Skip to main content

Home/ Digit_al Society/ Group items tagged spyware

Rss Feed Group items tagged

dr tech

Google, Microsoft can get your passwords via web browser's spellcheck - 0 views

  •  
    "In cases where Chrome Enhanced Spellcheck or Edge's Microsoft Editor (spellchecker) were enabled, "basically anything" entered in form fields of these browsers was transmitted to Google and Microsoft. "Furthermore, if you click on 'show password,' the enhanced spellcheck even sends your password, essentially Spell-Jacking your data," explains otto-js in a blog post."
dr tech

Mandatory Student Spyware Is Creating a Perfect Storm of Human Rights Abuses | Electron... - 0 views

  •  
    "Spyware apps were foisted on students at the height of the Covid-19 lockdowns. Today, long after most students have returned to in-person learning, those apps are still proliferating, and enabling an ever-expanding range of human rights abuses. In a recent Center for Democracy and Technology report, 81 percent of teachers said their schools use some form of this "student monitoring" spyware. Yet many of the spyware companies supplying these apps seem neither prepared nor concerned about the harms they are inflicting on students. "
dr tech

China's Olympics app is pure spyware; preparing for cyber spillover; and simulating tom... - 0 views

  •  
    "Cybersecurity researchers say the My2022 mobile app - the official app of the Beijing Winter Olympics - has serious security vulnerabilities and that "all Olympian audio is being collected, analyzed and saved on Chinese servers." Why This Matters: The Chinese government is mandating all Olympic athletes, coaches, and attendees use the My2022 app and, as of Thursday morning, the app is still available in the Apple and Android U.S. app stores where Americans can download it too."
dr tech

How does Apple technology hold up against NSO spyware? | Apple | The Guardian - 0 views

  •  
    "The disclosure points to a problem security researchers have been warning about for years: that despite its reputation for building what is seen by millions of customers as a secure product, some believe Apple's closed culture and fear of negative press have harmed its ability to provide security for those targeted by governments and criminals. "Apple's self-assured hubris is just unparalleled," said Patrick Wardle, a former NSA employee and founder of the Mac security developer Objective-See. "They basically believe that their way is the best way. And to be fair … the iPhone has had incredible success. "But you talk to any external security researcher, they're probably not going to have a lot of great things to say about Apple. Whereas if you talk to security researchers in dealing with, say, Microsoft, they've said: 'We're gonna put our ego aside, and ultimately realise that the security researchers are reporting vulnerabilities that at the end of the day are benefiting our users, because we're able to patch them.' I don't think Apple has that same mindset.""
dr tech

Dozens of Al Jazeera journalists allegedly hacked using Israeli firm's spyware | Al Jaz... - 0 views

  •  
    "Spyware sold by an Israeli private intelligence firm was allegedly used to hack the phones of dozens of Al Jazeera journalists in an unprecedented cyber-attack that is likely to have been ordered by Saudi Arabia and the United Arab Emirates, according to leading researchers."
dr tech

WhatsApp spyware attack: senior clergymen in Togo among activists targeted | Technology... - 0 views

  •  
    "WhatsApp announced last year that 1,400 of its users were attacked with the malware, which is made by Israel's NSO Group, over a two-week period last April."
dr tech

How government-exclusive spyware is used to surveil civil society in Mexico - The Citiz... - 0 views

  •  
    "In Mexico, government-exclusive spyware technology is being used to target journalists, human rights defenders, anti-corruption advocates, and international investigators. Luis Fernando Garcia, Director of R3D, explains how technology meant to track terrorists is being turned against activists"
dr tech

The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Applicat... - 0 views

  •  
    "These capabilities can afford dramatic powers and control over an individual's everyday life. And when this software is used abusively, it can operate as a predator in a person's pocket, magnifying the pervasive surveillance of the spyware operator."
dr tech

How the NSA plans to automatically infect "millions" of computers with spyware - Boing ... - 0 views

  •  
    "But TURBINE, which was carried out with other "Five Eyes" spy agencies as part of the NSA's $67.6M "Owning the Net" plan, is intended to automate the infection process, allowing for "millions" of infections at once. "
1 - 11 of 11
Showing 20 items per page