Remove 2018 Remove Architecture Remove Surveillance
article thumbnail

Google Responds to Warrants for “About” Searches

Schneier on Security

.” These searches are legal when conducted for the purpose of foreign surveillance, but the worry about using them domestically is that they are unconstitutionally broad. The very nature of these searches requires mass surveillance. The FBI does not conduct mass surveillance. The FBI does not conduct mass surveillance.

article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

The first concern was over high numbers: in both 2016 and 2017, the Foreign Intelligence Surveillance Court issued 40 orders for collection, but the NSA collected hundreds of millions of CDRs, and the agency provided little clarification for the high numbers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

DCRat first appeared in the threat landscape in 2018, but a year later it was redesigned and relaunched. The modular architecture of the malware allows to extend its functionalities for multiple malicious purposes, including surveillance, reconnaissance, information theft, DDoS attacks, and arbitrary code execution.

article thumbnail

U.S. Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp

Security Affairs

Court ordered surveillance firm NSO Group to hand over the source code for its Pegasus spyware and other products to Meta. Judge ordered the surveillance firm to hand over the source code for its Pegasus spyware and other products to the social network giant. from April 29, 2018, to May 10, 2020).

Spyware 143
article thumbnail

Experts found a macOS version of the sophisticated LightSpy spyware

Security Affairs

Researchers spotted a macOS version of the LightSpy surveillance framework that has been active in the wild since at least January 2024. ThreatFabric observed threat actors using two publicly available exploits (CVE-2018-4233, CVE-2018-4404) to deliver macOS implants. The flaw resides in WebKit and impacts macOS version 10.13.3

Spyware 136
article thumbnail

US officials claim Huawei Equipment has secret backdoor for spying

Security Affairs

In November 2018, the Wall Street Journal reported that the US Government was urging its allies to exclude Huawei from critical infrastructure and 5G architectures. Huawei issued a statement on Wednesday denying any accusation, it “has never and will never covertly access telecom networks, nor do we have the capability to do so.”.

article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Loucaides One type of common firmware vulnerability isn’t so much a coding flaw as it is an architectural soft spot, if you will. “They’re able to bypass protections for operating systems and bypass protections for virtualization, as well as bypass almost any of the other protections in the system.”

Firmware 233