Remove 2012 Remove Accountability Remove Hacking Remove Surveillance
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Reading about the NSA’s hacking abilities will do that to you. Many have written about how being under constant surveillance changes a person. I wrote the essay below in September 2013.

article thumbnail

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

A week after it landed with a curious (and most likely spurious) thud, Zuckerberg’s announcement about a new tack on consumer privacy still has the feel of an unexpected message from some parallel universe where surveillance (commercial and/or spycraft) isn’t the new normal. This article originally appeared on Inc.com.

Hacking 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since March

Security Affairs

According to Stone, the CVE-2019-2215 vulnerability was being used or sold by the controversial surveillance firm NSO Group , it was exploited by its surveillance software Pegasus. SideWinder, a group that has been active since 2012, is a known threat and has reportedly targeted military entities’ Windows machines.

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Recently security the security expert researcher Sam Curry warned of vulnerabilities in mobile apps that exposed Hyundai and Genesis car models after 2012 to remote attacks. ” Privacy advocates are raising the alarm on surveillance activities operated by law enforcement by collecting data from connected systems in modern cars.

article thumbnail

APT trends report Q3 2023

SecureList

This strategic shift signals its intent to intensify its surveillance capabilities and expand its range of targets. The stolen cookies can be used later to remotely access victims’ email accounts. These are new variants of the same hacking tools that we first reported in August 2019, and later detailed again in June 2021.

article thumbnail

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

What’s remarkable about these record-breaking attacks is they were carried out via small, innocuous Internet-of-Things (IoT) devices like home routers, air-quality monitors, and personal surveillance cameras. Covers the Mirai code release and how multiple hacking groups end-up reusing the code. via an infamous hacking forum.

IoT 107
article thumbnail

Russia’s SolarWinds Attack

Schneier on Security

Recent news articles have all been talking about the massive Russian cyberattack against the United States, but that’s wrong on two accounts. Sometime before March, hackers working for the Russian SVR — previously known as the KGB — hacked into SolarWinds and slipped a backdoor into an Orion software update. (We

Hacking 358