The Latest in IT Security

Posts Tagged ‘spying’

Most Trojans are basically the same: Having penetrated a device, they steal the owner’s payment information, mine cryptocurrency for the attackers, or encrypt data and demand a ransom.

Read more ...

After a recent investigation, Mexican NGOs allege that the Mexican government is deploying sophisticated mobile spying software on local journalists, lawyers and activists. Using fake custom messages, such as news, pictures and text messages to lure victims into clicking various URLs, a series of zero-day vulnerabilities would be exploited to allow remote control of the targeted devices.

Read more ...

Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.

Read more ...

Categories

MONDAY, OCTOBER 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks