10/28/2016, Bochum Researchers have succeeded in hijacking Android smartphones via a hardware security hole. The experts have called the attack vector “Deterministic Rowhammer” (Drammer for short). In the wrong hands, this can be used to develop powerful malware that can take over the entire smartphone and for...
10/18/2016, Bochum Extortion Trojan Locky caused a sensation among computer users and in the media some eight months ago. Now a new development of the malware is being distributed again. The files it encrypts are given the file ending .ODIN. Malware analysts at G DATA have examined the ransomware more closely and...
G DATA Software AG
G DATA Campus
Public Relations Manager
Phone: +49 (0) 234 - 9762 507