Blog Posts Tagged with "Spyware"

44a2e0804995faf8d2e3b084a1e2db1d

Trojans for the Bundestag – German PD acquired Finfisher

January 29, 2013 Added by:Don Eijndhoven

German political platform NetzPolitik.org has now uncovered secret documents belonging to the Ministry of Finance, that the Ministry of the Interior sent to the Bundestag (the political seat of Germany) that reveals the German Federal Police’s intention to use Gamma Group’s Finfisher spyware...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

FinFisher: The Cyber Espionage Tool Found Everywhere

August 15, 2012 Added by:Pierluigi Paganini

FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Malware Threats: Save Your Company Now

May 21, 2012 Added by:Bill Gerneglia

As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...

Comments  (0)

E85787adcaf7bca10e799cfd1cfd08f1

Can You Stamp Out Spambots? No, But Stop Being a Victim

March 01, 2012 Added by:Michelle Drolet

Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Some Facts About Carrier IQ

December 19, 2011 Added by:Electronic Frontier Foundation

There is an additional configuration file (called a "Profile") that determines what information is sent from the phone to a carrier. Profiles are programs in a domain-specific filtering language - they are normally written by Carrier IQ to the specifications of a telco or other client...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Demise of the Antivirus Industry

July 12, 2011 Added by:Kevin McAleavey

Over the past 30 years, the antivirus industry was used to doing things only one way. And the creative people who came up with unique and sometimes eccentric ways of thinking outside anyone's box all got shunted aside in favor of people who did things "by the book."...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

DHS: Imported Devices Infected with Malware

July 12, 2011 Added by:Headlines

Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Docs Provide Details on FBI's Surveillance Spyware

May 03, 2011 Added by:Headlines

The documents do not specifically discuss how the Computer and Internet Protocol Address Verifier software is installed on target computers, but previous reports indicate that the tool may be distributed via browser vulnerabilities similar to those exploited by malicious malware...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spyware and Keyloggers Pose Major Identity Theft Threat

April 04, 2011 Added by:Robert Siciliano

Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Botnets Turn Your PC into a Zombie

November 12, 2010 Added by:Robert Siciliano

Consumers’ and small businesses’ lax security practices are giving scammers a base from which to launch attacks. Hackers use botnets to send spam and phishing emails, and to deliver viruses and other malware...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phone Security Under Attack

November 11, 2010 Added by:Robert Siciliano

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...

Comments  (0)