surveillance

Pierluigi Paganini December 12, 2016
How much cost a StingRay? Surveillance is a profitable business

Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]

Pierluigi Paganini December 08, 2016
Thieving Magpie allows NSA spies to snoop on in-flight mobile calls

The Thieving Magpie programme allows the NSA and the GCHQ to intercept data from passengers traveling on board commercial aircrafts. This isn’t a sci-fi movie, the GCHQ and the NSA have spied on air passengers using in-flight GSM mobile services for years. The news was revealed by new documents obtained by Edward Snowden and recently […]

Pierluigi Paganini November 20, 2016
Surveillance solutions from Moxa and Vanderbilt firm affected by flaws

The ICS-CERT has published two security advisories to describe a number of flaws in surveillance products from Moxa and Vanderbilt firms. Surveillance systems produced by Moxa SoftCMS and IP cameras manufactured by Vanderbilt are affected by serious vulnerabilities that can be exploited by remote attackers to obtain full control of flawed systems. The ICS-CERT has published a […]

Pierluigi Paganini November 14, 2016
Russia is going to ban LinkedIn after court ruling. What’s next?

Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation of the country’s data protection laws. violation of the country’s data protection laws. On Thursday, a Moscow court has confirmed the decision to ban the professional social network LinkedIn in Russia. LinkedIn is violating the country’s data protection […]

Pierluigi Paganini November 02, 2016
Stealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or your colleagues? Do you want to spy on them? The engineer Julian Oliver has demonstrated how to do it with a tiny cellphone base station concealed in […]

Pierluigi Paganini October 17, 2016
UK Police purchased IMSI-catcher technology for mobile surveillance

According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and rights groups are in revolt against the UK law enforcement that has purchased mobile phone snooping technology. The rights groups are protesting against the adoption of the IMSI-catcher technology that could be used for dragnet surveillance. The IMSI-catcher is […]

Pierluigi Paganini September 15, 2016
A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any app on Xiaomi phones. A Dutch Computer Science student, Thijs Broenink, who analyzed his Xiaomi mobile device discovered the presence of a backdoor that could allow an attacker to silently install any app on the phone. The […]

Pierluigi Paganini September 05, 2016
NSO Group, the surveillance firm that could spy on every smartphone

The NSO Group is one of the surveillance companies that allow their clients to spy on their targets through almost any smartphone. It is quite easy for any Government to spy on mobile users, recently we have discussed the Trident vulnerabilities that were exploited by a surveillance software developed by the NSO Group to deliver the Pegasus […]

Pierluigi Paganini September 02, 2016
Apple issued fixes for Pegasus spyware bugs in OS X, Safari. Apply it now!

Apple issued security fixes for Mac OS X and Safari to patch zero-day flaws exploited by Pegasus spyware to spy on mobile users. A few days ago, we reported a detailed analysis of the Trident exploit that triggers three vulnerabilities in order to remotely hack Apple mobile devices through the installation of the Pegasus spyware. The […]

Pierluigi Paganini August 31, 2016
iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit

Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group. Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers say it’s belonging to an exploit infrastructure connected to the NSO […]