Search Results for: surveillance Blog Post Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in... Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set.... Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... Knowledge Center Dark Web Surveillance Services July 30, 2019 In today’s threat surface there are multiple ways to know that your company has been hacked. Typically, this is done... Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve... Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in... Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post Thousands of images stolen from CBP Subcontractor June 13, 2019 A subcontractor at the Customs and Border Protection (CBP) agency was victim of a data breach, officials stated Monday. Over... Blog Post Live Facial Recognition Cameras Across London January 28, 2020 The Metropolitan Police has announced that the live facial recognition cameras are set to be deployed across London for the... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Your Security Cameras Are A Risk! January 24, 2020 Since the development of IoT devices, IP security cameras have become more and more popular. Smart cameras are like... Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to... Blog Post Insider Threats Cost $11.45 Million in Average February 14, 2020 We are always protecting our network from external threats, but sometimes we ignore the larger threats that hide inside. This...
Blog Post Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...
Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in...
Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set....
Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
Knowledge Center Dark Web Surveillance Services July 30, 2019 In today’s threat surface there are multiple ways to know that your company has been hacked. Typically, this is done...
Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve...
Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital...
Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post Thousands of images stolen from CBP Subcontractor June 13, 2019 A subcontractor at the Customs and Border Protection (CBP) agency was victim of a data breach, officials stated Monday. Over...
Blog Post Live Facial Recognition Cameras Across London January 28, 2020 The Metropolitan Police has announced that the live facial recognition cameras are set to be deployed across London for the...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Your Security Cameras Are A Risk! January 24, 2020 Since the development of IoT devices, IP security cameras have become more and more popular. Smart cameras are like...
Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to...
Blog Post Insider Threats Cost $11.45 Million in Average February 14, 2020 We are always protecting our network from external threats, but sometimes we ignore the larger threats that hide inside. This...