
Pirated Wordpress Add-On makes Websites Distribute Malware
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.
Pirated Wordpress Add-On makes Websites Distribute Malware
Wordpress is a popular tool for creating web pages. Numerous extensions make your own programming skills superfluous. However, one should be careful when choosing its extensions.
"Meltdown" and "Spectre": researchers discover severe CPU bugs
International researchers have discovered two severe vulnerabilities in the design of many recent CPUs. The vulnerabilities exist in CPUs from most major vendors, including Intel and AMD, and have been lingering there for over a decade. Microsoft has released an update which is also compatible with…
KRACK attacks against Wifi encryption: here's what you need to know
On Monday, reports emerged about the encryption of WiFi networks being susceptible to attacks. A design flaw in the WPA2 encryption allows the reuse of certain cryptographic keys instead of blocking it. The Belgian research team dubbed the attack “KRACK”.
Warning: Malware-laden version of CCleaner 5.33
Security researchers found out that that one version of the popular system tuning application "CCleaner" was infected with malware. We take a brief look at this case as well as several other cases from the past.
Error 404: Online gamers at risk!
For a long time, gaming was just considered “a bit of a laugh” or “something for the kids”. Unsurprisingly, the security aspect did not receive a lot of attention – it just wasn’t seen as a problem or particularly relevant. But today’s gamers are not just two players sitting side by side as a dot…
Scammers ask people to call - and we are happy to oblige.
For the past few weeks, headlines have been awash with reports about ransomware and other disruptive malware. Since malware in a worry for many people, scammers naturally try to profit off this trend. We had our own Tim Berghoff pose as a victim. Read his full report here.
Petya is back - again
The Petya ransomware, about which the first reports were published in the G DATA blog, occasionally rears its head with some new features (last time as "GoldenEye"). This time is no different - except that this is the first time that Petya uses an exploit from the arsenal of an intelligence agency.…
WannaCry - it's not over
WannaCry's encryptor was deactivated by a kill switch. But the worm component is still active. It crawls the internet for vulnerable systems and captures them where possible. It has recently been hitting US hospitals. In addition, the case WannaCry shows that it could have been worse. Time to…
Warning: Massive "WannaCry" Ransomware campaign launched
An outbreak of the latest version of "WannaCry" has been claiming victims in several countries. The speed and ferocity of the outbreak has taken many by surprise. Researchers are as yet puzzled as to the origin of the outbreak which hit 11 countries within just three hours. So far Spain and Russia…
Attacks on SS7 - how safe is my data?
A few days ago reports emerged that attackers have exploited a weakness in a communication protocol which is used for SMS services by mobile carriers. This has increased the susceptibility of processes such as mTAN significantly. We will take a look at the facts and backgrounds as well as measures…