Remove Encryption Remove Mobile Remove Surveillance Remove Technology
article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

WhatsApp Compromised by Spyware

Adam Levin

WhatsApp disclosed a major security vulnerability that allowed hackers to remotely install spyware on mobile devices. The vulnerability, discovered earlier this month, allowed third parties to see and intercept encrypted communications. NSO Group has denied involvement.

Spyware 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proton Technologies makes the code of ProtonMail iOS App open source

Security Affairs

Proton Technologies announced this week that it has made available the source code of its popular ProtonMail iOS App. The Proton Technologies firm continues to propose initiatives aimed at ensuring the transparency of its ProtonMail applications, this week it announced the availability of the source code of its popular ProtonMail iOS App.

article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about RF measurement, antennas, satellites, Software-defined radio, Digital Mobile Radio and RF Pentesting. Criminals may use hijacked drones for illegal surveillance, smuggling, or even as weapons.

article thumbnail

Lorenz ransomware gang stolen files from defense contractor Hensoldt

Security Affairs

This week a Hensholdt spokesperson confirmed the security breach to BleepingComputer explaining that a small number of mobile devices in its UK subsidiary has been affected. Hensoldt AG focuses on sensor technologies for protection and surveillance missions in the defence, security and aerospace sectors.

article thumbnail

The iPhone of a Russian journalist was infected with the Pegasus spyware

Security Affairs

A joint investigation conducted by Access Now and the Citizen Lab revealed that the journalist, who is at odds with the Russian government, was infected with the surveillance software. Then the Meduza ’s Chief Technology Officer contacted Access Now to investigate the alleged infection of the device. ” states Access Now.

Spyware 92
article thumbnail

Ferocious Kitten: 6 years of covert surveillance in Iran

SecureList

These formats suggest that the threat actor is interested in Office documents, encryption keys, password manager files and image files.The upload is performed by using the same POST request as the one used by the ‘uploadsf’ command. argument: path to file to upload. – List files and repositories. com/ddd/classes.dex.