Remove 2013 Remove Accountability Remove Information Security Remove Surveillance
article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) has added nine new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The exploits were used to install commercial spyware and malicious apps on targets’ devices. Google TAG shared indicators of compromise (IoCs) for both campaigns.

Spyware 78
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. Those of us in the information security community had long assumed that the NSA was doing things like this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sextortion campaign uses Goontact spyware to target Android and iOS users

Security Affairs

. “The types of sites used to distribute these malicious apps and the information exfiltrated suggests that the ultimate goal is extortion or blackmail.” These sites advertise account IDs for secure messaging apps such as KakaoTalk or Telegram that could allow to communicate with the escorts.

Spyware 112
article thumbnail

Iran-linked APT42 is behind over 30 espionage attacks

Security Affairs

The campaigns have been conducted since 2015 and are aimed at conducting information collection and surveillance operations against individuals and organizations of strategic interest to Teheran. ” The surveillance operations conducted by the APT group involved the distribution of Android malware such as VINETHORN and PINEFLOWER.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. The account recovery element of passkey is another double-edged sword. Security, Legal and Ethical Implications. Identity, citizenship, and surveillance are all societal concerns.

Passwords 117