Notorious iOS spyware has an Android sibling

Network World

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be. On Monday, Google and security firm Lookout disclosed the Android spyware, which they suspect comes from NSO Group, an Israeli security firm known to develop smartphone surveillance products. Fortunately, the spyware never hit the mainstream.

New Android spyware can record your voice, take photos with your camera, and steal app data

Tech Republic Security

The Lipizzan spyware family, which can record calls and screenshots, was recently discovered and blocked by Google Security researchers

Trending Sources

There's now a tool to test for NSA spyware

Network World

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell. Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It's designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.

Reckless abuse of surveillance spyware sold to governments (again)

Network World

We keep seeing a common theme when it comes to spyware sold exclusively to governments, surveillance spyware which is marketed as lawful tools to help governments fight crime and terrorism; those remote intrusion solutions are increasingly used to spy on people who the governments consider to be a threat because those people are revealing the truth to the public.

How to Avoid Spyware

IT Toolbox

This post looks at a few ways to avoid getting spyware

Apple patches iOS against potent zero-day spyware attack

Network World

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others. The attack, called Pegasus, is flexible, letting attackers steal a broad range of data from iPhones and iPads, according to the firms that discovered it. “In

Apple patches iOS security flaws found in spyware targeting activist

Network World

The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found. To spy on a human rights activist, hackers allegedly connected to a Middle Eastern government used three previously unknown vulnerabilities in Apple’s iOS.

Verizon's new app launcher brings spyware to all its Android phones, says EFF

Tech Republic Security

Verizon's impending release of a new app launcher for Android called AppFlash has some privacy experts worried, as the launcher collects a lot of personal information for advertising

Unknown Government Using Advanced Hacking Spyware to Attack Russia and Saudi Arabia

Data Center Knowledge

Data collection and spying continues to make news with a never before seen complex surveillance software called Regin. Read More. Shared

Why CIOs May Be The Company's Biggest Security Risk (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

Post tags: company hierarchies , corporate network , cybercrime , email attachment , firewall , hacker , hackers , job posting , LinkedIn , personal gadget , spear-phishing attack , spyware , viruses. Your actions may be inviting danger into the company. The world is a very dangerous place.

The modern guide to staying safe online

Network World

Phishing emails from supposed family members, spyware piggybacking on legitimate apps, well-known sites hijacked with malicious code -- digital safety clearly needs new rules to meet today's evolving threatscape. The internet can be a scary place. Threats come in many forms, lurking in practically any corner. Worse, yesterday’s prevailing advice for staying safe online -- avoid dodgy websites, don’t traffic in stolen or illegal goods, interact only with people you know -- no longer holds.

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

They do what it takes to get in, including devising very sophisticated phishing schemes, creating spyware, placing code in RAM, leaving hacker tools, installing rootkits and continually adjusting/re-placing spyware. By Bob Gourley.

Video: Did your HP laptop come with preinstalled spyware?

Tech Republic Security

Several of HP's laptops have a keylogging problem: The audio driver is actually saving every press you make to an unsecured log file

Malicious online ads expose millions to possible hack

Network World

Since October, millions of internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install Trojans and spyware, according to security firm ESET. The attack campaign, called Stegano, has been spreading from malicious ads in a “number of reputable news websites,” ESET said in a Tuesday blog post. It’s been preying on Internet Explorer users by scanning for vulnerabilities in Adobe Flash and then exploiting them.

How to Remove Malware Tips

Galido

These can include: Spyware. Today, malware is often created for profit through forced (adware) advertising, stealing sensitive information (spyware), email spamming via infected computers, or to extort money (ransomware).

Microsoft Releases Security Advisory 2914486

IT Pros Rock!

We also always encourage people to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Today we released Security Advisory 2914486 regarding a local elevation of privilege (EoP) issue that affects customers using Microsoft Windows XP and Server 2003. Windows Vista and later are not affected by this local EoP issue.

Microsoft Releases Security Advisory 2896666

IT Pros Rock!

As a best practice, we always encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Today we released Security Advisory 2896666 regarding an issue that affects customers using Microsoft Windows Vista and Windows Server 2008, Microsoft Office 2003 through 2010, and all supported versions of Microsoft Lync.

Microsoft Releases Security Advisory 2887505

IT Pros Rock!

As a best practice, we always encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Today we released Security Advisory 2887505 regarding an issue that affects Internet Explorer. There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9, although the issue could potentially affect all supported versions.

