Cybersecurity Threat: Android Malware “Gooligan” Hits 1 Million Google Accounts

| December 1, 2016

article image
In one of the largest recent cybersecurity breaches, malware that is being called “Gooligan” has hit more than 1 million Google accounts through the Android operating system. According to a CNBC report just out, Asia is ground zero for this malware attack since the majority of affected accounts are located there. The malware has been around since August this year, but it now seems to have gotten out of hand with over 1 million instances recorded. Researchers from Check Point Software Technologies said that the malware affects devices running Android, and hacks into Gmail, Google Photos, Google Docs, Google Play, Google Drive and G Suite, stealing valuable information from those user accounts.

Spotlight

Rogue Wave Software

Rogue Wave tools span 40 years, offering everything from cloud-based-services to native platform applications to portable software libraries. But they all have a common, singular purpose: Making it easy to write, test, and run complex code. Our capabilities cover different languages, code bases, and platforms. Simply put, we meet development where – and how – it happens. Whether it’s finding the right algorithm to forecast outcomes, building the foundation of C++ applications, debugging multi-threaded and multi-core software, understanding open source use in proprietary code, or discovering security bugs earlier in development, we can help. Code is where we live, what we care about, and how we make our customers’ software better. We’re the largest independent provider of cross-platform software development tools and embedded components in the world. Through decades of solving the most complex problems across financial services, telecommunications, healthcare, government, academia

OTHER ARTICLES

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

Work From Home: Cyber Security During Covid-19

Article | April 14, 2020

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different businesses, economies and societies but the one domain that had remained resilient through all the past crises and is going solid in COVID-19 as well is Cyber security. While most of the sectors globally have been affected, Cybersecurity’s importance to organizations, consumers and home users have not only remained strong but have been increased drastically.

Read More

Covid-19 cyber security threat to impact businesses

Article | April 1, 2020

With millions of employees having to work from home, companies are having to look at how to keep as many business-critical functions running as possible while at the same time maintaining adequate security. “In the last week alone, we have seen phishing emails go from 25,000 a day to 125,000 – a 500 per cent increase – which means the risk is real," explains Andrew Jackson, CEO of Intercity Technology. "Whilst firewalls included within domestic broadband routers are considered sufficient for personal use and occasional homeworking, they’re not necessarily capable of withstanding prolonged periods of remote working from a large proportion of the workforce, which is why we are seeing more businesses and their employees become the targets of malicious hackers. "Just because employees are now home based doesn’t mean that security and privacy regulations such as GDPR are null and void and therefore, working closely with a trusted IT security partner is vital to help mitigate against any potential risks.

Read More

5 Benefits of Investing in Cyber Security & IT solutions in 2021

Article | June 2, 2021

Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that cyber-attacks can affect the most solid of businesses and create PR nightmares for brands built painstakingly over the years. Investing in cyber security training, cyber security advisory services and the right kind of IT support products, has therefore, become imperative in 2021. Investing in cyber security infrastructure, cyber security certification for employees and IT solutions safeguards businesses from a whole spectrum of security risks, ransomware, spyware, and adware. Ransomware refers to malicious software that bars users from accessing their computer system, whereas adware is a computer virus that is one of the most common methods of infecting a computer system with a virus. Spyware spies on you and your business activities while extracting useful information. Add social engineering, security breaches and compromises to your network security into the mix, and you have a lethal cocktail.

Read More

Spotlight

Rogue Wave Software

Rogue Wave tools span 40 years, offering everything from cloud-based-services to native platform applications to portable software libraries. But they all have a common, singular purpose: Making it easy to write, test, and run complex code. Our capabilities cover different languages, code bases, and platforms. Simply put, we meet development where – and how – it happens. Whether it’s finding the right algorithm to forecast outcomes, building the foundation of C++ applications, debugging multi-threaded and multi-core software, understanding open source use in proprietary code, or discovering security bugs earlier in development, we can help. Code is where we live, what we care about, and how we make our customers’ software better. We’re the largest independent provider of cross-platform software development tools and embedded components in the world. Through decades of solving the most complex problems across financial services, telecommunications, healthcare, government, academia

Events