article thumbnail

IT threat evolution Q1 2024

SecureList

This RAT allows an attacker to surveil and harvest sensitive data from a target computer. Cracked applications are one of the easiest ways for attackers to get malware onto people’s computers: to elevate their privileges, they only need to ask for the password, which usually arouses no suspicion during software installation.

Banking 63
article thumbnail

Google Play sign-ins can be abused to track another person’s movements

Malwarebytes

The only thing that might have alerted my wife to this unintentional surveillance—but never did—was my initial in a small circle at the top right corner of her phone, when she used the Google Play app. Then, suddenly, it dawned on me: I was actually receiving location updates from my wife’s phone, as well as mine.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

From facial recognition to surveillance cameras to time trackers or just having a couple guys standing over employees’ shoulders, there are a multitude of ways to make sure employees are staying on-task and being productive. Businesses have long wondered if employees are staying focused and doing their jobs. In short, the results are mixed.

article thumbnail

What is Malware? Definition, Purpose & Common Protections

eSecurity Planet

Anyone who has used a computer for any significant length of time has probably at least heard of malware. From ransomware attacks locking businesses out of their data until they pay potentially millions of dollars to spyware tracking users’ every move through their infected device, the effects of malware can be devastating.

Malware 75
article thumbnail

The US Capitol Riot is a National Cybersecurity Emergency

Adam Levin

A state-sponsored hacker and/or a member of a foreign government’s intelligence organization may have used the chaos to compromise the security of the Capitol with mechanical spyware or other exploits. The theft of device including computers, smartphones, USB drives and other external drives is a matter of grave concern.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc.