Blog Posts Tagged with "Spyware"


Trojans for the Bundestag – German PD acquired Finfisher

January 29, 2013 Added by:Don Eijndhoven

German political platform has now uncovered secret documents belonging to the Ministry of Finance, that the Ministry of the Interior sent to the Bundestag (the political seat of Germany) that reveals the German Federal Police’s intention to use Gamma Group’s Finfisher spyware...

Comments  (0)


FinFisher: The Cyber Espionage Tool Found Everywhere

August 15, 2012 Added by:Pierluigi Paganini

FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...

Comments  (0)


Malware Threats: Save Your Company Now

May 21, 2012 Added by:Bill Gerneglia

As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...

Comments  (0)


Can You Stamp Out Spambots? No, But Stop Being a Victim

March 01, 2012 Added by:Michelle Drolet

Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...

Comments  (0)


Some Facts About Carrier IQ

December 19, 2011 Added by:Electronic Frontier Foundation

There is an additional configuration file (called a "Profile") that determines what information is sent from the phone to a carrier. Profiles are programs in a domain-specific filtering language - they are normally written by Carrier IQ to the specifications of a telco or other client...

Comments  (0)


Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)


The Demise of the Antivirus Industry

July 12, 2011 Added by:Kevin McAleavey

Over the past 30 years, the antivirus industry was used to doing things only one way. And the creative people who came up with unique and sometimes eccentric ways of thinking outside anyone's box all got shunted aside in favor of people who did things "by the book."...

Comments  (5)


DHS: Imported Devices Infected with Malware

July 12, 2011 Added by:Headlines

Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...

Comments  (0)


Docs Provide Details on FBI's Surveillance Spyware

May 03, 2011 Added by:Headlines

The documents do not specifically discuss how the Computer and Internet Protocol Address Verifier software is installed on target computers, but previous reports indicate that the tool may be distributed via browser vulnerabilities similar to those exploited by malicious malware...

Comments  (0)


Spyware and Keyloggers Pose Major Identity Theft Threat

April 04, 2011 Added by:Robert Siciliano

Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely...

Comments  (0)


Botnets Turn Your PC into a Zombie

November 12, 2010 Added by:Robert Siciliano

Consumers’ and small businesses’ lax security practices are giving scammers a base from which to launch attacks. Hackers use botnets to send spam and phishing emails, and to deliver viruses and other malware...

Comments  (0)


Mobile Phone Security Under Attack

November 11, 2010 Added by:Robert Siciliano

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...

Comments  (0)

Most Liked