article thumbnail

Google’s Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Tech Republic Security

In a new report from Google's Threat Analysis Group, the researchers detail how commercial surveillance vendors particularly use spyware and target Google and Apple devices.

Spyware 167
article thumbnail

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Tech Republic Security

ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.

Malware 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Pegasus Spyware Discovered on Spanish PM's Phone

SecureWorld News

The highly controversial Pegasus spyware has been found on the mobile phones of Spain's prime minister Pedro Sánchez, as well as the defense minister Margarita Robles, according to the Spanish government. Pegasus spyware remains problematic around the world. Could Spain be spying on its own people?

Spyware 77
article thumbnail

Notorious Spyware Firm Reportedly Offered 'Bags of Cash' for Access to U.S. Networks

Gizmodo

A whistleblower alleges that the scandal-ridden spyware firm NSO Group once offered a telecom security company “bags of cash” to buy access to its cellular networks, ostensibly so its clients could track specific mobile users within the United States. Read more.

Spyware 63
article thumbnail

Government Employees at High Risk for Mobile Phishing

SecureWorld News

New research from Lookout reveals the most common mobile threats aimed at federal, state, and local government agencies and their employees—all of which have increased since 2021. The report from Lookout, an endpoint to cloud security company, used the Lookout Security Graph to analyze data specific to government agencies at all levels.

article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. For more see: Data Breach Investigations Report (DBIR). Automate with them.

Report 310
article thumbnail

If you have any of these Android apps, uninstall them now

TechSpot

This week, security group Dr. Web published its June 2022 mobile virus activity report describing around 30 popular Android apps containing trojans, adware, spyware, and other malware. Some had hundreds of thousands or even millions of Google Play Store downloads.

Spyware 126