Posts Tagged ‘Spyware’

European Data Protection Supervisor call for bans on surveillance spyware like Pegasus

The European Data Protection Supervisor authority called for a ban on the development and the use of Pegasus-like commercial spyware. The European Data Protection Supervisor (EDPS) authority this week called for a ban on the development and the use of surveillance software like the Pegasus spyware in the EU. Pegasus is a surveillance malware developed by the Israeli surveillance NSO […]

Leave a Comment

Spyware, ransomware and Nation-state hacking: Q&A from a recent interview

I transcribed a recent interview, here some questions and answers about nation-state hacking, spyware, and cyber warfare. Enjoy” How has spyware changed the rules of cyber security in recent years? What will cyber security look like now that those tools are all over the internet? In the last decade, we have observed a progressive weaponization […]

Leave a Comment

New York Times Journalist Hacked with NSO Spyware

Spyware : It’s Not What You Think 7 Steps to Removing Spyware

Leave a Comment

Female journalists and activists say they had their private photos shared on social media by governments seeking to intimidate and silence them.

Female journalists and activists say they had their private photos shared on social media by governments seeking to intimidate and silence them. ‘I will not be silenced’: Women targeted in hack-and-leak attacks speak out about spyware Ghada Oueiss, a Lebanese broadcast journalist at Al-Jazeera, was eating dinner at home with her husband last June when […]

Leave a Comment

XLoader, a $49 spyware that could target both Windows and macOS devices

Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and macOS PCs. XLoader is a very cheap malware strain that is based on the popular Formbook Windows malware.  FormBook is a data-stealing malware that is used in cyber espionage campaigns, like other spyware it is capable of […]

Leave a Comment

NSO Group Hacked

There’s a lot to read out there. Amnesty International has a report. Citizen Lab conducted an independent analysis. The Guardian has extensive coverage. More coverage. Most interesting is a list of over 50,000 phone numbers that were being spied on by NSO Group’s software. Why does NSO Group have that list? The obvious answer is that NSO Group provides spyware-as-a-service, and centralizes […]

Leave a Comment

10 non negotiables for Internet security

Image via Wikipedia 10 non-negotiables for Internet security covering 10 tips for safe Internet experience either at home or the workplace. Watch 10 non-negotiables for Internet security video Related book Essential Computer Security: Everyone’s Guide to Email, Internet, and Wireless Security Related articles by Zemanta How To Find A Reliable Home Security Company ( Common […]

Comments (1)

Viruses That Leave Victims Red in the Facebook

Image by Intersection Consulting via Flickr By BRAD STONE – It used to be that computer viruses attacked only your hard drive. Now they attack your dignity. Malicious programs are rampaging through Web sites like Facebook and Twitter, spreading themselves by taking over people’s accounts and sending out messages to all of their friends […]

Comments (2)

Five ways to lose your identity

By Jaikumar Vijayan The rush by shoppers to the Web makes the season a great time for online retailers. It’s also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online. Checkout huge savings on Today’s Hot Deals on Information Security Solutions for […]

Comments (1)

Web Services and Security

Cloud Security and Privacy Because of financial incentive, malicious software threats are real and attackers are using the web to gain access to corporate data. Targeted malicious software’s are utilized to steal intellectual property and other confidential data, which is sold in the black market for financial gain. With use of social media in corporate […]

Leave a Comment

Harmful Spyware and their stealthier means

Spyware is utilized to gather information about a person with or without their consent and it intercept or record personal/financial information. Some spyware are capable of sending information back to another computer (originator of the spyware). Characteristic of Spyware • Compromise user machine without their knowledge • Use vulnerabilities in the software to push a […]

Comments (8)