Bookmark

Add to MyYahoo RSS

Spyware News

News on Spyware continually updated from thousands of sources around the net.

1 min ago | WKYC-TV Cleveland

Don't fall for these new Facebook scams

Don't fall for these new Facebook scams It's a bad time to be a freeloader or graphic violence voyeur on Facebook. Check out this story on WKYC.com: http://on.wkyc.com/1u9JQkE Links making the social media rounds are leaving anyone who clicks with a fresh batch of malware on their computer, or worse Scams trick you into clicking for either a free iPhone 6 or a video allegedly showing a husband killing his wife Two new scams promising, respectively, a free iPhone 6 and a video of a woman being killed by her husband are making the social media rounds and leaving anyone who clicks with a fresh batch of malware on their computer, or worse.

Comment?

Related Topix: Startups, Facebook, Science / Technology

6 hrs ago | InfoWorld

Feds seek expanded PC hacking powers for criminal investigations

The FBI and Department of Justice are mulling rules that would allow broader opportunities for domestic law enforcement to hack PCs as part of a criminal investigation Since earlier this year, the Department of Justice has been eyeing an expansion of the rules governing its ability to hack into PCs as part of a criminal investigation. Under an expanded version of the key rule, known as Rule 41, many domestic law-enforcement agencies -- the FBI, the ATF, and the DEA -- would be able to remotely hack multiple PCs under a single warrant, and to hack them even when the physical locations of the machines in question are not known.

Comment?

Related Topix: PC, US News, US Federal Bureau of Investigation, ATF, Drug Enforcement Administration, Science / Technology

Tue Sep 16, 2014

Information Technology

F-Secure Stays Ahead of the Game With Award-Winning Security for Every Device... in One

With its revamped, refreshed 2015 consumer product lineup being launched today, F-Secure is including multi-device Internet security. New, improved F-Secure SAFE offers F-Secure's award-winning* security for all one's devices -- Windows and Mac computers and Android, iOS and Windows Phone 8 smartphones and tablets.

Comment?

Related Topix: PC, Science / Technology

MediaPost

IAB Unveils Anti-Fraud Effort, Forms Working Group

In an effort to make online advertising a safer place, the Interactive Advertising Bureau this morning unveiled "Anti-Fraud Principles" designed to address the proliferation of fraudulent advertising activities, including non-human traffic software scams. As part of the effort, the IAB said it has also formed a new " working group " to identify and combat "malware," and other threats to the digital advertising "supply chain."

Comment?

Related Topix: Science / Technology

Russia Taday

a Governments spy on journalists with weaponized malware - WikiLeaks

Journalists and dissidents are under the microscope of intelligence agencies, Wikileaks revealed in its fourth SpyFiles series. A German software company that produces computer intrusion systems has supplied many secret agencies worldwide.

Comment?

Related Topix: WikiLeaks, Science / Technology, Journalism, Europe, World News, Germany, Julian Assange, Angela Merkel

Slashdot

NSW Police Named as FinFisher Spyware Users

Bismillah writes Wikileaks' latest release of documents shows that the Australian New South Wales police force has spent millions on licenses for the FinFisher set of law enforcement spy- and malware tools - and still has active licenses. What it uses FinFisher, which has been deployed against dissidents by oppressive regimes, for is yet to be revealed.

Comment?

Related Topix: Science / Technology, Australia, World News

Mon Sep 15, 2014

Manawatu Evening Standard

NZ spied on Pacific neighbours - Greenwald

SPIES AND LIES: American journalist Glenn Greenwald claims the Government has misled the New Zealand public over the extent of GCSB surveillance activities. The Snowden files will show New Zealand spied on its Pacific neighbours and other Western democracies, journalist Glenn Greenwald says.

Comment?

Related Topix: Oceania, New Zealand, World News, Science / Technology, Europe, Germany, Southeast Asia, Indonesia

Politico

New Snowden docs: The NSA's program to map the entire Internet -...

NEW SNOWDEN DOCS: THE NSA'S PROGRAM TO MAP THE ENTIRE INTERNET - The Intercept and Der Spiegel offered a fuller picture Sunday of Treasure Map, the National Security Agency's campaign to map nearly all data traffic on the Internet in essentially real time. Though the program was first reported by The New York Times last November, the documents show Treasure Map has more capacity and a broader focus than intelligence officials first told the Times, The Intercept writes.

Comment?

Related Topix: Publishing, Media, New Times, Europe, World News, Germany, Angela Merkel, Science / Technology

Computing.co.uk

Analysis: Why is Adobe Acrobat so insecure?

