article thumbnail

Apple Calls Out 'Mercenary Spyware' Vendors Enabling State Surveillance

SecureWorld News

Apple has escalated its fight against the commercial spyware industry enabling state actors to conduct highly-targeted cyberattacks against journalists, activists, politicians, and other high-risk individuals around the world. The developers go to great lengths to remove any clues that might link the software back to them or their clients."

Spyware 113
article thumbnail

Here’s how to check your phone for Pegasus spyware using Amnesty’s tool

The Verge

Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Illustration by Alex Castro / The Verge. It will take some amount of technical skill or a bit of patience.

Spyware 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSO’s Pegasus spyware: here’s what we know

The Verge

Throughout the past week, we’ve seen story after story about a company called NSO Group, and a piece of spyware called Pegasus. Amnesty International ran detailed forensics on 67 smartphones to look for evidence that they were targeted by Pegasus spyware — and 37 of those phones tested positive. Illustration by Alex Castro / The Verge.

Spyware 113
article thumbnail

Microsoft Word exploit linked to cyberspying in Ukraine conflict

Network World

A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage. Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents.

Microsoft 150
article thumbnail

Beware the Cyber Ghouls: Spooky Threats Lurking in Digital Shadows

SecureWorld News

Like vampires, malware strains can operate quietly, leeching data or encrypting files without warning, making ransomware and spyware infections incredibly haunting. Breaking the spell : Employ a robust backup strategy, disable macros in documents, train employees to recognize suspicious links, and deploy endpoint detection and response tools.

Malware 120
article thumbnail

Court blocks American from suing Ethiopia for infecting his computer

Network World

citizen from filing a civil suit against the African country, which allegedly infected his computer with spyware and monitored his communications. The person, who is referred to in court documents by the pseudonym Kidane, was born in Ethiopia and lived there for 30 years before seeking asylum in the U.S.

Spyware 150
article thumbnail

US sanctions NSO Group, others, for trafficking spyware and exploits

TechSpot

The Department of Commerce's Bureau of Industry and Security (BIS) is updating its list of sanctioned entities with a document it plans to fully publish on Thursday, but is viewable in a PDF now. It claims all four groups are engaged in activities "contrary to the national security or foreign.

Groups 119