Remove Groups Remove Mobile Remove Software Remove Spyware
article thumbnail

Apple Calls Out 'Mercenary Spyware' Vendors Enabling State Surveillance

SecureWorld News

Apple has escalated its fight against the commercial spyware industry enabling state actors to conduct highly-targeted cyberattacks against journalists, activists, politicians, and other high-risk individuals around the world. The developers go to great lengths to remove any clues that might link the software back to them or their clients."

Spyware 101
article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

The report, titled " Predator Files: Caught in the Net ," delves into the operations of the "Intellexa alliance," a complex network of interconnected companies that develop and market powerful spyware used to monitor and manipulate individuals worldwide. The group was 'trafficking in cyber exploits' and U.S. Leighton said.

Spyware 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New FurBall Android Malware Used to Spy on Iranian Citizens

SecureWorld News

A new version of the Android malware "FurBall" has been discovered to be used by the threat actor(s) known as Domestic Kitten in a campaign targeting Iranian citizens in a mobile surveillance operation. Researchers believe the purpose of this could be to set up a larger spearphishing attack conducted via text messages.

Malware 83
article thumbnail

US athletes told to use burner phones at Beijing Winter Olympics

The Verge

“Your device(s) may also be compromised with malicious software, which could negatively impact future use.” In 2019, China was caught secretly installing spyware on tourists’ phones who entered from the Xinjiang region. The Committee’s fears aren’t unfounded.

Spyware 110
article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. Remcos Remcos is marketed as a legitimate software tool for remote management and penetration testing. Qakbot can also be used to form botnets. Enforce MFA.

Malware 89
article thumbnail

Here’s who Apple and Epic are calling to testify in next week’s trial

The Verge

Both lists include Microsoft Xbox executive Lori Wright, for instance, and Epic is calling Adrian Ong from Match Group, which recently criticized Apple in a congressional hearing. Epic and Apple are also preparing to call on outside parties with a stake in the app and gaming world. Apple employees.

Apple 76
article thumbnail

A New-ish Mobile Attack: Zero-Click Spyware

SecureWorld News

The app then connected to a malicious server and downloaded spyware to the phone, listening in on calls and viewing text messages for nearly a year and a half. Behind the attack is spyware manufacturer NSO Group, which sells technology to governments and law enforcement agencies, Bloomberg reported.

Spyware 85