Remove Groups Remove Programming Remove Spyware Remove Windows
article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

Daily Crunch: Thousands of Google Play users download Android banking trojan

TechCrunch

But first, some programming notes: Our city spotlight series is back, and TechCrunch is heading to Austin. Tech’s response to Russia: I’m bringing you these notes as a group so that you can digest them in sequence. Image Credits: sergeyskleznev (opens in a new window). You can sign up here.). Big Tech Inc.

Banking 224
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Daily Crunch: Byju’s founder chips in toward $800M funding round to reach $22B valuation

TechCrunch

EU to investigate state use of spyware : The Pegasus mobile spyware is causing headaches in Europe for more than just the folks who found themselves targets of the software. Image Credits: Luca Lorenzelli/EyeEm (opens in a new window) / Getty Images. The TechCrunch Top 3. Bruno Vieira Costa, founder and CEO, Abstra.

Spyware 181
article thumbnail

Daily Crunch: After clinching $12.3B valuation, Brex hires Meta exec as chief product officer

TechCrunch

Today we have new venture funds, spyware news, Brex raising (again), and more. Cybersecurity matters to democracy : Spyware built by the infamous NSO Group was “used to spy on three critics of the Polish government,” according to Citizen Lab, TechCrunch reports. Image Credits: ShadowPix (opens in a new window) / Getty Images.

UI/UX 236
article thumbnail

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities

Tenable

On September 7, researchers at Citizen Lab published a blog post detailing their discovery of an iPhone zero-click, zero-day exploit chain in Apple iOS used to deploy a spyware known as Pegasus. ImageIO or Image I/O is a framework that allows programs to read and write image file formats, including WebP. What is WebP or libwebp?

article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

The digital-rights group Electronic Frontier Foundation and Lookout Mobile Security, which co-authored the report, say they tracked the Dark Caracal phishing campaign across more than 60 websites. While some antivirus software [programs] focus on detecting known exploits, these apps were fully functional except for the Trojanized part.”.

Malware 170
article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. government is alerting healthcare companies in particular about the threat from the ALPHV Blackcat ransomware-as-a-service (RaaS) group, which this week claimed responsibility for an attack against Change Healthcare. And the most prevalent malware in Q4.