Encryption Trojan Locky: What you need to know about the ransomware

Encryption Trojan Locky: What you need to know about the ransomware

02/25/2016 - In recent months and perhaps even years, there has hardly been a single computer malware strain that has been so prominent in media reports as the ransomware Locky. The reports of tens of thousands of computers being infected every day are unsettling. Many users are wondering what can be done about the daintily-named malware. Experts at G DATA SecurityLabs are providing an overview and tips for a...

Author: Sabrina Berkenkopf

GAME OVER: HOW A COLOURFUL GAME TURNED INTO A SUBSCRIPTION TRAP

GAME OVER: HOW A COLOURFUL GAME TURNED INTO A SUBSCRIPTION TRAP

01/27/2016 - Premium SMS messages were the first attacks on Android users – almost six years ago, malware with this functionality was the primary risk. Since then of course, the malware landscape for mobile devices has moved on significantly. For this very reason, it is notable that a new type of subscription trap has been evident in the current Google Play store for several weeks now, causing Android users...

Author: Sabrina Berkenkopf

G DATA Exploit Protection effectively prevents attacks by infected Magento shops

G DATA Exploit Protection effectively prevents attacks by infected Magento shops

10/22/2015 - Thousands of online shops running an outdated version of the Magento eCommerce platform have been infected with malware since 18 October 2015, according to a report by security firm Sucuri (https://blog.sucuri.net/2015/10/massive-magento-guruincsite-infection.html). The infected shops distribute exploit kits to visitors in order to steal payment or login data. This is the third largest wave of...

Author: Siebert, Thomas , Christian Lueg
G DATA | SIMPLY SECURE