spyware

now browsing by tag

 
 

#Cyber #Security Today: Jan. 7, 2019 — #iPhone call #scam, Germans #hacked and Android #spyware

Watch out for this iPhone call scam, prominent Germans hacked, Android spyware found and an Acrobat update.

Apple iPhone users should be on the lookout for a phone phishing scam. According to security writer Brian Krebs, it works like this: You get a call and when you look at the phone’s screen to see who it is, the Apple logo, real phone number and real address is displayed. The target in this case didn’t answer the call so a message was left asking her to call a 1-866 number. It probably led to a scammer who would have asked for personal information. So iPhone users, ignore calls purporting to be from Apple. Apple won’t phone you. And for those who use other phones, hang up on anyone who tries to get personal information or passwords.

Hackers somehow have gotten access to private emails, memos and financial information of hundreds of German politicians, reporters, comedians and artists. The information was then published through a Twitter account. At this point no one knows if this was the work of a mischievous activist or a foreign country, or exactly how it was done. But British security writer Graham Cluley suspects victims fell for a phishing lure and gave away a password to one of their email or social media accounts. The hacker then went from there. Victims may have also used the same password for different accounts, which also makes a hacker’s job easier. If so, it’s another example of why you shouldn’t use the same password on more than one site, and, where possible enable two-factor authentication to make sure someone else can’t log into your account. Two factor authentication usually sends a six-digit number to your smart phone that you have to enter in addition to your password. Check your applications’ settings to see if you have it.

UPDATE: According to the Associated Press, a popular German YouTube contributor who was victimized said the perpetrator somehow first gained access to his email account and then convinced Twitter to disable a second security check — presumably two-factor authentication — required to take control of his account on the social networking site.

Twitter didn’t immediately respond to a request for comment and it wasn’t clear how many of those affected by the leak had such “two-factor authentication” enabled for their email or social media accounts, and whether the hacker similarly managed to bypass it.

As hard as Google tries to keep malware out of the Google Play store, criminals manage to find ways to evade detection. Trend Micro reports it discovered spyware hidden in six seemingly legitimate Android applications including a game called Flappy Bird, a presumably copycat called Flappy Birr Dog, FlashLight, Win7Launcher and others. All have been removed from the app store. The spyware would have stolen information like user location, text messages, contact lists and device information as well as try to phish for passwords. Owners of any computing device have to be cautious when deciding what to download, advises Trend Micro.

Finally, Adobe usually issues security updates on the second Tuesday of the month, which is tomorrow. However, it has already issued an emergency patch for Acrobat and Acrobat Reader. So if you use either of these applications check you have the latest versions.

 

Source: https://www.itworldcanada.com/article/cyber-security-today-jan-7-2019-iphone-call-scam-germans-hacked-and-android-spyware/413736

 

 

View full post on National Cyber Security

When Spies Get Hacked… Hackers Steal Customer Data from Android Spyware Company

When hackers get hacked” should become the tagline of 2018. After several other similar incidents, it is now the turn of an Android spyware maker that advertises its spyware to be used against children and employees. A target of a vigilante hacker, the company known as SpyHuman offers surveillance software for Android devices that enables its users to intercept phone calls, text messages, track GPS locations, read messages on WhatsApp and Facebook, and use the target device’s microphone.

It now appears that a hacker has stolen customer text messages and call metadata from the spyware company. Call metadata includes phone numbers the target devices dialled or received calls from along with their duration and dates. Hackers managed to access over 440,000,000 call details through exploiting a basic security flaw in the website.

advertisement:

nso-pegasusRELATEDControversial Israeli Spyware Firm Robbed by Its Own Employee Who Tried Selling Code for $50 Million!

“These spy apps should be out of market, most people spy on girls and [their] data image […] always sensitive,” the hacker wrote in a message that was obtained by Motherboard. “No one have rights to do that and same these apps and provider making money by doing this.”

While SpyHuman sells its spyware as a tool to monitor children and employees, it’s mostly used to illegally spy on partners and spouses without their consent. “Several review websites and social media posts do push the app for such purposes, and archives of particular SpyHuman pages include phrases such as ‘know if your partner is cheating on you,’ and suggests monitoring your husband’s texts in case he is having an affair,” the publication reports.

The company gave the following (non)explanation when asked about how it makes sure its software isn’t being used for illegal surveillance:

staff-surveillance-2RELATEDMicrosoft Exposes FinFisher Gov Spyware – Says Windows Defender ATP Can Now Detect the Notorious Spyware

“As a precaution, at an initial stage of our app installation, we always ask users that for what purposes they are installing this app in the target device. If they select child or employee monitoring then our app stays hidden and operate in stealth mode. Otherwise, it will create visible Icon so that one can know that such app is installed on his/her devices.”

As is apparent, since its users can always select a child or an employee – which in itself raises several questions – they don’t necessarily have to reveal if they are using the product for spying on people, mostly partners, without their consent.

– If you are a victim of spyware or technology-facilitated abuse, this is a very comprehensive resource list offering guidelines and help.

The post When Spies Get Hacked… Hackers Steal Customer Data from Android Spyware Company appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Mexican Governor Spied on President With Hacking Team Spyware, Lawsuit Alleges

Source: National Cyber Security – Produced By Gregory Evans

In the last few months, human rights and internet monitoring organizations have uncovered evidence that the Mexican government uses sophisticated spyware made by an Israeli company to monitor journalists, dissidents, and even political opponents, as reported in a series of articles in The New York Times. Now, a former Mexican…

The post Mexican Governor Spied on President With Hacking Team Spyware, Lawsuit Alleges appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

US Government Hacked With Its Own Spyware?

