5 Signs Your Cell Phone was Bugged Remotely

5 Signs That Someone Bugs Your Cell Phone Remotely - Making Sense of Security

5 Signs That Someone Bugs Your Cell Phone Remotely – Do you remember those old spy films, where a secret agent had to fish for information by secretly tracking his enemies and listening to their conversations? A spy knew how to bug someone’s phone without being noticed, and it fascinated the audience. Nowadays, there is no necessity to use bugs, as modern technologies make it possible to install a monitoring app on another person’s device remotely to intercept their phone calls. But why would someone need to bug cell phones using a specific software? One of the reasons is to protect a child who uses the Internet from online predators. Researchers say that 89% of grooming and sexual abuse toward kids takes place in online chat rooms and via instant messengers, such as Facebook, Snapchat, Tinder, and others. Smart parents consider listening to their kids’ phone calls a good way to prevent them from being exploited.

FBI hacks vulnerable US computers to fix malicious malware

malicious malware

FBI hacks vulnerable US computers to fix malicious malware The FBI has been hacking into the computers of US companies running insecure versions of Microsoft software in order to fix them, the US Department of Justice has announced. The operation, approved by a federal court, involved the FBI hacking into “hundreds” of vulnerable computers to

REvil Ransomware Now Helps with Extortion by Offering to Call the Victim’s Contractors and the Media

REvil Ransomware call victim

The bad guys are going to great lengths to ensure they make their money. As part of its Ransomware-as-a-Service, REvil is now expanding its services to aid in the extortion phase. REvil/Sodinkibi has been a major player in the RWaaS market, providing its’ affiliate bad guys with functional ransomware malware and a payment site. They

Researchers Have Their Eye on Malicious Clones of Android Apps That Put Devices at Risk

Android mobile phone monitoring tracking spy

Researchers at Check Point have found malicious apps in the Google Play Store that will download Trojans to infected devices. “Check Point Research (CPR) recently discovered a new Dropper spreading via the official Google Play store, which downloads and installs the AlienBot Banker and MRAT,” the researchers write. “This Dropper, dubbed Clast82, utilizes a series