Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and even murder.
Como suele suceder con las nuevas tecnologías que surgen en el mercado, es cuestión de tiempo para que empiecen a aparecer pruebas de concepto de diversos ataques. Este fue el caso de Google Glass, ya que durante esta semana apareció un spyware que permite sacar fotos a través de este equipo sin que el usuario
A new app, Snoopwall, could offfer Android users some protection against apps which listen to user data – and transmit it – a problem that plagues the operating system, by allowing users to monitor apps, and disable their ability to transmit or store data.
As expected, malware developers and scam artists have greeted the death of North Korea's dictatorial leader, Kim Jong-il, with Black Hat SEO and Social Engineering attacks. The Supreme Leader of the Democratic People's Republic of Korea suffered a heart attack on a train journey last month and a steady stream of schemes to exploit the
On Saturday, another controversial report of a “government trojan” appeared. This time it is the German government that has been accused by the European hacker club Chaos Computer Club (CCC) of using “lawful interception” malware. Hence, “Bundestrojaner” (Federal Trojan), though that name is normally applied to the legal concept that allows German police to make
[Final Update… I think – THERE WAS NO KEYSTROKE LOGGER please see http://blog.eset.com/2011/03/31/samsung-and-i-got-bit-by-a-vipre to find out what happened.] [Update – There will be a new blog about this incident. I relied upon the information at http://www.networkworld.com/newsletters/sec/2011/040411sec1.html that Samsung had confirmed the presence of the keystroke logger in asserting that the laprops were infected. Since then
My colleague Urban Schrott, from ESET Ireland, wrote a nice feature article for our monthly ThreatSense report (which should be available shortly on the Threat Center page at http://www.eset.com/threat-center) on seasonal scams. As the scam season is starting to get into full swing, we thought it might be good to give it a wider audience here.
In the first part of this blog I told you how to use the basic Flash configuration utility. This blog is for the techies. This time I’ll share with you how to shut the doors on Flash and only open them to the sites you want to trust. Very few people seem to know that
Adobe Flash is, in my opinion, the most ubiquitous spyware in the world and no products detect it as such. The reason it goes undetected is that it also has numerous legitimate uses, however, there is growing evidence that indicates significant abuse. This will be the first in a series of blogs in which I
Apparently France has some new legislation surrounding pirated software. I applaud reasonable approaches to combating piracy, but it appears that France may be ready to make public the answer to the question “Will Anti-virus ignore government Trojan horse programs?” I first saw the story at http://yro.slashdot.org/story/10/08/05/152255/Tech-Specs-Leaked-For-French-Spyware and the story was picked up from http://www.techdirt.com/articles/20100804/04205910492.shtml. If
I was in Cyprus when I first came across the story about this spyware, which I blogged about here and here. Unfortunately, although Intego reported on some of the screensavers that were associated with its distribution, I was obliged to update the blog and remove the link to that information, as it was removed from the
There are times that malicious software actually results in innocent people being accused or even convicted of crimes they did not commit. There are times, however where malware is not to blame. Today I read a story at http://www.theregister.co.uk/2009/12/09/palin_hack_spyware_defence/ where the lawyers for David Kernell, the man accused of hacking Sarah Palin’s Yahoo email account,