Remove 2012 Remove Mobile Remove Surveillance
article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Flushed with venture capital funding in 2012, Norse’s founders started hiring dozens of talented cybersecurity professionals. An ad for RedTorch’s “Cheetah” counter-surveillance tech. By 2014 it was throwing lavish parties at top Internet security conferences.

article thumbnail

Snowden speaks about the role of surveillance firm NSO Group in Khashoggi murder

Security Affairs

Snowden warns of abuse of surveillance software that also had a role in the murder of the Saudi Arabian journalist Jamal Khashoggi. Officially the sale of surveillance software is limited to authorized governments to support investigation of agencies on criminal organizations and terrorist groups. COUNTRY NEXUS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amnesty International employee targeted with NSO group surveillance malware

Security Affairs

An employee at Amnesty International has been targeted with Israeli surveillance malware, the news was revealed by the human rights group. Amnesty International revealed that one of its employees was targeted with a surveillance malware developed by an Israeli firm. ” reads the report published Amnesty International.

article thumbnail

Dangerous monitoring tool mSpy suffers data breach, exposes customer details

Malwarebytes

In a new episode of Spy vs Spy , the mobile monitoring app mSpy has suffered a data breach that exposed information about millions of its customers. Without getting consent from a child, these surveillance capabilities represent serious invasions of privacy. Such programs are easy to buy and install.

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Recently security the security expert researcher Sam Curry warned of vulnerabilities in mobile apps that exposed Hyundai and Genesis car models after 2012 to remote attacks. ” Privacy advocates are raising the alarm on surveillance activities operated by law enforcement by collecting data from connected systems in modern cars.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Mimecast Email security 2012 Nasdaq: MIME. Bessemer Venture Partners. Greylock Partners.

article thumbnail

Here’s what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more

Malwarebytes

Threema is an end-to-end encrypted mobile messaging app. WeChat is a Chinese multi-purpose instant messaging, social media and mobile payment app. User activity on WeChat has been known to be analyzed, tracked and shared with Chinese authorities upon request as part of the mass surveillance network in China.