article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s amazing that one person could have had so much access with so little accountability, and could sneak all of this data out without raising any alarms. I visited him once in Moscow, in 2016.

article thumbnail

60,000 Androids have stalkerware-type app Spyhide installed

Malwarebytes

Hacktivist maia arson crimew told TechCrunch she'd found 60,000 compromised Android devices, dating back to 2016. Writing about the SpyHide hack, crimew describes how it was possible to download the full source code and git history for the account panel of SpyHide. And it's not a small number.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Harvard Business School professor Shoshana Zuboff calls it " surveillance capitalism." Surveillance capitalism takes this one step further. Google's surveillance isn't in the news, but it's startlingly intimate. That phone is probably the most intimate surveillance device ever invented. We never lie to our search engines.

article thumbnail

Pegasus Project – how governments use Pegasus spyware against journalists

Security Affairs

Pegasus Project investigation into the leak of 50,000 phone numbers of potential surveillance targets revealed the abuse of NSO Group’s spyware. Pegasus Project is the name of a large-scale investigation into the leak of 50,000 phone numbers of potential surveillance targets that revealed the abuse of NSO Group’s spyware.

Spyware 118
article thumbnail

Fortinet warns of a spike in attacks against TBK DVR devices

Security Affairs

TBK Vision is a video surveillance company that provides network CCTV devices and other related equipment, including DVRs for the protection of critical infrastructure facilities. “Another notable spike to mention is IPS detections related to MVPower CCTV DVR models (CVE-2016-20016) also known as JAWS webserver RCE.

article thumbnail

How to say your webcam on laptop or smartphone has been hacked

CyberSecurity Insiders

Therefore, the next time when you see your webcam light blinking and device battery exhausting faster than usual, you must quickly put the device under surveillance. Let us analyze it with an example: In the year 2016, a couple living in a condo in New York received a call. What happens if the webcam is in control of a hacker?

Hacking 124
article thumbnail

New FurBall Android Malware Used to Spy on Iranian Citizens

SecureWorld News

A new version of the Android malware "FurBall" has been discovered to be used by the threat actor(s) known as Domestic Kitten in a campaign targeting Iranian citizens in a mobile surveillance operation.

Malware 83