T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360
What is Pegasus, and why should we be concerned?
Project Pegasus has caused a great deal of global hype recently. After Wikileaks (2007-2017), the Snowden papers (2013), the Bangladesh Bank cyber heist (2016), and Cambridge Analytica (2018), Pegasus made big headlines in the cybersecurity space.
The spyware Pegasus, up until now, is by far the most invasive security phishing tool developed by NSO Group, an Israel-based software company. The company has upgraded Pegasus over the past few years since its inception in 2016, now to a military-grade cyber weapon system. As a matter of fact, initially it was designed and developed to cater for Israeli military intelligence and surveillance. NSO then gradually went on to commercialize the product and sold it to its “vetted” global clientele upon official approval from the government of Israel.
In a couple of years, NSO sold its Pegasus software to as many as 40 countries. However, these deals were made only through agreements at the government level mandating the spyware to be used solely for domestic cyber-surveillance and crime control.
Ironically, the way Pegasus has been used or abused showed it to be far from its ideal purposes. 50,000 mobile phone numbers from all around the world have reportedly come under Pegasus surveillance. What it means in reality is that those 50,000 personal phones — belonging to statesmen, politicians, journalists, corporate executives, human rights activists, government officials — are potentially subject to being hacked or snooped.
The hacking happens with a backdoor and in complete silence, leaving no traces behind for the victimized user. No doubt, in terms of sophistication, Pegasus can be rated as one of the best cybersecurity technologies, but one of the worst for how it can be abused.
The dark side of digital convenience
Needless to say, on a daily basis, we are soaked in the utter convenience that our modern-day technology, especially the internet-based technologies, such as smartphones and other hand-held devices, offer. As common users, we tend to forget that a piece of consumer technology can carry its inherent pitfalls.
But we simply go with the tech flow. While smartphones seem…