Botnet: No jailtime for Mirai-creators

09/24/2018 - Their IoT-botnet created damage worth 100 Million US-Dollars. Yet, the developers will serve no jailtime - because they cooperated with the FBI.
Author: Hauke Gierow09/24/2018 - Their IoT-botnet created damage worth 100 Million US-Dollars. Yet, the developers will serve no jailtime - because they cooperated with the FBI.
Author: Hauke Gierow09/07/2018 - More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
Author: Hauke Gierow (Text), Ralf Benzmüller (Data-Analysis)08/21/2018 - Investments in IT security are difficult for many companies, mainly because their economic benefits are not always easy to calculate. Current examples show that this can quickly become expensive, as the producer of the iPhone chips had to experience for himself.
Author: Hauke Gierow08/15/2018 - After Meltdown and Spectre, two research teams have discovered new security flaws in Intel's processors. The flaw affects all current Core iX as well as XEON CPUs. Learn more about the details of Foreshadow here.
Author: Tim Berghoff, Hauke Gierow08/14/2018 - AI malware presented at Blackhat security-conference is currently attracting a lot of attention. The clou: This new form of malware uses Artificial Intelligence to decide whether a certain computer will be attacked or not. Although the approach is interesting, G DATA-Experts see no imminent danger.
Author: Hauke Gierow08/03/2018 - Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
Author: Hauke Gierow & Tim Berghoff08/02/2018 - The game Abstractism prides itself with minimalistic graphics and limited functionality - but leads to even more work for computers. The reason: In the background, crypto currencies are mined on and the players are ripped off.
Author: Hauke Gierow07/30/2018 - Smart homes and connected devices can be found more often by the day. Those devices can add comfort and maybe a little bit of security to people’s everyday lives. But what if the humans using those devices decide to part ways?
Author: Tim Berghoff07/24/2018 - The code of a malware downloader was so cleverly hidden that our analysts initially assumed it was a corrupted file. However, an in-depth analysis shows that this is a novel method for disguising batch and power shell commands.
Author: Hauke Gierow07/23/2018 - If you want to attack a major organization, you do not use the main entrance. You want to use the delivery gate. This old piece of wisdom has become a painful reality for Fiat, Tesla, General Motors, Volkswagen, ThyssenKrupp and others.
Author: Tim Berghoff