New SectopRAT: Remote access malware utilizes second desktop to control browsers
This new remote access malware creates a second desktop that is invisible to the system's user. The threat actor can surf the Internet using the infected machine.
New SectopRAT: Remote access malware utilizes second desktop to control browsers
This new remote access malware creates a second desktop that is invisible to the system's user. The threat actor can surf the Internet using the infected machine.
New record in 2019: Emotet now has over 30.000 variants and counting
More than 200 new versions per day - the creators of the Emotet Trojan are responsible for the most productive cyber crime campaign currently running. G DATA has discovered more versions in the first half of 2019 than in the whole of 2018.
Vulnerability in WhatsApp: Targeting human rights activists
According to his own statements, a London human rights lawyer has become the target of an attack with an espionage tool. A security vulnerability in Whatsapp made it possible to taget data on a compromised device.
IoT security flaws: 2 Million devices affected
More than two million IoT devices are affected by a current vulnerability. This enables attackers to take control over webcams and other affected devices. At the moment, no fix is in sight.
Group chats: Apple's Facetime turns iPhone into a bug
A security flaw in Apple's Facetime can turn the iPhone into an eavesdropping device. It will transmit a live feed from the device's camera and microphone to the eavesdropper. The affected feature has been cut off for now.
Emotet: G DATA explains cybercrime's all-purpose weapon
No other malware-family is as penetrating and has been in development as long as Emotet. The malware has already caused millions in damage in companies around the world. We explain what Emotet can do and why it is so dangerous.
Emotet: G DATA cautions against Word documents from the Internet
In a current malware campaign, users are lured with the promise of an invoice credit. But the infected Word documents are not a real treat - they install malware in the background.
Messenger: Whatsapp vulnerability threatens billions of users
A vulnerability in Whatsapp can currently only cause the app to crash. However, criminals could further develop the current exploit for malicious purposes. We provide an overview of the situation.
Wifi password cracking made easy
Security researchers have discovered a way to calculate a Wifi password with very little effort. Even though this is unnerving, there is no cause for widespread alarm: help is already on the way.
Foreshadow threatens confidential data in cloud environments
After Meltdown and Spectre, two research teams have discovered new security flaws in Intel's processors. The flaw affects all current Core iX as well as XEON CPUs. Learn more about the details of Foreshadow here.