Skip to main content

Home/ Digit_al Society/ Group items tagged security ITGS target

Rss Feed Group items tagged

dr tech

How does Apple technology hold up against NSO spyware? | Apple | The Guardian - 0 views

  •  
    "The disclosure points to a problem security researchers have been warning about for years: that despite its reputation for building what is seen by millions of customers as a secure product, some believe Apple's closed culture and fear of negative press have harmed its ability to provide security for those targeted by governments and criminals. "Apple's self-assured hubris is just unparalleled," said Patrick Wardle, a former NSA employee and founder of the Mac security developer Objective-See. "They basically believe that their way is the best way. And to be fair … the iPhone has had incredible success. "But you talk to any external security researcher, they're probably not going to have a lot of great things to say about Apple. Whereas if you talk to security researchers in dealing with, say, Microsoft, they've said: 'We're gonna put our ego aside, and ultimately realise that the security researchers are reporting vulnerabilities that at the end of the day are benefiting our users, because we're able to patch them.' I don't think Apple has that same mindset.""
dr tech

Online scams 'target Apple customers for richer pickings' - BBC News - 0 views

  •  
    "Cybercriminals are targeting people using Apple products as they are more likely to have disposable income, a security expert has warned. Blogger Graham Cluley said that while malware was more common on Windows, Apple customers could not "afford to be lackadaisical" about security. On Monday, he reported a text message scam that tried to trick people into handing over account information. Apple's support site warns customers not to enter details on spoof sites."
dr tech

Police launch inquiry after MPs targeted in apparent 'spear-phishing' attack | Police |... - 0 views

  •  
    "A police investigation has been launched after MPs were apparently targeted in a "spear-phishing" attack, in what security experts believe could be an attempt to compromise parliament. A police force said it had started an inquiry after receiving a complaint from an MP who was sent a number of unsolicited messages last month."
dr tech

If you read Boing Boing, the NSA considers you a target for deep surveillance - Boing B... - 0 views

  •  
    "America's National Security Agency gathers unfathomable mountains of Internet communications from fiber optic taps and other means, but it says it only retains and searches the communications of "targeted" individuals who've done something suspicious. Guess what? If you read Boing Boing, you've been targeted."
dr tech

Huge cybersecurity leak lifts lid on world of China's hackers for hire | Cybercrime | T... - 0 views

  •  
    "A big leak of data from a Chinese cybersecurity firm has revealed state security agents paying tens of thousands of pounds to harvest data on targets, including foreign governments, while hackers hoover up huge amounts of information on any person or institution who might be of interest to their prospective clients. The cache of more than 500 leaked files from the Chinese firm I-Soon was posted on the developer website Github and is thought by cybersecurity experts to be genuine. Some of the targets discussed include Nato and the UK Foreign Office."
dr tech

Facebook says Iran-based hackers used site to target US military personnel | Facebook |... - 0 views

  •  
    "Facebook said on Thursday it had taken down about 200 accounts run by a group of hackers in Iran as part of a cyber-spying operation that targeted mostly US military personnel and people working at defense and aerospace companies. The social media company said the group, dubbed "Tortoiseshell" by security experts, used fake online personas to connect with targets, build trust - sometimes over the course of several months - and drive them to other sites, where they were tricked into clicking malicious links that would infect their devices with spying malware."
dr tech

Algorithm Might Protect Non-Targets Caught In Surveillance, But Only If The Government ... - 0 views

  •  
    "It's highly unlikely investigative or intelligence agencies have much of an interest in protecting the privacy of non-targeted citizens, even in non-terrorist-related surveillance -- not if it means using alternate (read: "less effective") investigative methods or techniques. It has been demonstrated time and time again that law enforcement is more interested in the most direct route to what it seeks, no matter how much collateral damage is generated. "
dr tech

Email scammers targeted by new bot that inundates them with endless annoying questions ... - 0 views

  •  
    "The organisation is inviting anyone who thinks they've been targeted by a scam email to forward it to Re:scam, which will verify if it is a scam or not. It will then use its own email address to target any scammers it manages to detect.  "
dr tech

Google says Chinese hackers who targeted Biden campaign are faking McAfee software - Th... - 0 views

  •  
    "Google said in a new blog post that hackers linked to the Chinese government have been impersonating antivirus software McAfee to try to infect victims' machines with malware. And, Google says, the hackers appear to be the same group that unsuccessfully targeted the presidential campaign of former Vice President Joe Biden with a phishing attack earlier this year. A similar group of hackers based in Iran had tried to target President Trump's campaign, but also was unsuccessful."
dr tech

MarsJoke ransomware threatens to permanently encrypt files if a ransom is not paid - 0 views

