Skip to content

Security and tech news with Xploiter.com

Be Safe, Be Secure

Category: Spyware

Posted on June 21, 2017

Commercial spyware unleashed against Mexican political activists

The software company says it vets governments’ human rights records before selling its software that’s allegedly being used to spy on lawyers, journalists and activists

Posted on June 20, 2017

Mexican Journalists, Lawyers Focus of Government Spyware

Dozens of Mexican journalists, lawyers, and even a child, were hit with Pegasus, commercially-produced spyware, as part of a campaign believed to be carried out by the nation’s government.

Posted on May 10, 2017

Mac video app HandBrake – now with free spyware

Last week, crooks hacked one of the HandBrake app’s download servers and used the popular video app to distribute Mac spyware.

Posted on May 9, 2017

HandBrake for Mac Compromised with Proton Spyware

The open source HandBrake project is warning anyone who recently downloaded the Mac version of the software that they’re likely infected with malware.

Posted on May 2, 2017

Fox News ‘hacked Andrea Tantaros’, says lawsuit

Fox ‘hacked’ Tantaros’s devices to install a keylogger, claim her lawyers, and used the information they found to harass her

Posted on April 23, 2017

SMSVova Spyware Hiding in ‘System Update’ App Ejected From Google Play Store

An Android app that falsely claimed to be a tool for keeping smartphones up-to-date with the latest version of the OS was found surreptitiously tracking the physical location of it users using spyware called SMSVova.

Posted on April 13, 2017

Office Zero Day Delivering FINSPY Spyware to Victims in Russia

Researchers have learned that the recently patched Office zero day was used to target victims in Russia with FINSPY spyware.

Posted on March 17, 2017

Court blocks American from suing Ethiopia over alleged hacking

Activists mull challenge to court’s ruling that remote hacking can’t be litigated in the US

Posted on January 18, 2017

Student keylogger creator faces jail after pleading guilty

Keylogger developed while accused was in high school went on to infect some 16,000 computers, say prosecutors

Posted on December 21, 2016

Smile! You’re on a stolen iPhone’s candid camera!

But was it ethical for filmmaker to set up a device as a honeypot for a thief?

Recent Posts

  • Health trust rapped on illegal use of patient data in Google AI deal
  • GDPR: who needs to hire a data protection officer?
  • News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online
  • Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools
  • Court Blocks EPA Effort To Suspend Obama-Era Methane Rule

Recent Comments

  • Eric Plambeck on An Assembly Language Primer(C) 1983 by David Whitman
  • Frank van Bommel on Delphi Tips
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • sen on URL Rewriting in Asp.net using URLRewriter

Archives

  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • September 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • March 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008

Categories

  • 2FA
  • angler
  • car hacking
  • certificate authorities
  • chrome
  • Cisco systems
  • Cisco Telepresence
  • Cloud Security
  • Critical Infrastructure
  • Cryptography
  • DDoS
  • DMCA
  • exploit kit
  • Facebook
  • Gmail
  • google
  • Google Transparency Report
  • Government
  • HackerOne
  • Hacks
  • HTTPS
  • ICS
  • IoT
  • IoT botnet
  • IoT devices
  • IoT security
  • IT
  • Javascript
  • Kevin Beaumont
  • Locky
  • malicious JavaScript
  • Malware
  • Microsoft
  • Mirai
  • Mirai botnet
  • Mirai malware
  • Mobile Security
  • mobile spyware
  • Neutrino
  • Nuclear
  • open source software
  • Pegasus
  • Privacy
  • ransomware
  • RIG Exploit Kit
  • SCADA
  • Schneider Electric
  • Science
  • Spyware
  • SSL
  • Uncategorised
  • Uncategorized
  • Vulnerabilities
  • Web Security
  • zero day vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino ffortino@svn.net Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino ffortino@svn.net Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Privacy Policy
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)
Privacy Policy Proudly powered by WordPress
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]