China is known to have been working on its surveillance strategies for a while now, with AI playing a significant role in...
The latest findings of security researchers at security firm Lookout and privacy firm Security Without Borders are not only groundbreaking but concerning....
Cybersecurity researchers have discovered an iOS version of the powerful mobile phone surveillance app that was initially targeting Android devices through apps...
An RTSP stream access tool that comes with its library Cameradar allows you to Detect open RTSP hosts on any accessible target...
This can be one of one of the largest corporate spying and hardware hacking campaigns ever launched by a nation-state. Bloomberg has...
The company has patched a critical vulnerability in Cisco Video Surveillance Manager that could be exploited to gain root access Reports of...
A Romanian Woman Eveline Cismaru. 28, pled guilty to federal charges for illegally gaining access to more than 126 computers that connected...
New research reveals that Israel based NSO Group using powerful mobile based Pegasus Spyware to conducting massive surveillance in 45 countries across...
Senator Ron Wyden of Oregon has made startling new revelations about CSS or cell-site stimulators. These cell surveillance devices, better known as...
Corporate systems are categorized into two: Internally developed Developed by a vendor Internally developed systems are the exact tailor fit solutions that...
Many of us already know that the internet traffic passes through different countries before reaching its destination. But did you know that...
Phone Hackers: Britain’s Secret Surveillance In this video Vice Media uncovers one of Britain’s secret surveillance devices the IMSI catcher. International Mobile...
Information security training specialists report a new ruling from The Supreme Court, establishing that, in most cases, the Government will need an...
A 74-year old rancher in Texas discovered a small portal surveillance camera installed on his property in the south of Encinal, Texas,...
Charges filed against pair coincide with arrests abroad. Two of the five unnamed individuals cuffed this month in Romania on suspicion of spreading ransomware...
Pentagon Data Leak, other three Amazon Web Services S3 cloud storage buckets that contain social media surveillance data configured in the way...
The Texas National Guard bought two DRT 1301C cell-site simulator devices for more than $373,000. The purpose of buying these devices was...
Similar to questionable stingray devices, DRT’s operations nicknamed “dirt boxes” mimic cellphone pillars, relating to every smartphone within a specific area. Because...
EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python. This tool creates 1 line multi stage payloads...
University of Washington’s Paul G. Allen School of Computer Science & Engineering research team has concluded that it is possible to use...
Taking over an IoT (Internet of Things) device is nothing new for hackers, but since users have become increasingly dependent on smart devices,...