Microsoft, Apple versus China, spyware actors
Tech Republic Security
SEPTEMBER 8, 2023
It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Tech Republic Security
FEBRUARY 14, 2024
In a new report from Google's Threat Analysis Group, the researchers detail how commercial surveillance vendors particularly use spyware and target Google and Apple devices.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
APRIL 12, 2024
Apple recommends that iPhone users install software updates, use strong passwords and 2FA, and don’t open links or attachments from suspicious emails to keep their device safe from spyware.
Network World
OCTOBER 18, 2024
Among the fastest-moving frontiers in enterprise cybersecurity: mobile, the internet of things (IoT), and operational technology (OT) systems. of people access the internet with a mobile device, while 59% of internet traffic is generated by mobile devices. Top mobile and IoT/OT targets 5. Today, 96.5%
Tech Republic Security
DECEMBER 22, 2023
ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.
Tech Republic Security
MAY 20, 2022
A commercial surveillance company previously exposed for selling a spyware service dubbed "Predator" keeps targeting users and uses 0-day exploits to compromise Android phones. Learn more about how to protect yourself from it.
Network World
AUGUST 25, 2016
The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates. Earlier this month, Mansoor received an SMS text message on his iPhone claiming to offer “new secrets” about tortured detainees in his country.
CTOvision
APRIL 28, 2014
For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Also, defensive measures keyed to the Critical Controls coordinated by and for the community by the Council on Cyber Security are also provided in each of the attack patterns.
SecureWorld News
OCTOBER 24, 2022
The app then connected to a malicious server and downloaded spyware to the phone, listening in on calls and viewing text messages for nearly a year and a half. Behind the attack is spyware manufacturer NSO Group, which sells technology to governments and law enforcement agencies, Bloomberg reported.
Dataconomy
DECEMBER 16, 2024
Serbian police reportedly deployed a new spyware, NoviSpy, to monitor journalists and activists, according to a report by Amnesty International. The report highlights the specific case of independent journalist Slavia Milanov, who experienced a breach of privacy when police detained him in February and allegedly compromised his mobile phone.
SecureWorld News
APRIL 15, 2024
Apple has escalated its fight against the commercial spyware industry enabling state actors to conduct highly-targeted cyberattacks against journalists, activists, politicians, and other high-risk individuals around the world. The developers go to great lengths to remove any clues that might link the software back to them or their clients."
SecureWorld News
JULY 8, 2022
Apple announced plans to launch a new security feature called "Lockdown Mode" that will be available this fall when Apple releases its annual iOS update. Configuration profiles cannot be installed, and the device cannot enroll into mobile device management (MDM), while Lockdown Mode is turned on.
SecureWorld News
JUNE 27, 2022
The commercial spyware industry is alive and thriving, according to a report released last week by Google's Threat Analysis Group (TAG). The report specifically details an Italian vendor, RCS Labs, and its "Hermit" surveillance malware (aka spyware) used on mobile phones. RELATED: Spyware Pariah: NSO Group Placed on U.S.
SecureWorld News
NOVEMBER 2, 2022
New research from Lookout reveals the most common mobile threats aimed at federal, state, and local government agencies and their employees—all of which have increased since 2021. The report from Lookout, an endpoint to cloud security company, used the Lookout Security Graph to analyze data specific to government agencies at all levels.
TechSpot
JULY 29, 2022
This week, security group Dr. Web published its June 2022 mobile virus activity report describing around 30 popular Android apps containing trojans, adware, spyware, and other malware. Some had hundreds of thousands or even millions of Google Play Store downloads.
Network World
SEPTEMBER 1, 2016
If you thought your smartphone was safe(r) from the wild west of malware, spyware and other viruses compared with the PC space, think again. Taking the big hit are smartphone infections, which now account for 78% of all infections across the mobile network, says Nokia in its latest Nokia Threat Intelligence Report.
SecureWorld News
SEPTEMBER 14, 2021
The Toronto-based research group works to protect journalists and activists from cyberattacks and spyware. And oftentimes they come across new tech-enabled spying efforts from Israel-based NSO Group, which claims to carefully vet sales of its spyware. Citizen Lab discovers zero-day and zero-click spyware. gif” extension.
TechSpot
DECEMBER 4, 2024
The mobile threat hunting company rolled out a new feature back in May 2024 that allows customers to conduct a professional-grade security scan of their mobile device without having to consult a forensics expert. Of the 2,500 self-initiated scans, Pegasus was discovered on seven devices. Read Entire Article
Gizmodo
FEBRUARY 1, 2022
A whistleblower alleges that the scandal-ridden spyware firm NSO Group once offered a telecom security company “bags of cash” to buy access to its cellular networks, ostensibly so its clients could track specific mobile users within the United States. Read more.
Galido
FEBRUARY 10, 2017
Spyware is an abbreviated term that stands for “spy software” Malicious, spy software is designed for the purpose of gaining access to your computer and often damaging a computer and spreading the malware without the owner knowing. Tips for Spotting Malware and Spyware. What is Malware? There are various types of malware.
SecureWorld News
OCTOBER 5, 2023
Among all the mobile platforms, Apple's iOS stands out as a significant focus for these hackers. Apple recently issued an emergency security update in response to actively exploited iOS Zero-Day vulnerabilities (CVE-2023-42824 and CVE-2023-5217). Apple's relentless security upgrades spur attackers to continuously innovate.
SecureWorld News
NOVEMBER 21, 2023
In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Cytrox is now part of Intellexa."
