article thumbnail

Experts link Hermit spyware to Italian surveillance firm RCS Lab and a front company

Security Affairs

Experts uncovered an enterprise-grade surveillance malware dubbed Hermit used to target individuals in Kazakhstan, Syria, and Italy since 2019. Lookout Threat Lab researchers uncovered enterprise-grade Android surveillance spyware, named Hermit, used by the government of Kazakhstan to track individuals within the country.

Spyware 92
article thumbnail

Section 889: the US Regulation that extends far beyond the US

IT Security Guru

It went into effect on 13 th August 2020 and addresses the new prohibition on the use of banned telecommunications equipment and services, while also clarifying the ban from 2019 on buying such equipment. There are five specific companies that fall under the category of ‘Prohibited Technology’. government and industry. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

We know that war has impacts on telecommunications, but what we've seen in Ukraine is on a different level.". And it might have been prepared for this moment, years ago, as a surveillance tool. It's easy to put surveillance on telecoms if you have a foothold," Kubecka said. Advancing Russian troops need it to communicate.

article thumbnail

3.5m IP cameras exposed, with US in the lead

Security Affairs

Businesses and homeowners increasingly rely on internet protocol (IP) cameras for surveillance. And while cosmetic security measures are in place, security leaders have long warned that technologies produced by Chinese companies can be exploited by China’s government. Surge in internet-facing cameras. Most insecure brands.

article thumbnail

China Says U.S. Hacking Huawei Since 2009

SecureWorld News

In a tale as old as the computer, China has once again pointed fingers at the United States, accusing it of hacking into one of its technology companies. are currently engaged in a fierce battle for technological supremacy, particularly in the rapidly advancing field of artificial intelligence.

Hacking 89
article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. This is exactly the policy debate we should be having­not the fake one about whether or not we can have both security and surveillance.