Catch up with what the zero-day threat is, that your organisation is facing here: As a zero-day flaw is such a useful way in for threat actors to a system, it is no surprise that there is monetary value for zero-day vulnerabilities between hackers, for hacking, “legitimate” software who produce …
Where to start in 2024?
Happy New Year. I am going to start the cyber news for 2024 with a story that broke between Christmas and the New Year – Apple iPhone hardware vulnerabilities. I am a great supporter of the Apple iPhone and the associated “walled garden” App store as a good cyber security …
It is getting to be a habit…
…to end the week with a malicious Android app: APT41 hackers target Android users with WyrmSpy, DragonEgg spyware (bleepingcomputer.com) If you need to know why you need to pay attention to these Android (and sometime Apple iOS) smartphone app cyber security threats, then read on here: Just Check – CyberAwake …
Spyware hacked
LetMeSpy is advertised as software that can be installed on an Android device to allow parents to keep an eye on children or employers to monitor their staff. Both of which if done in the clear are a good idea, the employer option has some really positive outcomes when it …
Let’s finish the week where we started it – Android Malware
Here is a deep dive on the operation of the Predator Android malware by Bill Toulas of Bleeping Computer from research by Cisco Talos and the Citizen Lab. Predator: Looking under the hood of Intellexa’s Android spyware (bleepingcomputer.com) Predator is commercially available malware – only sold to governments or authorised …
Continue reading “Let’s finish the week where we started it – Android Malware”