HackDig : Dig high-quality web security articles for hacker

Android apps are snooping on your installed software

byDanny BradburyAndroid apps are snooping on other software on your device – and that could tell shady advertising companies more about you than you’d like.The news emerged this week in a paper from researchers in Italy, the Netherlands, and Switzerland. The privacy violations centre around installed application methods (IAMs), which are applicat
Publish At:2020-03-27 10:24 | Read:339 | Comments:0 | Tags:Android Google Mobile Operating Systems Privacy Security thr

International Women’s Day: awareness of stalkerware, monitoring, and spyware apps on the rise

Nine months ago, Malwarbytes recommitted itself to detecting invasive monitoring apps that can lead to the excessive harm of women—most commonly known as stalkerware. We pledged to raise public awareness, reach out to advocacy groups, and share samples and intelligence with other security vendors. Now, for International Women’s Day (March 8), we decided t
Publish At:2020-03-09 13:46 | Read:353 | Comments:0 | Tags:Stalkerware Bureau of Justice Statistics center for disease

Sextortionists return for Christmas – price goes down, threats go up

byPaul DucklinA week ago, a concerned Naked Security reader shared with us a “send us money or else” email that was a bit different from others he’d received in the past.The claims and the demands followed a predictable theme – one that we call sextortion because of the connection between sexuality and extortion.Simply put, the scamme
Publish At:2019-12-24 12:35 | Read:751 | Comments:0 | Tags:Malware Spam Cybercrime Scam sextortion spyware

Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack

We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which exhibit many cyberespionage behaviors, are initially used for a targeted attack campaign. We first came across the threat in May on the site http://gooogle[.]press/, which was advertising a chat app called “Chatrious.” Users can download the malicious
Publish At:2019-12-02 14:35 | Read:1021 | Comments:0 | Tags:Bad Sites Mobile android APK cyberespionage spyware

Biometric data processing and storage system threats

Initially, digital biometric data processing systems were used primarily by government agencies and special services (police, customs, etc.). However, the rapid evolution of information technology has made biometric systems accessible for ‘civil’ use. They are increasingly becoming part of our everyday lives, augmenting and replacing traditional
Publish At:2019-12-02 13:05 | Read:833 | Comments:0 | Tags:Featured Malware reports Biometric authentication Data leaks

Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)

Reference2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltr
Publish At:2019-11-21 11:45 | Read:827 | Comments:0 | Tags:spyware Telegram windows

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

In 2018, the video game industry became one of the most lucrative in the world, generating $43.4 billion in revenue within the United States alone. When we consider that video game licenses are only a fraction of the total market, it becomes clear just how important the industry is compared to the movie and music industries, for example. Moreover, conservati
Publish At:2019-11-12 01:05 | Read:738 | Comments:0 | Tags:Featured Publications Electronic Payments Fraud Online Games

For Cybersecurity and Domestic Violence Awareness months, we pledge to fight stalkerware

Starting today, two hallmark holidays are upon us. No, it’s not Halloween and Thanksgiving. It’s both Cybersecurity Awareness Month and Domestic Violence Awareness Month. It’s no coincidence these two awareness campaigns overlap. What were once seen as separate realities—the physical and the digital—are increasingly blurred as our offices, schools, and ho
Publish At:2019-10-01 23:20 | Read:618 | Comments:0 | Tags:Stalkerware Browser guard cyberstalking domestic violence do

ISPs in at least two countries were involved in delivering surveillance FinFisher Spyware

Security researchers at ESET have uncovered a surveillance campaign using a new variant of FinFisher spyware, also known as FinSpy. Finfisher infected victims in seven countries and experts believe that in two of them the major internet providers have been involved. “New surveillance campaigns utilizing FinFisher, infamous spyware known also as FinSpy
Publish At:2017-09-21 20:20 | Read:4454 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence

Dangers Beyond Ransomware – the Risk of Spyware

There’s been a lot of talk recently about ransomware’s impact on the business environment. It would seem that the central role of this attack casts a shadow over one of the classic villains of cybersecurity: spyware. But a large percentage of today’s attacks suffered by companies today involve this malware. Its risks must not go neglected. Know your enemy On
Publish At:2017-09-15 08:00 | Read:2927 | Comments:0 | Tags:Security b2b cybersecurity Spyware

Experts spotted a 2007 variant of Babar, the spyware allegedly used by French Intelligence

Malware researchers at Palo Alto Networks have spotted a 2007 variant of Babar, a strain of malware likely designed by the French Intelligence. In March 2015, researchers detected Babar for the first time, analysis led them into believing it was a product of the French intelligence. According to the experts, Babar malware was used by the General Directorate
Publish At:2017-09-07 16:15 | Read:3707 | Comments:0 | Tags:Breaking News Intelligence Malware Animal Farm Babar Casper

Fruitfly macOS and OS X backdoor remained undetected for years

A new mysterious strain of macOS and OS X malware dubbed Fruitfly went undetected by malware researchers and security software for at least five years. Fruitfly is a backdoor that could be used by attackers to gain full control over the infected systems by implementing many spying features. Fruitfly has the ability to capture screenshots, keystrokes, webcam
Publish At:2017-07-25 12:55 | Read:2778 | Comments:0 | Tags:Breaking News Cyber Crime Malware Fruitfly Hacking Mac OS ba

Chrysaor: The Most Dangerous Spyware Tool Also Affects Android Devices

Stealing large quantities of communication data, taking screenshots, or taking control of your phone’s camera are some of the threats of Chrysaor, a harmful ‘spyware’ that has recently been discovered and which targets Android devices. It is not the first time that the NSO Group, an Israeli company that develops espionage software, has created to
Publish At:2017-07-07 12:20 | Read:2872 | Comments:0 | Tags:Security Android chrysaor Spyware

The OSX.Dok dropper spotted installing the new Bella backdoor

Bad news for Mac users, a new variant of the OSX.Dok dropper was discovered by researchers at Malwarebytes, it was spotted installing a new payload dubbed Bella backdoor. Once the DOK malware infects a macOS system, it gains administrative privileges and installs a new root certificate. The root certificate allows the malicious code to intercept all victim
Publish At:2017-05-03 14:15 | Read:3880 | Comments:0 | Tags:Breaking News Cyber Crime Malware Bella backdoor DOK malware

DOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK Malware is a stealthy malicious code recently discovered by researchers at security firm CheckPoint, it affects almost ant Mac OS X version. Malware researchers at CheckPoint firm have discovered a new stealth Mac malware dubbed DOK that affects almost ant Mac OS X version. At the time of its discovery, the DOK malware has zero detections on VirusTotal a
Publish At:2017-04-28 15:05 | Read:3059 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware DOK malware Mac OS


Share high-quality web security related articles with you:)


Tag Cloud