ActiveX Control issue being addressed in Update Tuesday

IT Pros Rock!

As a best practice, we always encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Late last Friday, November 8, 2013, a vulnerability, CVE-2013-3918, affecting an Internet Explorer ActiveX Control was publically disclosed.

Fed Tech News Roundup

CTOvision

Hacking Team gets hacked; invoices show spyware sold to repressive govts Ars Technica (Today) - A controversial company that sells weaponized spyware has been penetrated by hackers who claim to have plundered more than 400GB worth of e-mails, source code, and other sensitive data—including invoices.

Cyber Security Skills Businesses Will Look For in 2017

CTOvision

While companies go to the cloud, they also need professionals with network security management skills to survey the on-goings within the network and pinpoint suspicious behavior, as well as develop on-point and immediate counter measures should malware or spyware successfully find its way into the system. Rick Delgado. The coming year brings new opportunities for businesses to grow and develop with the latest data tools, but with this advancement comes a series of risks and downfalls.

Worst Computer Viruses

Galido

33% of the world’s computers have been affected by malicious software: viruses, trojans, trojan downloaders and droppers, unwanted software, adware, exploits, worms, phishing and monitoring tools, backdoors, spyware Countries most affected: China, South Korea, Taiwan, Turkey.

Why your smartphone is sicker than a room full of snotty toddlers

Network World

If you thought your smartphone was safe(r) from the wild west of malware, spyware and other viruses compared with the PC space, think again. A new report from Nokia proclaims a “sharp rise in the occurrence of smartphone malware infections” in the first half of 2016. Taking the big hit are smartphone infections, which now account for 78% of all infections across the mobile network, says Nokia in its latest Nokia Threat Intelligence Report.

Download YouTube Videos

Galido

Looking to download Youtube videos in high definition, full quality formats, at fast speeds without visiting third party websites immersed in ads and spyware? Why we like it: No adware, spyware or bundleware.

Managing the People Side of Cyber Security

ITGCT

For instance, inappropriate Internet use by people within your company can let in malware or spyware, which can compromise your system or leak important information. We tend to imagine cyber security as a wall we need to build around a company to keep invaders out.

Appeals court rules Americans have no legal recourse if hacked by foreign governments

Network World

Put aside the matter of Russian interference in our presidential election to instead consider this scenario: If Vladimir Putin ordered his government-employed hackers to plant spyware on your personal computer – stealing all your data and even recording your Skype calls – you would have no access to any legal remedy in the U.S.

The Importance of Security in the Online Space

Doctor Chaos

Many of us would like to think we are not the gullible type but as spyware and scammers become increasingly sophisticated, anyone could be at risk. […].

Dell: Privately owned PC and server maker

CTOvision

5 Free Tools to Prevent Viruses and Spyware from Crippling Your PC (pcrichard.com). Research Team. Dell Inc is privately owned. So it is hard to say what their exact size is, but before being delisted they were number 51 on the Fortune 500 list, so they have mass. We still see Dell frequently in the enterprise IT space and know all technologists have familiarity with what they can do in servers and the data center.

Dell 28

Nuke your computer

Galido

DBAN is also a commonly used solution to remove viruses and spyware from Microsoft Windows installations. DBAN is free erasure software designed for the personal user. It automatically deletes the contents of any hard disk that it can detect.

Using XaaS for your business? Then you need one of these multifactor authentication apps

Tech Republic Data Center

Spyware, brute force attacks, dictionary attacks, and phishing can make circumventing passwords easy. The password simply isn't secure anymore. Here are five tools to add an extra layer of security

Fed Tech Roundup July 24

CTOvision

Advanced spyware for Android now available to script kiddies everywhere. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. How to apply threat intelligence feeds to remediate threats. Hortonworks Named to 2015 CRN Emerging Vendors List; Mitch Ferguson Comments. Federal Lab Explodes, Police Say Evidence Points to a Meth Lab | Mediaite - Mediaite.

Programs are spies and they like us.

IT Toolbox

I just recently read a news article on how HP sneakily slipped in a spyware program onto recent HP computers under the guise of an update. It seems that the bigger you are the more incentive you have to spy on people for fun and profit. However, it wasn't an update at all but a new program altogether and it sent information back to HP on a daily basis. People have given reports

HP 2

Microsoft Word exploit linked to cyberspying in Ukraine conflict

Network World

A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage. Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents. On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual.