This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The controversial Pegasus spyware continues to stay in the news cycle, as a new report from the Citizen Lab details how the technology was used to target pro-democracy activists in Thailand. Understandably, this led to mass protests and social media campaigns like #WhyDoWeNeedAKing and #FreeYouth. Pegasus spyware in Thailand.
Lockdown Mode is designed to protect users who could be targeted by "the most sophisticated digital threats," such as spyware developed by private companies like the highly controversial NSO Group. Back in November 2021, the NSO Group was blacklisted by the U.S. Back in November 2021, the NSO Group was blacklisted by the U.S.
The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning in April that the group was targeting cryptocurrency and blockchain companies and that it was using social engineering schemes to gain access to the victim's network. This was discontinued in December 2021, but the allowlist access was not revoked.
Federal Communications Commission (FCC) issued a warning in fall 2021, titled "'Juice Jacking': The Dangers of Public USB Charging Stations," giving travelers notice before the busy holiday travel season. "If Carry your own charger and USB cord and use an electrical outlet instead.
These may include their contact information, academic and health records, financial information, social security numbers, etc. It can help protect the network from various attacks, including viruses, worms, spyware, and ransomware. Digital Publishing / February 8, 2021. Digital Publishing / April 21, 2021.
Common Types of Cyber Attacks Common techniques that criminal hackers use to penetrate systems include social engineering, password attacks, malware, and exploitation of software vulnerabilities. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.”
Protecting military mobile devices Standards and policies will be implemented to secure Department of Defense mobile devices from foreign spyware. Agencies must report any compromises involving foreign spyware over the past two years. "We're finally repaying those businesses so they can maintain essential connectivity."
Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. In early September 2021. Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content