spyware

PowerOffHijack malware spies on user when Mobile is offPowerOffHijack malware spies on user when Mobile is off

PowerOffHijack malware spies on user when Mobile is off

Security researchers at AVG have discovered a new Android malware dubbed PowerOffHijack, which spies on users even when mobile is…

10 years ago
Operation Pawn Storm hackers use a iOS spywareOperation Pawn Storm hackers use a iOS spyware

Operation Pawn Storm hackers use a iOS spyware

By investigating on the cyber espionage campaign dubbed Operation Pawn Storm, experts at TrendLabs discovered a spyware designed for iOS…

10 years ago
The US energy industry is constantly under cyber attacksThe US energy industry is constantly under cyber attacks

The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly…

11 years ago
Sony Xperia Smartphones send user data in ChinaSony Xperia Smartphones send user data in China

Sony Xperia Smartphones send user data in China

Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence…

11 years ago
Drigo spyware exploits Google Drive in targeted attacksDrigo spyware exploits Google Drive in targeted attacks

Drigo spyware exploits Google Drive in targeted attacks

Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through…

11 years ago
China replies to Hong Kong protests with spyware, MITM and censorshipChina replies to Hong Kong protests with spyware, MITM and censorship

China replies to Hong Kong protests with spyware, MITM and censorship

Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong…

11 years ago
A mobile spyware used to track activists in Honk KongA mobile spyware used to track activists in Honk Kong

A mobile spyware used to track activists in Honk Kong

A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest…

11 years ago
Windseeker spyware app implements advanced injection and hooking techniquesWindseeker spyware app implements advanced injection and hooking techniques

Windseeker spyware app implements advanced injection and hooking techniques

Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to…

11 years ago
WikiLeaks publicly disclosed copies of FinFisher surveillance softwareWikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most "abusive"…

11 years ago
APWG Q2 2014 report, phishing is even more dangerousAPWG Q2 2014 report, phishing is even more dangerous

APWG Q2 2014 report, phishing is even more dangerous

The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and…

11 years ago