Remove 2018 Remove Cybersecurity Remove Data collection
article thumbnail

New LightSpy spyware variant comes with enhanced data collection features targeting social media platforms

Security Affairs

Researchers found an updated LightSpy spyware with enhanced data collection features targeting social media platforms like Facebook and Instagram. Cybersecurity researchers at Hunt.io ThreatFabric observed threat actors using two publicly available exploits (CVE-2018-4233, CVE-2018-4404) to deliver macOS implants.

article thumbnail

NSA Mass Surveillance Program Is Ruled Illegal

Adam Levin

Bush in the wake of the September 11 attacks, but had been phased out by the NSA between 2018 and 2019 after disuse and technical issues had rendered the data collected unusable. . “[T]he

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.]. This dataset contains products such as home routers, enterprise equipment, smart cameras, security devices, and more.

IoT 235
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Achieving funding is no simple task, and cybersecurity entrepreneurs have a difficult path competing in a complex and competitive landscape. Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Investments in cybersecurity more than doubled from $12 billion to $29.5

article thumbnail

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

In July, DHS’s Customs and Border Patrol (CPB) suspended all federal contracts with Perceptics , a contractor which sells license-plate scanners and other border control equipment, after data collected by the company was made available for download on the dark web.

article thumbnail

Behavioral Analytics in Cybersecurity: Does It Work as Advertised?

eSecurity Planet

In the ever-evolving fight against data loss , data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in an attempt to keep their data safe and secure from threats. Read Hyperautomation and the Future of Cybersecurity.

article thumbnail

UK new information security commissioner is John Edwards

CyberSecurity Insiders

It helps in protecting the rights of citizens and offers a plan to companies on what to do and what not to do when it comes to data collection and its security. UK’s Information Commissioner’s Office (ICO) plays a vital role in regulating the GDPR and other data protection rights as per the Data Protection act of 2018.