Remove Internet Remove Software Remove Surveillance
article thumbnail

Poland probes Pegasus spyware abuse under the PiS government

Security Affairs

According to rumors, the Polish special services are using surveillance software to spy on government opponents. In 2021, the University of Toronto-based Citizen Lab Internet reported that a Polish opposition duo was hacked with NSO spyware.

Spyware 120
article thumbnail

A week in security (October 7 – October 13)

Malwarebytes

Update now! Last week on ThreatDown: Hands-on-keyboard (HOK) attacks: How ransomware gangs attack in real-time Ransomware insurance is funding cybercrime, says White House official 5 tools IT admins should block right now Stay safe!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. In the last years, we have reported several cases of companies selling commercial surveillance tools to governments and other entities that have used them for malicious purposes. Pierluigi Paganini.

article thumbnail

Cell Phone Location Privacy

Schneier on Security

It protects users from fake cell phone towers (IMSI-catchers) and surveillance by cell providers. The PGPP MVNO implementation is in software. The user’s traffic is sent to the MVNO gateway and then out onto the Internet, potentially even using a VPN. It’s a clever system. On demand: The user uses the phone normally.

article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

While the vendor did not respond to our security disclosure, we find that the app’s security deficits may not only violate Google’s Unwanted Software Policy and Apple’s App Store guidelines but also China’s own laws and national standards pertaining to privacy protection, providing potential avenues for future redress.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. Our allies do it.

article thumbnail

Parents and teachers believe digital surveillance of kids outweighs risks

Malwarebytes

Schools in the US have been using surveillance software to keep an eye on their students, and such software has grown significantly in popularity since the COVD-19 pandemic closed campuses nationwide. Half of students surveyed also reveal that are “very or somewhat comfortable with the use of monitoring software”.