Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things
New variants of Android spyware linked to advanced persistent threat
"The attackers use social engineering to lure victims into granting the permissions needed to see into every corner of their digital life."
Zoom meetings infiltrated by hackers - Check Point
Check Point Research found hackers could eavesdrop on Zoom meetings by generating and verifying Zoom meeting IDs.
After five years, the InvisiMole spyware isn't so invisible anymore
InvisiMole is able to turn the affected computer into a video camera, which allows the attackers see and hear what’s going on around their victim.
2017 brought a surge of ransom & hijack attacks against APAC
Asia Pacific is a hotspot for ransomware, hijackers, spyware and worms and one security expert believes that the region is becoming a major target.
Global ISPs could be complicit in major spyware surveillance program
ISPs could be helping a notorious spyware agent keep track of surveillance targets.
Welivesecurity reveals the eight things you should know about spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.