Remove Presentation Remove Surveillance Remove VPN
article thumbnail

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

Despite warnings from cybersecurity academics, whistleblowers or former NSA and CIA agents, the general public shows no animosity toward metadata surveillance. They presented LPAuditor, a tool to conduct “a comprehensive evaluation of the privacy loss caused by publicly available location metadata.”

article thumbnail

Privacy Roundup: Week 13 of Year 2025

Security Boulevard

Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Private search engines generally avoid connecting users to their searches.

VPN 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ScarCruft surveilling North Korean defectors and human rights activists

SecureList

The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. To surveil the victim, the list includes target folders as well as /Camera, /Recordings, /KakaoTalk (a renowned Korean messenger), /??(documents),

article thumbnail

Ferocious Kitten: 6 years of covert surveillance in Iran

SecureList

When run, the executables display decoy content to the victims, with some presenting images of protests against the Iranian regime and its institutions, or videos from resistance camps. Decoy image found within one of the malicious executables showing a protest against the central bank of Iran. For example, “aparat.com-view[.]space”

article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news.

article thumbnail

Security Affairs newsletter Round 499 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog More than 2,000 Palo Alto Networks firewalls hacked exploiting recently patched zero-days Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office US DoJ charges five alleged members of the Scattered Spider cybercrime gang Threat actor (..)

article thumbnail

Privacy Roundup: Week 7 of Year 2025

Security Boulevard

Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Tips for finding old accounts. The Cupid Vault Configuration follows a similar approach.