Banking Trojan has targeted Bundestag

Banking Trojan has targeted Bundestag

06/15/2015 - After the initial reports on the attacks on the Bundestag (German Federal Parliament), variants of the Swatbanker family are now putting the Bundestag's intranet on a watch list. The operators of the botnet are apparently trying to steal access data and server responses associated with this site. It is not clear whether this is a new attack or whether the same attackers who were active in May have...

Author: Ralf Benzmüller , Robert Michel , Anton Wendel

G DATA SecurityBlog nominated as "Best European Corporate Security Blog"

G DATA SecurityBlog nominated as "Best European Corporate Security Blog"

05/28/2015 - The team of experts in G DATA’s SecurityLabs feels honored to be nominated in this category. Now, you have the chance to show your support and vote for us. Der Wettbewerb der europäischen Security Blogs findet während der diesjährigen Infosecurity Europe in London statt. Es ist die dritte Auflage dieses Wettbewerbs und G DATA wurde zum ersten Mal nominiert. Wir haben die Chance zum "besten...

Author: Sabrina Berkenkopf

Staying alert when buying banners: Google's advertising service misused for distributing malware

Staying alert when buying banners: Google's advertising service misused for distributing malware

04/10/2015 - The recent case of malware distribution via Google AdSense advertising banners is an arresting example of how quickly a huge number of websites across the world can become embroiled in cyber attacks. A supplier of the advertising network has apparently been compromised. The attackers deployed the Nuclear exploit kit with the aim of infecting millions of users with malware. Since mid-March, Nuclear...

Author: Sabrina Berkenkopf , Matthias Meyer

The power of trust: “Superfish” case turns into a worst case scenario

The power of trust: “Superfish” case turns into a worst case scenario

02/22/2015 - The case of the “Superfish” adware has caused quite a sensation through its association with computer technology company Lenovo. However, the following report shows that “Superfish” is just the tip of the iceberg. It explains the implications of and possibilities for misuse. By way of an example, experts at G DATA SecurityLabs have investigated a piece of update software involved in the case, to...

Author: G DATA SecurityLabs
G DATA | Trust in German Sicherheit