article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

WhatsApp confirms it’s been targeted by spyware. That’s exactly its customers’ fear

CTOvision

Since WhatsApp was acquired by Facebook in 2014, users of the messaging app have long speculated on how secure the platform would be from its new parent company’s data collection practices.

Spyware 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fed Tech News Roundup

CTOvision

Hacking Team gets hacked; invoices show spyware sold to repressive govts Ars Technica (Today) - A controversial company that sells weaponized spyware has been penetrated by hackers who claim to have plundered more than 400GB worth of e-mails, source code, and other sensitive data—including invoices. In 2014, the.

Spyware 114
article thumbnail

Technology News and Hot Topics

CTOvision

Regin, new computer spyware, discovered by Symantec. 2014’s top ten technology buzzwords to learn and to avoid. Angry Birds, Clash of Clans, Monument Valley and Kim Kardashian: Hollywood are among the iOS apps taking part in Apple’s latest fundraising drive for Aids charity Red.

article thumbnail

Dell: Privately owned PC and server maker

CTOvision

Dell was listed at number 51 in the Fortune 500 list, until 2014. [10] 5 Free Tools to Prevent Viruses and Spyware from Crippling Your PC (pcrichard.com). 10] After going private in 2013, the newly confidential nature of its financial information prevents the company from being ranked by Fortune. windowscentral.com).

Spyware 61
article thumbnail

Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2

Ivanti

The other good news is these suspicious or untrusted configuration profiles, malware, and other malicious exploits including the Pegasus spyware will be detected by Ivanti Mobile Threat Defense (MTD) and trigger compliance actions like block access to corporate resources or quarantine actions on the device. CalDAV calendar service settings.

Malware 97
article thumbnail

Why Is It Necessary to Run Cybersecurity Evaluation Exercises?

Altexsoft

In 2014, eBay encountered a major security failure that resulted in data theft involving over 145 million user accounts. Moreover, spyware can result in data losses that can also mean disruptions in business operations. As Accenture Managing Director Robert Kress puts it, “.