article thumbnail

Spyware, ransomware and Nation-state hacking: Q&A from a recent interview

Security Affairs

I transcribed a recent interview, here some questions and answers about nation-state hacking, spyware, and cyber warfare. Enjoy” How has spyware changed the rules of cyber security in recent years? Spyware are powerful weapons in the arsenal of governments and cybercrime gangs. Is the Pegasus spyware as a game-changer?

Spyware 85
article thumbnail

Security Affairs newsletter Round 178 – News of the week

Security Affairs

Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. 20% discount. Kindle Edition. Paper Copy.

Spyware 41
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

It is allowed to host: ordinary sites, doorway pages, satellites, codecs, adware, tds, warez, pharma, spyware, exploits, zeus, IRC, etc. Here’s a snippet from one of Yalishanda’s advertisements to a cybercrime forum in 2011, when he was running a bulletproof service under the domain real-hosting[.]biz:

article thumbnail

In conversation: Bruce Schneier on AI-powered mass spying

Malwarebytes

There’s an entire industry of super creepy spyware that is sold to people who want to spy on their wives and girlfriends. So, I think you are going to see some use of these technologies by people who are not traditionally powerful. But in general, like all these technologies, they benefit the powerful more than the less powerful.

article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

Never, ever, under any circumstances resort to spyware or as it's frequently known, stalkerware. Plus, she's both a teacher and a mother of kids a similar age to mine so her opinion holds a lot of weight in my book. Screen time can be mind-numbing, un-constructive, "chewing gum for the brain", as they say. Rotary dial telephones.

Media 352
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role does technology play in facilitating intimate partner abuse? They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse.

article thumbnail

Spam and phishing in 2023

SecureList

The background of the fake page appeared to show a PDF of the book. The book will not become any more readable after you subscribe. Artificial intelligence at the service of scammers In 2023, no technology of the year shortlist would have been complete without generative artificial intelligence.

Phishing 102