Another day, another Adobe Acrobat security flaw. Or so it sometimes seems. The latest exploit, uncovered at the beginning of September, enables attackers to surreptitiously download malware to the user's PC in the background while he or she peruses a seemingly innocuous document.

Comment?

Related Topix: Science / Technology, Computer Security

Information Technology

Desktop Version of Anti-Malware Program Gate Scanner Released

A new desktop version of Sasa Software's industry-leading enterprise security software, Gate Scanner, was released today. "The new desktop version has a range of management capabilities as well as increased scanning and cleaning capabilities," said Yakov Yeroslav, CEO of Sasa Software.

Comment?

Related Topix: Science / Technology, Marketing

Sydney Morning Herald

NSW Police caught using spyware

NSW Police are using sophisticated hacking software to spy on smartphones and computers during criminal investigations, according to documents published by WikiLeaks on Monday. FinFisher , also known as FinSpy, is surveillance software sold by German company Gamma International.

Comment?

Related Topix: Science / Technology, WikiLeaks, Skype, Julian Assange

Fri Sep 12, 2014

Lawsites

Viruses are More Common at Law Firms than Encryption, ABA Survey Shows

Nearly half of law firms were infected with viruses, spyware or malware last year, according to the latest ABA Legal Technology Survey Report. At the same time, only a quarter of law firms had any kind of email encryption available for their lawyers to use, the survey found.

Comment?

Related Topix: Science / Technology, Computer Security

Computing.co.uk

pirate-icon

Top 10 IT news stories of the week: Barclays wants to read your veins, the BBC thinks you're a filthy pirate and a little-known company released a new mobile phone... One story towered above all others this week - but you'll have to scroll down to the bottom of the page for confirmation of what it was. Elsewhere, however, the security of the so-called "Internet of Things" received much attention - the problem is that it doesn't appear to have any.

Comment?

Related Topix: Best of 2007, Salesforce, Science / Technology

Thu Sep 11, 2014

Dark Reading

Franchising The Chinese APT

Two Chinese cyber espionage gangs known for targeting very different industries and working out of different regions of the nation actually use some of the same or similar tactics, tools, and resources in their spying operations, researchers found. Such collaboration and resource sharing has not typically been the MO among Chinese cyber espionage groups, and this could indicate an evolution in the nation's cyberspying operations toward more organized, streamlined, and cooperative operations, according to FireEye, which studied the inner workings of the groups.

Comment?

Related Topix: Science / Technology, CPU

Information Technology

Trustlook Introduces New Web Security Solution With Porn Filter for Android Devices

When users surf a porn sites, Trustlook Antivirus will notify users of its potential risk or content violation based on the set filtering policy. As mobile browsing is becoming increasingly popular, more and more users are demanding to be informed as to whether the content they are visiting is appropriate or not.

Comment?

Related Topix: Science / Technology

Kasperky Lab Weblog

Thefts in Remote Banking Systems: Incident Investigations

More and more companies are asking Kaspersky Lab to carry out detailed investigations of malware-related IT security incidents affecting their business. In this article, we will describe a typical cybercriminal attack aiming at stealing corporate financial assets from a remote banking system.

Comment?

Related Topix: Science / Technology

Wed Sep 10, 2014

Hispanic Business

Patent Issued for Selective Revocation of Heuristic Exemption for Content with Digital Signatures

This is a good policy, as it both reduces false positives and allows trusted third party applications to bypass heuristic detection without requiring interaction with the publisher of the security software. "However, sometimes a digital signature provider provides signatures to entities which the security software publisher does not trust.

Comment?

Related Topix: Science / Technology, Inventions

Hispanic Business

An Application for the Trademark 'SPYDEFY' Has Been Filed by Support.com

The international trademark goods and services class code for this trademark application is 009.

Comment?

Related Topix: Startups, SupportSoft, Computers, Science / Technology

PC World

These 5 antivirus suites keep potentially unwanted programs (PUPs) from biting

Adware and potentially unwanted programs might not seem like viruses to some people, but they can wreak havoc and cause major annoyances. It's like comparing terriers to guard dogs: A misbehaved terrier may not be as dangerous as a bad-tempered junkyard dog , but the little ankle-biters can sure get on your nerves, and they tend to nip more often.

Comment?

Related Topix: Science / Technology, PC

Tue Sep 09, 2014

KIMT

hacker safety

KIMT News 3- Hackers are all over the internet and with new hoaxes, and untrustworthy websites, Patrick Palmer of Computer Guy in Hampton wants people to know how to stay protected. He stresses that you need to make sure your passwords are long enough and contain symbols and not just letters.

Comment?

Related Topix: Science / Technology, Computer Security

•••
•••
•••

Spyware Jobs

•••
•••
•••
•••