Remove Data collection Remove Document Remove Surveillance
article thumbnail

New LightSpy spyware variant comes with enhanced data collection features targeting social media platforms

Security Affairs

Researchers found an updated LightSpy spyware with enhanced data collection features targeting social media platforms like Facebook and Instagram. have found an updated version of the LightSpy spyware that supports an expanded set of data collection features to target social media platforms like Facebook and Instagram.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

MY2022 is fairly straightforward about the types of data it collects from users in its public-facing documents. However, as the app collects a range of highly sensitive medical information, it is unclear with whom or which organization(s) it shares this information.

article thumbnail

Tor Project responded to claims that law enforcement can de-anonymize Tor users

Security Affairs

German law enforcement agencies have been surveilling Tor network by operating their own servers for months. Research conducted by ARD’s Panorama and STRG_F revealed that data collected during surveillance is processed using statistical methods, effectively breaking Tor’s anonymity. ” reported the NDR.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The documents also revealed the existence of other spy bases located in secret places identified with codes “TIMPANI”, “GUITAR” and “CLARINET”. The documents mention a clandestine program, coded as RAMPART-A , which was conducted with secret arrangements of other intelligence agencies.

Wireless 145
article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

ANALYSIS Data brokers like National Public Data typically get their information by scouring federal, state and local government records. Americans may believe they have the right to opt out of having these records collected and sold to anyone. The breach at National Public Data may not be the worst data breach ever.

Hacking 350
article thumbnail

Stalkerware activity drops as glaring spying problem is revealed

Malwarebytes

It’s spying when governments do it through opaque, mass surveillance regimes, it’s spying when companies do it through shadowy data broker networks that braid together disparate streams of information, and it’s spying when private individuals do it through unseen behavior on personal devices. ” (Emphasis added).