article thumbnail

Spyware targets North Korean dissidents via social links, says McAfee

Computer Weekly

Researchers at security firm McAfee have confirmed that social networks are being used to target North Korean dissidents with spyware

Spyware 111
article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

Spyware 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Apple patches iOS security flaws found in spyware targeting activist

Network World

The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found.

Spyware 60
article thumbnail

Stealth Falcon group uses custom spyware, fake journalists to target UAE dissidents

Network World

Meet Stealth Falcon, a sophisticated and likely state-sponsored cyberespionage group, which is hell bent on conducting targeted spyware attacks “against Emriati journalists, activists and dissidents.” The digital attacks started in 2012 and are still being carried out against United Arab Emirates (UAE) dissidents.

Spyware 60
article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

Here are my key take-aways from this year’s research: In every measure that matters, in every category, the bad guys are getting faster by automating. 92% of attacks studied in this research can be described and categorized by nine basic attack patterns of: Crimeware. Then it will communicate out. Automate with them.

Report 310
article thumbnail

There's now a tool to test for NSA spyware

Network World

A security researcher has come up with a free tool that can tell. Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. Has your computer been infected with a suspected NSA spying implant? National Security Agency.

Spyware 118
article thumbnail

The Zero Click, Zero Day iMessage Attack Against Journalists

SecureWorld News

Pegasus spyware is a phone surveillance solution that enables customers to remotely exploit and monitor devices. He was concerned that his phone had been hacked he contacted Toronto's Citizen Lab and agreed to let them install a VPN application that would give researchers a chance to track metadata associated with his Internet traffic.

Spyware 52