Drammer: Are hardware vulnerabilities the Achilles heel of Android?

Drammer: Are hardware vulnerabilities the Achilles heel of Android?

10/28/2016 - Mobile devices, especially smartphones, are a very lucrative target for cyber criminals because they are a fixture of everyday private and working life. Researchers at VUSec Labs, the University of California and Graz University of Technology have succeeded in exploiting a security hole in Android smartphone hardware. The experts have called the attack vector “Deterministic Rowhammer” (Drammer for...

Author: Christian Lueg

Meet the latest member of the Locky family: Odin

Meet the latest member of the Locky family: Odin

10/13/2016 [UPDATE: 10/25/2016] - Towards the end of September, the makers of the infamous Locky ransomware have launched a new campaign to spread a new version of the crypto malware. The most obvious difference is the file extension: to identify encrypted personal files, it will be changed to *.odin. Otherwise it bears much resemblance with an earlier version which used the *.zepto file extension. Users of G DATA solutions are...

Author: Jaydee Valdez

World of Warcraft: one simple line of code can cost you dearly

World of Warcraft: one simple line of code can cost you dearly

07/22/2016 - A few days ago, a new type of gold/item scam made the rounds. Usually scamming in MMORPGs is done using social engineering techniques, e.g. an attacker sells a fake item code for alleged in-game items like mounts to a potential victim for in-game currency. But this most recent kind of attack does not only involve social engineering but also relies on the misuse of a previously undocumented feature...

Author: Sascha Curylo & Sabrina Berkenkopf
G DATA | Trust in German Sicherheit