mTAN fraud relies on conventional Trojans
In the last couple of days, a fraud has come to light in which mTAN-protected online banking accounts (also known as smsTAN or mobileTAN) have been plundered.
mTAN fraud relies on conventional Trojans
In the last couple of days, a fraud has come to light in which mTAN-protected online banking accounts (also known as smsTAN or mobileTAN) have been plundered.
Internet of (Things) Trouble ... the continuing story
A half year ago we wrote about the expected problems related to IoT. And guess what? Unfortunately we were right. It even became worse in the past 6 months. Nearly everything what was described back then became exploited. And that’s not a good thing.
Vulnerability in Android media engine Stagefright
Current media reports talk of a vulnerability that should be taken seriously and that allegedly affects 95% of all Android mobile devices. For this reason the problem has huge implications; nevertheless, it is important to react to this information with a level head. G DATA is providing tips to…
Five years of FakePlayer - this also means five years of Android malware
In October 2010 the discovery of Android.Trojan.FakePlayer.A, the first known malware for the Android operating system, struck us at G DATA SecurityLabs like a bombshell. Once the initial commotion had died down, a number of questions arose
IT Security, Foosball and Charity: VB 2014 had it all
The VB International conference is a worldwide institution when it comes to IT-Security and its 24th edition held some remarkable highlights. Technical and corporate audiences were able to follow high-class talks and presentations about threats and dangers the industry faces, possible solutions and…
Android smartphone shipped with spyware
For the first time ever, the experts at the German security vendor have discovered a smartphone that comes with extensive spyware straight from the factory. The malware is disguised as the Google Play Store and is part of the pre-installed Android apps. The spyware runs in the background and cannot…
Android Malware goes "To The Moon!"
The latest case involves a manipulated copy of a popular radio application. The original app has already been downloaded millions of times from the Google Play Store. Attackers are aiming to exploit this popularity to distribute their own app as much as possible. They have begun circulating a…
Worth looking again: fake Flash Player apps in Google Play store
At the weekend, a number of fraudulent apps pretending to be Adobe Flash Player appeared on the official Google Play store. Of the three apps we looked at, all demanded payment from the user before installation and one even spied on the user in the background. Google reacted fast and deleted the…
Android malware barometer shows that a storm is brewing
For cyber criminals, Android is the number one mobile target. G Data Security Labs registered almost 520,000 new malicious files for the operating system in the first half of 2013, as shown by the current G Data Mobile Malware Report. Versatile Trojan horses were the perpetrators' weapon of choice…
The Android “Master Key” Exploit
Over the last few days much has been written about a serious security hole in the Android operating system that can give attackers complete access to affected mobile devices. Bluebox, the discoverers of the security hole, estimate that 99% of Android devices since v1.6 are vulnerable to the…