  •  
    "A new strain of ransomware has been targeting government agencies and educational institutions in the United States, through scam emails that pretend to be something important. The malware, dubbed as 'MarsJoke' by Proofpoint security researchers, reportedly began a large-scale email campaign which distributed the cryptomalware last week. The developers are sending out emails which seems to be masked as a message from an airline company."
dr tech

5 Security Software Myths That Can Prove Dangerous - 0 views

  •  
    "Excluding mobile operating systems for tablets and smartphones, Windows still owns about 90% of the global computing market, so it's no surprise it remains a prime target for malware. That doesn't mean other operating systems are perfectly safe, however, as they too can prove easy pickings."
dr tech

Fifty people linked to Mexico's president among potential targets of NSO clients | Mexi... - 0 views

  •  
    ""Mexico's capacity to spy on its citizens is immense. [And] it's extremely easy for the technology and the information obtained through the spyware to fall into private hands - be it organised crime or commercial," said Jorge Rebolledo, a Mexico City security consultant. "What we know about is only the tip of the iceberg." Andrés Manuel López Obrador Andrés Manuel López Obrador. The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as belonging to people of interest by government clients of NSO Group."
dr tech

Experts warn of new spyware threat targeting journalists and political figures | Hackin... - 0 views

  •  
    "Researchers at the Citizen Lab at the University of Toronto's Munk School said the spyware, which is made by an Israeli company called QuaDream, infected some victims' phones by sending an iCloud calendar invitation to mobile users from operators of the spyware, who are likely to be government clients. Victims were not notified of the calendar invitations because they were sent for events logged in the past, making them invisible to the targets of the hacking. Such attacks are known as "zero-click" because users of the mobile phone do not have to click on any malicious link or take any action in order to be infected."
dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

Briton who stopped WannaCry attack arrested over separate malware claims | Technology |... - 0 views

  •  
    "Marcus Hutchins, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak in its tracks by discovering a hidden "kill switch" for the malware, has been arrested by the FBI over his alleged involvement in another malicious software targeting bank accounts."
dr tech

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is | Techn... - 1 views

  •  
    "This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself - and can affect all of a supplier's customers. It's an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone."
dr tech

New IoT botnet launches stealthy DDoS attacks, spreads malware - 1 views

  •  
    "A new botnet is actively targeting IoT devices using payloads compiled for a dozen CPU architectures and uses them to launch several types of DDoS and to spread various types of malware. The Dark Nexus botnet as it was named by the Bitdefender researchers who discovered it has gone through a very fast development process since it was initially spotted."
dr tech

How the growing Russian ransomware threat is costing companies dear | Cybercrime | The ... - 0 views

  •  
    "The January snow lay thick on the Moscow ground, as masked officers of the FSB - Russia's fearsome security agency - prepared to smash down the doors at one of 25 addresses they would raid that day. Their target was REvil, a shadowy conclave of hackers that claimed to have stolen more than $100m (£74m) a year through "ransomware" attacks, before suddenly disappearing. As group members were led away in cuffs, FSB officers gathered crypto-wallets containing untold volumes of digital currency such as bitcoin. Others used money-counting machines to tot up dozens of stacks of hundred dollar bills."
dr tech

Digital surveillance and the specter of AI in Mexico · Global Voices Advox - 0 views

  •  
    "The problem extends beyond the Pegasus project. Installed in Mexico City is one of the largest urban surveillance systems in the Americas: El Centro de Comando, Control, Cómputo, Comunicaciones y Contacto Ciudadano, better known as El C5. The network, connected to panic buttons and command centers, is spread over 1,485 kilometers with software designed to automatically detect license plates. On top of that, the number of installed cameras grew from 18 million to 65 million between 2018 and 2022, with stated plans to add at least an additional 16 million more. Despite its apparent pre-eminence, issues have arisen with the C5, from false identifications to mishandling of personal data. Technological malfunctions have also been shown to impact the outcomes of criminal cases because of the assumption of objectivity that video surveillance supposedly construes. The sprawling C5 system is dwarfed only by the Titan, an expansive intelligence and security database, both in terms of scale and threat to civil liberties. The software is used by several Mexican state governments to combine location data with other private information, including financial, government, and telecom data, to geolocate individuals across the country in real time. Governmental officials have been criticized for the controversial use of the database to target public figures, but, more problematically, access to Titan-enabled intel can be gained through an underground market, making it a further liability. The extent to which artificial intelligence has been incorporated into the C5 and Titan is still not clear, but the specter of surveillance remains large and is set to cause more worries with the addition of new smart technologies."
1 - 20 of 45 Next › Last »
Showing 20 items per page