Spyware

Spyware news, analysis, research, how-to, opinion, and video.

bernard barbier
pc bundle

dangerous iphone cases

EU dual-use tech ban plan could classify smartphones as weapons

European Union plans to extend export licensing of so-called "dual-use" technologies to include cyber-surveillance tools could put the brakes on sales of smartphones.

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware and ransomware

Recent increases in cyberattacks and identity theft make it seem like the whole Internet is turning into the Dark Web. But while no system is unhackable, there are some painless precautions you can follow that might help keep you step...

Former Hacking Team supplier stops selling zero-day exploits on ethical grounds

U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers

Hacking Team's malware uses UEFI rootkit to survive OS reinstalls

The feature allows the company's software to persist even if the hard disk drive if replaced

Duqu spy group also targeted telecommunications companies

Symantec found infections with Duqu 2.0 in the U.S., U.K., Sweden, India and Hong Kong

Asian nations increasingly hit by espionage groups

Multiple groups of attackers are focusing on government and military targets in Asia and the Pacific region, researchers fine

Russian cyber group seen preparing to attack banks

APT28 set up phishing domain names for an upcoming attack against banks in the U.S, UAE and other countries

New Linux rootkit leverages GPUs for stealth

The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory

Malware used in White House and State Department hacks possibly linked to Russia

The malware is related to the MiniDuke, CosmicDuke and OnionDuke cyberespionage tools, researchers from Kaspersky Lab found

Pawn Storm cyberespionage group increases activity, targets NATO

New attacks were observed this year from the group, including against people with links to the White House

Under one percent of Android devices affected by potentially harmful applications

Devices configured for the Russian or Chinese languages had higher rates of infection

New malware program used in attacks against energy sector companies

The Trojan program is used for reconnaissance and distribution of additional malware, researchers from Symantec say

Lebanese cyberespionage campaign hits defense, telecom, media firms worldwide

A cyberespionage group compromised hundreds of organizations by getting in through Web servers, researchers from Check Point said

Code name found in Equation group malware suggests link to NSA

The name matches an NSA project listed in a secret document leaked by Edward Snowden

Windows PCs remained vulnerable to Stuxnet-like LNK attacks after 2010 patch

A Microsoft patch for an exploit used by the Stuxnet worm was incomplete, researchers found

Cyberespionage arsenal could be tied to French intelligence agencies

Five additional Trojan programs are related to the Babar malware that Canada's government believes is the work of French intelligence

Europol and security vendors disrupt massive Ramnit botnet

The operation seized command-and-control servers and Internet domains used by the Ramnit gang

Fanny superworm likely the precursor to Stuxnet

The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet

Load More