Source: National Cyber Security – Produced By Gregory Evans Former National Security Administration tech expert tells all. Another day, another news headline concerning hacking of US government accounts, this time with software that specifically targeted Macs and Apple devices, long known for their lower susceptibility to viruses and malware. … The post US Government Hacked […]

The post US Government Hacked With Its Own Spyware? appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

Making Viruses, Malware And Spyware 101

Source: National Cyber Security – Produced By Gregory Evans

Making Viruses, Malware And Spyware 101

As we have said in several of our courses, “it takes a hacker to catch a hacker.” In order to this you must learn all the techniques, the technology and the mind set of a hacker. Need to track your …

The post Making Viruses, Malware And Spyware 101 appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

A Hacking Group is Selling Spyware to Government

computer-cyber-security-data-backup_765x0_80

Source: National Cyber Security – Produced By Gregory Evans

A Hacking Group is Selling Spyware to Government

If you think iPhone is the safest smartphone out there, we’ve got something that’s going to burst this bubble of yours.
As reported by The Wall Street Journal, spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS

The post A Hacking Group is Selling Spyware to Government appeared first on National Cyber Security.

View full post on National Cyber Security

Hacking Team Lost Its License to Export Spyware

hacker

Source: National Cyber Security – Produced By Gregory Evans

Months after being hacked and getting all its secrets leaked online, the spyware vendor Hacking Team is still in business—but struggling to survive. Now, the Italian government has dealt the embattled company another blow. The government authority who oversees the export of “dual use” technologies, which can be used both for civilian as well as military purposes, revoked Hacking Team’s “global authorization” to export its spyware at the end of March. The Italian Ministry of Economic Development (also known as MISE) said in a press release that the company would now have to get an ”individual” license. Eric Rabe, Hacking Team’s spokesperson, confirmed the news on Tuesday, after the Italian newspaper Il Fatto Quotidiano first reported of the revocation. “Yes, the global license has been suspended by MISE but Hacking Team still has approvals for all countries within the EU, and the company also expects to be given approvals for sales to countries outside the EU,” Rabe said in an email to Motherboard. “We can sell everywhere in Europe without a license. We can sell everywhere in the world but we have to ask for a license every time we sell.” Years before the hack, researchers were able to reveal […]

The post Hacking Team Lost Its License to Export Spyware appeared first on National Cyber Security.

View full post on National Cyber Security

In Hacking Team’s wake, FinFisher spyware rises in popularity with government users

Source: National Cyber Security – Produced By Gregory Evans

The notorious FinFisher spyware is rising in popularity with government agencies across the world and 32 countries have been identified as users. FinFisher is a sophisticated spyware suite sold exclusively to government agencies and police forces. The user-friendly software is able to remotely control any computer it infects, copy files, intercept Skype calls and log keystrokes, among other functions. Developed by Munich-based FinFisher Gamma Group, the software is touted as a way to “help government law enforcement and intelligence agencies identify, locate and convict serious criminals.” However, a data breach which took place in August last year placed scrutiny on the secretive firm’s business practices and clients. Stolen files placed on the web suggested FinFisher was being used for activities beyond tracking criminals — such as spying upon high-profile Bahraini activists. It is believed that dissidents, law firms, journalists and political opposition in Bahrain and from Ethiopia have also been monitored through FinFisher. Citizen Lab, an interdisciplinary laboratory based at the University of Toronto, is well-known for research into global security and human rights issues. In a fresh investigation tracking users of the spyware suite, Citizen Lab said 32 countries contain at least one government entity who is “likely” using […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post In Hacking Team’s wake, FinFisher spyware rises in popularity with government users appeared first on National Cyber Security.

View full post on National Cyber Security

Police Nab Korean-Chinese Hacker Suspected of Developing Mobile Spyware

Source: National Cyber Security – Produced By Gregory Evans

SEOUL, Aug. 20 (Korea Bizwire) — A Korean-Chinese hacker has been arrested on suspicion of developing mobile spyware that can not only steal one’s financial data but also bug Android smartphones, police said Wednesday. Seoul Gwanak Police Station said the 27-year-old Seo was arrested on Aug. 5 in southern Seoul on charges of developing spyware that can be used for various means of crime, including phone fraud, gambling sites and phone-tapping. An online gambling site operator, surnamed Song, was also arrested on the same day for allegedly using the program to manage the Web site from December 2014 to May 2015. After learning computer programming in Yanbian, a Chinese city bordering North Korea, the 27-year-old hacker moved to South Korea, dissatisfied with the pay he earned in China. Seo is also accused of siphoning the personal data of some 180,000 people by hacking into local Web sites from 2012 to July 2014. “Android smartphone users should always update the operating system to the latest version and make sure they don’t click on suspicious links,” a police officer said. Source: http://koreabizwire.com/police-nab-korean-chinese-hacker-suspected-of-developing-mobile-spyware/40728

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Police Nab Korean-Chinese Hacker Suspected of Developing Mobile Spyware appeared first on National Cyber Security.

View full post on National Cyber Security

Ex Hacker Gregory Evans Show How Spyware – National Cyber Security

nationalcybersecurity.com – Posted on January 20, 2015 by Wire_Service in Video Library // 0 Comments

View full post on Hi-Tech Crime Solutions Weekly