Items tagged with Spyware

Most of the time, preinstalled software on a PC can range from annoying to innocuous, with the occasional trip into "hey, this isn't so bad" territory. But sometimes, a PC can get imaged with something really nasty, causing buyers heartache well outside the norm. Such is the case with at least some AceMagic mini PCs... Read more...
Your personal data and information are hot commodities, so much so that virtually all businesses or other entities with access are all scrambling to monitor and sell it if possible. Threat actors also know this as well, which could lead to blackmail, extortion, bank account access, or more sinister things if your personal data is breached. Read more...
If it doesn’t come directly from the Google Play Store, do not download or install whatever application it is. This simple rule could protect you from malware such as that from the Transparent Tribe, a suspected Pakistani threat actor who is hiding remote access tool (RAT) features inside another application that... Read more...
Time and time again, malware or malicious apps find their way to Google Play Store, infecting millions of people. In this same vein, researchers have discovered spyware with ties to China hiding in the Play Store disguised as file management apps. This week, researchers at Pradeo discovered two spyware apps with a... Read more...
This week, Apple patched three vulnerabilities that could lead to Triangulation spyware making it to your device with a zero-interaction exploit delivered through an invisible iMessage. Thus, update your devices as soon as able to patch these vulnerabilities and remain safe from the threat actors exploiting... Read more...
Researchers at the cybersecurity firm ESET have discovered an active Android malware campaign that began in January 2022. The campaign in question distributes spyware injected into legitimate VPN apps. The researchers have tied this campaign to an advanced persistent threat (APT) group known as “Bahamut.” Bahamut... Read more...
Google’s Project Zero team, which finds and analyzes zero-day security vulnerabilities, has revealed that an unnamed commercial surveillance company developed spyware that exploited three vulnerabilities specific to Samsung phones equipped with Exynos SoCs. Project Zero managed to obtain a sample of the exploit chain... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine phones belonging to US State Department employees. This sort of spyware is usually... Read more...
Malicious software, commonly known as malware, is one of many threats to both cybersecurity and privacy. Cybercriminals can distribute malware to achieve a number of different goals, including siphoning funds from cryptocurrency wallets, stealing login credentials, or establishing botnets. However, cybercriminals... Read more...
The iPhones used by at least nine US State Department employees have been compromised using the notorious Pegasus spyware provided by NSO Group, sources say. The recent cybersecurity intrusion, which began in the last several months, seems to be focused on State Department employees either in Uganda, or focused on... Read more...
Late last week, it was revealed that a global spyware campaign was targeting politicians, activists, and journalists worldwide. Initially, the company behind the software for spying, NSO Group, was blamed for the data leak and supplying its software to authoritarian regimes. However, NSO Group has since rejected these... Read more...
Audacity sparked quite the firestorm over the weekend after the scope of changes to its privacy policy were revealed to the broader public. The changes came after Audacity was acquired by Muse Group earlier this year. Some of the key sticking points that alarmed users of the audio editing program were that while... Read more...
For the past two decades, Audacity has built and maintained a following as a capable and free audio editing program. Being a no-cost solution is a big draw, and so are a coupe of other attributes—it's an open source program, and available on multiple platforms (Windows, macOS, GNU/Linux). Some users are starting to... Read more...
Tech companies and consumers alike are rightfully concerned about government agencies seeking backdoors into smartphone operating systems. Agencies like the Federal Bureau of Investigation (FBI) have exclaimed that backdoors can help them crack smartphones that belong to criminal or child predators. On the other hand... Read more...
Yesterday, we brought you news that the TikTok app has been doing some shady things behind the scenes with devices running iOS. Following the release of the first iOS 14 beta, it was discovered that TikTok was pinging the system clipboard constantly and pasting that data for its own use. Without the steady stream... Read more...
A third-party security team uncovered a massive ring of Chrome spyware extensions that were all working together. The nefarious extensions had been downloaded a total of over 32 million times and impacted millions of Chrome browsers. The researchers at Awake Security are coming forward after they informed Google of... Read more...
Avast is a well-known company that sells antivirus software, and provides free versions for Windows and macOS platforms. However, the company has come under fire in recent months due to a browser extension that was found to be sending user data to third-party marketing firms. At the time, Avast reassured users that... Read more...
The latest “Joker” spyware is no laughing matter as it can easily compromise a lot of the personal data you keep on your phone. Researchers recently discovered spyware that can access your SMS messages, contact list and other information. The spyware was found in over 24 Android apps on Google Play and has infected... Read more...
Some HP laptop customers are outraged over the discovery a piece of hidden software that is getting installed and running without their consent. It is a Windows telemetry serviced called HP Touchpoint Analytics Client that harvests telemetry information that is used by HP Touchpoint's analytical services. it seems to... Read more...
Sarahah, an anonymous feedback app that has recently exploded in popularity across the globe, is now coming under fire for privacy violations. The app stands accused of uploading emails and phone numbers from user address books to its servers. More intriguingly, there doesn’t seem to be a reason for why the company... Read more...
Just last weekend, we wrote about SonicSpy, a grossly robust piece of malware that infected hundreds of apps on the Play Store. Google is always quick to remove this awful junk when it is detected, but the fact that we keep talking about the issue means it's not going away. It was security research firm Lookout... Read more...
A freelance security consultant and Handler at SANS Internet Storm Center has discovered a rather interesting exploit in Microsoft Word, one that allows an attacker to abuse the productivity program's ability to auto-update links. This is a feature that is enabled by default—when you add links to external sources like... Read more...
1 2 Next