
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
Fake Fortnite apps for Android in circulation
The video game “Fortnite” is currently very popular among young gamers. A version for the Android operating system has been announced for this summer by the developers. Cybercriminals are aiming to play on the impatience of fans and are distributing fake apps.These also include supposed instructions…
Smart Phishing Defence
If you take a closer look at phishing URLs for a while, you are able to identify them at a glance. There are typical patterns in phishing URLs which appear repeatedly. Those cases, in which certain patterns can be observed are generally well-suited to see use in machine learning. Here, you can learn…
Are complex passwords a thing of the past?
"Your password does not meet the security guidelines" - this message will not drive people up the wall anymore after password recommendations have been updated. The 14-year-old password guidelines from NIST are facing an overhaul. This article will explain why.
Error 404: Online gamers at risk!
For a long time, gaming was just considered “a bit of a laugh” or “something for the kids”. Unsurprisingly, the security aspect did not receive a lot of attention – it just wasn’t seen as a problem or particularly relevant. But today’s gamers are not just two players sitting side by side as a dot…
Attacks on SS7 - how safe is my data?
A few days ago reports emerged that attackers have exploited a weakness in a communication protocol which is used for SMS services by mobile carriers. This has increased the susceptibility of processes such as mTAN significantly. We will take a look at the facts and backgrounds as well as measures…
IT Security Trends and Predictions for 2017
There were quite some changes in the area of malware, cyber crime, and IT security in 2016. At the same time the technological progress moved in giant leaps. Apart from desktop PCs and notebooks, smart and connected technologies have been established in both private and industrial environments. Read…
Criminals go phishing for loyalty points and your data
There have been lots of discussions about couponing and loyalty cards such as Payback. Some find the practise of analyzing your shopping habits disagreeable, others just go hunting for those points and use them for rewards. Now, a few weeks short of christmas, G DATA has uncovered a spam campaign…
Bochum CEO Fraud: using allegedly secret transactions as bait
Scammers' profits, based on CEO fraud, are rising worldwide. The losses for companies of all kinds and sizes go into the millions! This holiday season is expected to see a peak in attempted new attacks. Even G DATA was recently hit by such an attack, but its employees reacted attentively and…
Bochum Buying presents for Christmas online? Without doubt!
Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.