CTOvision
JULY 6, 2015
Mobile apps drive fleet management GCN (Today) - Fleet management apps at the General Services Administration and State Department give agencies real-time data integration between the field and home office.As The law broadly defines national security as covering everything from finance. The [Advanced Anti-Radiation Guided. The health.
SecureWorld News
NOVEMBER 30, 2023
Lionel Litty, Chief Security Architect at Menlo Security, discussed this trend with SecureWorld News: "Despite all the care taken by Google engineers, we continue to see a steady stream of security issues that are exploitable, including many 0-days that are actually exploited.
SecureWorld News
JULY 10, 2023
The Google Play Store, a widely-trusted source for Android applications, has recently become a battleground for a concerning wave of spyware with ties to China. Operating under the radar, these apps silently collect and transmit sensitive data to servers based in China, posing significant risks to user data security and privacy.
The Verge
OCTOBER 22, 2021
The Commerce Department outlined the change in a press release on Wednesday, which requires US companies to have a license in order to sell spyware and other hacking software to countries “of national security or weapons of mass destruction concern.”. The rule is complex and purposefully so.
The Verge
JANUARY 22, 2022
In 2019, China was caught secretly installing spyware on tourists’ phones who entered from the Xinjiang region. In addition, research group Citizen Lab found that China’s My2022 Olympic app , which all attendees are required to install, is full of security holes that could lead to privacy breaches, surveillance, and hacking.
SecureWorld News
OCTOBER 21, 2022
A new version of the Android malware "FurBall" has been discovered to be used by the threat actor(s) known as Domestic Kitten in a campaign targeting Iranian citizens in a mobile surveillance operation. Researchers believe the purpose of this could be to set up a larger spearphishing attack conducted via text messages.
Dataconomy
MARCH 21, 2025
Types of malware Identifying the various types of malware is important for understanding how to prevent and mitigate risks associated with digital security. Spyware Spyware silently collects user information, tracking activities and stealing sensitive data like passwords and financial details without user consent.
Dataconomy
FEBRUARY 7, 2025
On February 6, Kaspersky confirmed that affected applications had been removed from the App Store, with Apple reporting the deletion of 11 apps that shared code with an additional 89 apps previously rejected or removed due to security concerns. The malware was primarily found in an iOS app named ComeCome, which also appears on Google Play.
Galido
NOVEMBER 21, 2018
Advanced System Protector protects your PC from adware, spyware, phishing scams and other malware threats effectively. This smart security solution offers seamless browsing and PC experience. Bitdefender Total Security 2019. The first two tools we have discussed offers you advanced security features of the year ahead.
SecureWorld News
JUNE 15, 2020
If you help an employee secure the personal accounts of their family and friends, good cyber practices can become a relevant concern that they learn to take seriously. An estimated 75% of Americans used mobile banking in 2019. Use Strong Passwords and Good Password Security. It ranks right up there with the DMV.
SecureWorld News
SEPTEMBER 28, 2020
Here is what they had to say about the malware itself: "This spyware is designed to steal SMS messages, contact lists, and device information along with silently signing up the victim for premium wireless application protocol (WAP) services.". Meticulous Scanner. Desire Translate. Talent Photo Editor - Blur focus. Care Message. Part Message.
SecureWorld News
AUGUST 8, 2022
Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. If you use RDP and/or other potentially risky services, secure and monitor them closely. Enforce MFA. Maintain offline (i.e.,
Kitaboo
SEPTEMBER 6, 2022
These may include their contact information, academic and health records, financial information, social security numbers, etc. Unfortunately, the education sector cannot completely eliminate cyber security threats. However, there are certain steps institutes can take to mitigate them: Have a Strong Security Policy.
SecureWorld News
AUGUST 16, 2023
We normalize the use of surveilling and tracking young people through "parentware" or spyware (software which allows someone to see what someone else is doing on their device) and apps which enable the tracking of someone's location. Online safety advice Even though the timing has to be right, you will regain your online privacy and security.
SecureWorld News
APRIL 11, 2023
When hackers trick people into using their fake Wi-Fi networks and power stations, they can compromise devices, install malware/spyware and steal data. An EV isn't a personal computing device in the same way a phone or laptop is, so the privacy and security implications of compromise through a charging port are quite different.
SecureWorld News
DECEMBER 23, 2020
Pegasus spyware is a phone surveillance solution that enables customers to remotely exploit and monitor devices. The logs from the phone show that the spyware was accessing different frameworks on the phone, including the Celestial.framework and MediaExperience.framework, which can be used to record audio and camera data.
Galido
FEBRUARY 19, 2017
Affecting a mobile phone, a computer, a laptop, or a network server, malware interrupts computing operations, hijacks networks, or access systems. The modern and common types of malware, such as the viruses, worms, spyware, adware, Trojans, and Zombies, primarily target confidential personal, business, or financial information.
Galido
MAY 17, 2017
The free features allow you to have silent protection from dangerous apps or malware, spyware, or viruses. The basic version serves as a great tool for your mobile security needs, so do not worry about upgrading just yet. AVG Antivirus offers a free 30-day-trial of their Pro-version, upon completion of download. Easy to Find.
Dataconomy
JUNE 2, 2023
Kaspersky researchers discovered a previously unknown mobile APT campaign targeting iOS devices. Cold times : At the same time as Kaspersky’s investigation, Russia’s FSB (Federal Security Service) intelligence and security agency has made claims that Apple is working with the NSA.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content