Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence of the Baidu spyware. Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony […]
Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new wave of targeted attacks which were stolen information through Google Drive. The researcher detected a new strain of data stealer malware, dubbed Drigo, that is apparently used in hacking […]
Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong protesters. In the last days I published the news regarding a spyware used to spy on activists in Hong Kong, a Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central […]
A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest the involvement of Chinese entities. A Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central pro-democracy movement with spyware. The malicious app has circulated online claiming to be an instrument […]
Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal characteristics of the app are its injection and hooking techniques used to spy on mobile users. The techniques are rare […]
WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software âFinFisherâ were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]
The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing activities in the period April – June 2014, the document titled “Phishing Activity Trends Report, 2nd Quarter 2014” states that online payment services […]
Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located in China a lot of user’s data. Xiaomi, one of the most important Chinese smartphone manufacturers is accused for secretly steal usersâ data and send it back to a server in China, despite the company has turned […]
A Hacker claims to have hacked the network of Gamma International firm and he has leaked docs related to the malware-for-government FinFisher. Earlier this week the British company Gamma International appears to have been hacked and a collection of files from its systems have been leaked on the Internet. The security firm is popular because it […]
Security Experts at Intelligence firm InterCrawler have analyzed the effect of the crisis in Iraq on the malicious activities in the cyberspace. Cyber threat intelligence firm IntelCrawler has published an interesting post on the repercussion of Iraq Civil disorder on the cyberspace, the company has analyzed the activities within the Iraqi ISP industry discovering worrying signals. […]