Australia’s controversial anti-encryption bill is one step closer to becoming law, after the two leading but sparring party political giants struck a deal to pass the legislation. The bill, in short, grants Australian police greater powers to issue “technical notices” — a nice way of forcing companies — even websites — operating in Australia to […]
View More Australia rushes its ‘dangerous’ anti-encryption bill into parliament, despite massive oppositionCategory: Spyware
‘Adware Doctor’ Mac app secretly steals your browsing history and sends it to China
If you have the Adware Doctor app installed on your Mac, you should uninstall it ASAP.
Despite ranking as the top paid utility app in the Mac App Store, Adware Doctor is actually spyware that secretly collects data and sends it to servers in China, a…
Spyware creator arrested for allegedly creeping on thousands for 13 years
The culprit behind the creepy spyware Fruitfly was nabbed finally — after 13 years.
A 28-year-old Ohio man was accused Wednesday of running the malware attack on thousands of computers, according to the U.S. Department of Justice (DOJ).
Phillip Durachinsky was indicted on 16 counts for wiretapping, identity theft, producing child pornography, and other computer fraud violations.
Fruitfly — as the malware was named — was installed on thousands of computers from 2003 through January 2017. Durachinsky had access to personal computers along with devices at companies, schools, a police department, and a subsidiary of the U.S. Department of Energy. Yes, he allegedly was spying on the government, according to the DOJ. Read more…
More about Malware, Department Of Justice, Spyware, Fruitfly, and Tech
View More Spyware creator arrested for allegedly creeping on thousands for 13 yearsSome HP laptops are hiding a deactivated keylogger
Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP laptop models. A full list of affected laptops is here. The keylogger is deactivated by default but could represent a privacy concern if an attacker has physical access to the computer.
“Some time ago someone asked me if I can figure out how to control HP’s laptop keyboard… Read More