Post Thumbnail

The war on drugs has a surprising soldier amongst its ranks: Italian spying software. As Motherboard's sources tell it, the Drug Enforcement Administration's dropped $2.4 million on surveillance tools that are capable of intercepting phone calls, texts, social media messages, and can even take hol...

2 days ago 0 Comments
April 16, 2015 at 6:51AM
Post Thumbnail

Arkansas' Fort Smith Police Department may be responsible for some particularly sinister digital tricks, if you ask one lawyer. An attorney representing whistleblowers in a police corruption scandal says that the Department sent him a hard drive laden with trojans when he requested documents. Give...

2 days ago 0 Comments
Post Thumbnail

If you think that commercial software designed to spy on computers is problematic, you're not alone. The Organization for Economic Cooperation and Development's UK contact has determined that Gamma International's approach to selling its FinFisher spyware violates human rights guidelines. The deve...

1 month ago 0 Comments
Post Thumbnail

Google's already making sure you don't download malware, and now it's expanding its Safe Browsing initiative. In addition to preventative warnings prior to downloading, the Chrome browser will now throw a red flag (pictured after the break) before visiting a site that may encourage you to install ...

1 month ago 0 Comments
Post Thumbnail

Buy a new Lenovo computer recently? Well, it looks like it could be infected with some factory-installed adware. Users on the official Lenovo forums started noticing that search results were being injected with sponsored links (like what happens when a machine is infected with typical adware or sp...

1 month ago 0 Comments
Post Thumbnail

A US District Judge in Virginia has ordered the man responsible for selling and distributing StealthGenie, an application used to spy on people, to pay a $500,000 fine and hand over the software's source code to the authorities. Hammad Akbar, who is originally from Denmark, last week pleaded guilt...

4 months ago 0 Comments
Post Thumbnail

Want to see a classic example of irony? Head to the US Computer Emergency Readiness Team (CERT) website. The government security group has issued a public warning about Regin... you know, the extra-sophisticated malware that many suspect the US wrote to spy on telecom networks. It's more than a l...

4 months ago 0 Comments
Post Thumbnail

Symantec said that the recently detailed Regin spyware looked like it was created for government surveillance, and there's now some strong support for that claim. Both Kaspersky Lab and Wired understand that the super-sophisticated malware was used to infiltrate both Belgian carrier Belgacom and c...

4 months ago 0 Comments
Post Thumbnail

The DEA isn't the only US law enforcement agency using impersonation on the web to catch suspects, it seems. The American Civil Liberties Union's Christopher Soghoian has noticed documents showing that the FBI created a fake, spyware-laden version of the Seattle Times' website to catch a teen bomb...

5 months ago 0 Comments
Post Thumbnail

Hong Kong's pro-democracy protesters have more to worry about than they thought -- someone is gunning after their phones, too. Lacoon Mobile Security says it has detected new spyware, Xsser, that tries to trick WhatsApp users on Android and iOS by posing as a coordination tool for the Occupy Centr...

6 months ago 0 Comments
Post Thumbnail

Apparently, the US government is now on a mission to bring down mobile applications offering spyware services -- which, for a variety of well-documented reasons, simply seems kind of ironic. Controversy aside though, the Department of Justice revealed today that Hammad Akbar, CEO of StealthGenie, ...

6 months ago 0 Comments
Post Thumbnail

After becoming embroiled in the NSA brouhaha by giving Edward Snowden sanctuary, Russia is again on the defensive after reports suggested it may have slipped G20 leaders compromised devices. A pair of Italian newspapers said that German security experts discovered "USB sticks and recharge cables (...

1 year ago 0 Comments
Post Thumbnail

If we didn't love the EFF already, we'd be proposing marriage now that it's managed to reverse-engineer Carrier IQ's pernicious monitoring software. CIQ exists in phones in three parts, the app itself, a configuration file and a database -- where your keystrokes and coded "metrics" are logged b...

3 years ago 0 Comments
Post Thumbnail

See that chart up there? That's a beautiful visualization of a dozen folk models surrounding the idea of home computer security, devised by Michigan State's own Rick Wash. To construct it (as well pen the textual explanations to back it), he interviewed a number of computer users with varying level...

4 years ago 0 Comments