This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
After using passwords obtained from one of the countless breaches as a lure to trick victims into paying, the “Hello pervert” sextortion scammers have recently introduced two new pressure tactics: Name-dropping the infamous Pegasus spyware and adding pictures of your home environment. It works well on Android, iOS, and Windows.
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Due to this focus, items primarily affecting enterprises or large organizations may not be included, even if they are widespread or "popular" stories.
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Malware North Korean government hackers snuck spyware on Android app store TechCrunch APT threat actors associated with the North Korean government uploaded spyware "KoSpy" to Google Play.
Gov imposes visa restrictions on individuals misusing Commercial Spyware HPE is investigating claims of a new security breach Experts warn of a surge of attacks targeting Ivanti SSRF flaw How to hack the Airbus NAVBLUE Flysmart+ Manager Crooks stole $25.5
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Google's reCAPTCHA is not only useless, it's also basically spyware Techspot This study demonstrates Google's reCAPTCHA v2 and v3 are flawed and don't actually keep out bots. Tips for finding old accounts.
Last week on Malwarebytes Labs: A proxyjacking campaign is looking for vulnerable SSH servers New technique can defeat voice authentication "after only six tries" "Free" Evil Dead Rise movie scam lurks in Amazon listings Spyware app LetMeSpy hacked, tracked user data posted online Online safety tips for LGBTQIA+ communities Top contenders in Endpoint (..)
Under Meredith Whittaker, It’s Out to Prove Surveillance Capitalism Wrong EU investigating Telegram over user numbers Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs – hacking, newsletter)
In addition to our new suite of advanced theft protection features to help keep your device and data safe in the case of theft, we’re also focusing increasingly on providing additional protections against mobile financial fraud and scams. We’re also sharing new tools and policies to help developers build safer apps and keep their users safe.
The scary part of the story is that a private surveillance firm was aware of the zero-day flaw since at least two years and is actively exploiting the SimJacker vulnerability to spy on mobile users in several countries. The attacker could exploit the flaw to. ” continues the post.
ViceLeaker Android spyware targets users in the Middle East. China installs a surveillance app on tourists phones while crossing in the Xinjiang. Updates for Samsung, the scam app with 10M+ downloads. FBI warns on sextortion scams targeting teenagers. Israeli blamed Russia for jamming at Israeli Ben Gurion airport.
Defining and recognizing tech abuse Malicious online behaviors in the form of those motivated by financial gain, such as scams and fraud, have existed, and awareness around them has been raised for years. A common example of this is surveillance. Earlier, I discussed the normalization of surveillance.
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Due to this focus, items primarily affecting enterprises or large organizations may not be included, even if they are widespread or "popular" stories. this is certainly a news item worth paying attention to.
Uber scam lures victims with alert from a real Uber number Teaching cybersecurity skills to special needs children with Alana Robinson: Lock and Code S02E18.
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion Spyware distributed through Amazon Appstore BADBOX Botnet Is Back Supply Chain Attack on Rspack npm Packages Injects Cryptojacking Malware 4.5
CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog Lazarus APT stole $1.5B Billion Bybit Hack Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B
CISA adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog ConnectOnCall data breach impacted over 900,000 individuals Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise (..)
Treasury issued fresh sanctions against entities linked to the Intellexa Consortium Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812 Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injuries Chinese man charged for spear-phishing against NASA and US Government Data Breach Qilin ransomware attack on Synnovis (..)
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content