Remove Applications Remove Security Remove Spyware
article thumbnail

Google’s Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Tech Republic Security

In a new report from Google's Threat Analysis Group, the researchers detail how commercial surveillance vendors particularly use spyware and target Google and Apple devices.

Spyware 504
article thumbnail

6 key mobile and IoT/OT attack trend findings

Network World

Overall, ThreatLabz tracked a rise in financially motivated mobile attacks – with 111% growth in spyware and 29% growth in banking malware – most of which can bypass multifactor authentication (MFA). Meanwhile, IoT attacks grew 45% year-over-year, and ThreatLabz identified pervasive security risks in OT environments.

Mobile 418
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google cites progress in Android security, but patching issues linger

Network World

percent of Android devices had installed a " potentially harmful application ," such as spyware, a Trojan, or other malicious software. The internet giant revealed the figures in a new report detailing its efforts to making the Android OS secure. By the end of last year, less than 0.71 That figure was even lower, at 0.05

Google 244
article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Web application attacks. By Bob Gourley. 92% of attacks studied in this research can be described and categorized by nine basic attack patterns of: Crimeware.

Report 310
article thumbnail

Serbian police allegedly use NoviSpy spyware to monitor journalists

Dataconomy

Serbian police reportedly deployed a new spyware, NoviSpy, to monitor journalists and activists, according to a report by Amnesty International. The findings point to a larger trend where physical access to devices enables the installation of spyware. Evidence suggests its development dates back to at least 2018.

Spyware 36
article thumbnail

F-Secure buys Little Flocker to combat macOS ransomware

Network World

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.

Security 150
article thumbnail

Spyware Zero-Days Being Developed Commercially, Google Finds

SecureWorld News

The commercial spyware industry is alive and thriving, according to a report released last week by Google's Threat Analysis Group (TAG). The report specifically details an Italian vendor, RCS Labs, and its "Hermit" surveillance malware (aka spyware) used on mobile phones. RELATED: Spyware Pariah: NSO Group Placed on U.S.

Spyware 95