhammer” (Drammer for...

Author: Christian Lueg

Meet the latest member of the Locky family: Odin

Meet the latest member of the Locky family: Odin

10/13/2016 [UPDATE: 10/25/2016] - Towards the end of September, the makers of the infamous Locky ransomware have launched a new campaign to spread a new version of the crypto malware. The most obvious difference is the file extension: to identify encrypted personal files, it will be changed to *.odin. Otherwise it bears much resemblance with an earlier version which used the *.zepto file extension. Users of G DATA solutions are...

Author: Jaydee Valdez
G DATA | Trust in German Sicherheit