Tag Archive for: monitor

A Malware Found on Android Apps Can Steal and Monitor All User Activities


A malware named VajraSpy has been found in more than 12 mobile applications. It is known as Remote Access Trojan (RAT) and about 6 applications from Google Play have been affected by it. Google has immediately removed those apps from Play Store but they are still available as third party apps on the internet, as reported by WeLiveSecurity and ESET. Most of these applications are related to messaging and news. When these apps affected by RAT are installed, your device immediately gets malware and the apps can easily steal your personal information, private data and can even record your phone calls. It can also automatically turn on your front camera and monitor you. It can automatically obtain all the permissions on your mobile phone and can then do surveillance and monitoring of the user, from their notifications to messages and images.

Researchers from ESET were the first ones to report this virus and the PatchWork APT group is behind this and they have been targeting people in Pakistan since 2015. In 2022, this group accidentally unveiled their own malware campaign and they were using Ragnatela RAT for spreading the virus. ESET researchers also found the applications that had the same VajraSpy Code. These applications included Rafaqat, which is a news app. The other applications were related to messaging namely, Privee Talk, MeetMe, Let’s Chat, Quick Chat and ChitChat. The apps that are affected by VajraSpy but are available outside of Google Play are Hello Chat, Yahoo Talk, TikTalk, Nidus, GlowChat and Wave Chat. All of these apps are messaging apps.

As third-party websites do not mention the number of people who have downloaded apps from them, we cannot say anything about how many people have been affected by that virus. ESET has said that most of the victims are from India and Pakistan and they have been tricked into installing these applications. Google Play is introducing a new policy that will make it hard for apps with malware to be on the platform. Till then, people shouldn’t download apps recommended by people they don’t know.

VajraSpy malware infiltrates 12+ mobile apps, including Google Play, posing severe privacy threats.

Photo: Digital Information World – AIgen

Read next: Google Has Removed the Cache Link From its Search Engine Results, Cache Operator will…

Source…

Kyndryl Introduces Experience Management as a Service to Help Customers Monitor, Measure and Achieve Business Outcomes IT Voice








Kyndryl Introduces Experience Management as a Service to Help Customers Monitor, Measure and Achieve Business Outcomes IT Voice | IT in Depth

















































Go toTop









Source…

Bitcoin and Geopolitical Rivalry | Geopolitical Monitor


Bitcoin, the flagship stateless cryptocurrency, is a double-edged sword that can either strengthen or harm national power. As financial warfare becomes increasingly complex, this decentralized cybercurrency is acting as a versatile strategic instrument of statecraft that can play various roles under confrontational geopolitical circumstances. This under-researched subject matter needs to be clarified because it entails meaningful implications for national security, strategic intelligence, foreign policy and grand strategy, but also for the domain of high finance. In order to provide a sharper sense of situational awareness, the following article integrates strategic forecasts that attempt to predict the hypothetical usefulness of Bitcoin for conflicts with scrutiny of illustrative contemporary examples that point in a similar direction.

 

Analysis of Hypothetical Applications

BTC circuits as conduits to bypass sanctions

Bitcoin can offer a potential lifeline for states under sanctions that need to ensure the continuity of their international economic exchanges. Since the BTC grid cannot be controlled by the coercive or restrictive power of national states, its borderless circuitry provides secondary financial arteries worth harnessing to bypass sanctions that limit the ability to carry out cross-border transactions and transfer wealth through more conventional platforms ‒ anchored to major reserve currencies ‒ that enable international payments. An additional advantage of decentralized virtual currencies for sanctioned states is their discretion. They offer covert gateways to engage formal financial systems or even to avoid them altogether if necessary. In other words, it is difficult to determine if sanctions are being neutralized through cryptocurrencies like BTC.

Furthermore, despite their drawbacks ‒ including wildly volatile exchange rates ‒ nonstate cryptocurrencies like BTC are helpful to evade sanctions thanks to their growing transnational projection, their unsupervised channels, and their lack of centralized nerve centers that could be politically threatened, co-opted, or influenced. An academic essay written by US military officer Deane Konowicz for the US…

Source…

The biggest risks of using fitness trackers to monitor health


Fitness trackers, which help keep tabs on sleep quality, heart rate and other biological metrics, are a popular way to help Americans improve their health and well-being. 

There are many types of trackers on the market, including those from well-known brands such as Apple, Fitbit, Garmin and Oura. While these devices are growing in popularity — and have legitimate uses — consumers don’t always understand the extent to which their information could be available to or intercepted by third parties. This is especially important because people can’t simply change their DNA sequencing or heart rhythms as they could a credit card or bank account number. 

“Once the toothpaste is out of the tube, you can’t get it back,” said Steve Grobman, senior vice president and chief technology officer of computer security company McAfee.

The holiday season is a popular time to purchase consumer health devices. Here’s what you should know about the security risks tied to fitness trackers and personal health data.

Stick to a name brand, even though they are hacked

Fitness devices can be expensive, even without taking inflation into account, but don’t be tempted to skimp on security to save a few dollars. While a less-known company may offer more bells and whistles at a better price, a well-established provider that is breached is more likely to care about its reputation and do things to help consumers, said Kevin Roundy, senior technical director at cybersecurity company Gen Digital.

To be sure, data compromise issues, from criminal hacks to unintended sharing of sensitive user information, can — and have — hit well-known players, including Fitbit, which Google bought in 2021, and Strava. But even so, security professionals say it’s better to buy from a reputable manufacturer that knows how to design secure devices and has a reputation to upkeep. 

“A smaller company might just go bankrupt,” Roundy said. 

Fitness app data is not protected like health information

There can be other concerns beyond having a person’s sensitive information exposed in a data breach. For example, fitness trackers generally connect to a user’s phone via Bluetooth, leaving personal data susceptible to hacking.  

What’s…

Source…