#Apple #iOS Software #Vulnerability Is Linked to #Intrusions – Update now to 9.3.5

Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target’s mobile phone, was responsible for the intrusions. The NSO Group’s software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the […]

Read more
Is someone #spying on you?
Proactive Network Security Solutions

Everyday #personal data is stolen in #criminal #cyber #attacks. A large part of the stolen information is subsequently made public on Internet databases, where it serves as the starting point for other illegal activities. With the HPI Identity Leak Checker, it is possible to check whether your e-mail address, along with other personal data (e.g. […]

Read more
#AVM #FRITZ!Box: #Bug allows to initiate and receive arbitrary phone calls

#AVM #FRITZ!Box: #Bug allows to initiate and receive arbitrary phone calls After successful exploitation, attackers gain root privileges on the attacked device. This allows attackers to eavesdrop on traffic and to initiate and receive arbitrary phone calls, if the device is configured for telephony. Furthermore, backdoors may be installed to allow persistent access to the […]

Read more