News & Info

Home/News & Info

Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android

BlackBerry researchers have released a new report that examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.

2020-04-14T12:39:19+02:00April 7th, 2020|

Zoom’s Encryption Is “Not Suited for Secrets” and Has Surprising Links to China, Researchers Discover

Because Zoom’s service is not end-to-end encrypted, and the company has access to all encryption keys and to all video and audio content traversing its cloud, it’s possible that governments around the world could be compelling the company to hand over copies of this data. If Zoom does help governments spy on its users, the [...]

2020-04-06T13:02:33+02:00April 3rd, 2020|

COVID-19: Hackers Begin Exploiting Zoom’s Overnight Success to Spread Malware

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices. According [...]

2020-03-30T14:21:09+02:00March 30th, 2020|

COVID-19 Themed Attacks Galore

Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use [...]

2020-03-30T14:07:47+02:00March 26th, 2020|

CIA controlled global encryption company for decades, says report

Swiss government orders inquiry after revelations Crypto AG was owned and operated by US and German intelligence The Swiss government has ordered an inquiry into a global encryption company based in Zug following revelations it was owned and controlled for decades by US and German intelligence. Encryption weaknesses added to products sold by Crypto AG [...]

2020-02-12T10:02:04+01:00February 11th, 2020|

Researchers unearth malicious Google Play apps linked to active exploit hackers

Researchers have found more malicious Google Play apps, one of which exploits a serious Android rooting vulnerability so the app can take screenshots and collect other types of sensitive user information.

2020-01-09T12:47:40+01:00January 6th, 2020|

Biometric Identification and Identity Theft

Are Biometrics Actually Proof Positive It's Really You? Biometric verification is a process of identity authentication that is used to confirm identity through uniquely detectable biological traits and may be an effective tool in the war on crime. Television shows like "CSI" and "NCIS" employ biometric ID methods to access fingerprints, facial recognition, voice patterns, and retinal [...]

2020-01-22T13:30:45+01:00December 11th, 2019|

Theremin’s Bug: How The Soviet Union Spied On The US Embassy For 7 Years

The man leaned over his creation, carefully assembling the tiny pieces. This was the hardest part, placing a thin silver plated diaphragm over the internal chamber. The diaphragm had to be strong enough to support itself, yet flexible enough to be affected by the slightest sound. One false move, and the device would be ruined. To fail meant a [...]

2019-10-10T11:52:58+02:00October 9th, 2019|

Telecommunications Breakdown: How Russian Telco Infrastructure was Exposed

UpGuard can now disclose that a storage device containing 1.7 terabytes of information detailing telecommunications installations throughout the Russian Federation has been secured, preventing any future malicious use. This data includes schematics, administrative credentials, email archives, and other materials relating to telecom infrastructure projects. Until recently the files were hosted on a rsync server configured [...]

2019-09-19T14:18:21+02:00September 19th, 2019|

How Secure Is Your Cell Phone Provider?

It’s 2016 and you have a cell phone. You also probably pay your cell phone bill online or through an app. Telecom companies handle the world’s communication and part of what that entails is securing that communication to guarantee privacy and integrity to their customers. Here at UpGuard, we scanned ten of the major telecom [...]

2019-09-23T11:58:26+02:00September 13th, 2019|
Go to Top