The U.S. government’s must-pass defense policy bill includes a measure that aims to shield U.S. troops and diplomats from ensnarement by commercial spyware programs. The provision, slotted into the ...
The U.S. government’s must-pass defense policy bill includes a measure that aims to shield military servicemembers and diplomats from ensnarement by commercial spyware programs. The provision, slotted ...
Researchers have found a new case where government authorities used a fake Android app to plant spyware on a target’s phone. The company that allegedly developed the spyware was not previously known ...
A new warning has been issued to Apple iPhone users by researchers after they analysed spyware that had taken over targets’ devices. A new warning has been issued to Apple iPhone users by researchers ...
A spyware company called Spytech has been hacked with the leaked data showing some 10,000 devices under surveillance, according to a report from TechCrunch. The Minnesota-based firm creates ...
The technology can be as small as a suitcase, placed anywhere at any time, and it's used to track cell phones and intercept calls. The News4 I-Team found dozens of potential spy devices while driving ...
Apple issued four waves of alerts in 2025 warning users of spyware attacks targeting high-profile individuals CERT-FR confirmed the use of advanced tools like Pegasus and Predator, exploiting zero-day ...
Before the elections, the cybersecurity team of U.S. vice president and then-presidential candidate Kamala Harris reached out to Apple asking for help, according to Forbes, after a tool that’s ...
On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps ...
Qualcomm is urging device makers that use a selection of its chips to implement the fixes the company has rolled out for vulnerabilities within chip firmware that reports state has been exploited in ...
Spyware is designed to stay invisible, so if it’s hiding on your computer, you’re not supposed to notice—at least not right away. I want to walk you through the specific warning signs, tools, and ...