Remove Encryption Remove Mobile Remove Surveillance Remove Technology
article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

OmniVision disclosed a data breach after the 2023 Cactus ransomware attack

Security Affairs

OmniVision Technologies is a company that specializes in developing advanced digital imaging solutions. OmniVision Technologies Inc. OmniVision Technologies Inc. “On September 30, 2023, OVT became aware of a security incident that resulted in the encryption of certain OVT systems by an unauthorized third party.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WhatsApp Compromised by Spyware

Adam Levin

WhatsApp disclosed a major security vulnerability that allowed hackers to remotely install spyware on mobile devices. The vulnerability, discovered earlier this month, allowed third parties to see and intercept encrypted communications. NSO Group has denied involvement.

Spyware 200
article thumbnail

Proton Technologies makes the code of ProtonMail iOS App open source

Security Affairs

Proton Technologies announced this week that it has made available the source code of its popular ProtonMail iOS App. The Proton Technologies firm continues to propose initiatives aimed at ensuring the transparency of its ProtonMail applications, this week it announced the availability of the source code of its popular ProtonMail iOS App.

article thumbnail

The iPhone of a Russian journalist was infected with the Pegasus spyware

Security Affairs

A joint investigation conducted by Access Now and the Citizen Lab revealed that the journalist, who is at odds with the Russian government, was infected with the surveillance software. Then the Meduza ’s Chief Technology Officer contacted Access Now to investigate the alleged infection of the device. ” states Access Now.

Spyware 121
article thumbnail

Lorenz ransomware gang stolen files from defense contractor Hensoldt

Security Affairs

This week a Hensholdt spokesperson confirmed the security breach to BleepingComputer explaining that a small number of mobile devices in its UK subsidiary has been affected. Hensoldt AG focuses on sensor technologies for protection and surveillance missions in the defence, security and aerospace sectors.

article thumbnail

IT threat evolution Q1 2024

SecureList

Mobile statistics IT threat evolution Q1 2024. The common methods for analyzing an iOS mobile infection are either to examine an encrypted full iOS backup or to analyze the network traffic of the affected device. This is a text-based system log file available on every mobile iOS device.

Banking 63