Skip to main content

FBI Probes Use of Israeli Firm's Spyware In Personal and Government Hacks

nickwinlund77 shares a report from Reuters: The FBI is investigating the role of Israeli spyware vendor NSO Group Technologies in possible hacks on American residents and companies as well as suspected intelligence gathering on governments, according to four people familiar with the inquiry. The probe was underway by 2017, when Federal Bureau of Investigation officials were trying to learn whether NSO obtained from American hackers any of the code it needed to infect smartphones, said one person interviewed by the FBI then and again last year.

The FBI conducted more interviews with technology industry experts after Facebook filed a lawsuit in October accusing NSO itself of exploiting a flaw in Facebook's WhatsApp messaging service to hack 1,400 users, according to two people who spoke with agents or Justice Department officials. Part of the FBI probe has been aimed at understanding NSO's business operations and the technical assistance it offers customers, according to two sources familiar with the inquiry. Suppliers of hacking tools could be prosecuted under the Computer Fraud and Abuse Act (CFAA) or the Wiretap Act, if they had enough knowledge of or involvement in improper use, said James Baker, general counsel at the FBI until January 2018. The CFAA criminalizes unauthorized access to a computer or computer network, and the Wiretap Act prohibits use of a tool to intercept calls, texts or emails. NSO is known in the cybersecurity world for its "Pegasus" software other tools that can be delivered in several ways. The software can capture everything on a phone, including the plain text of encrypted messages, and commandeer it to record audio."



from Slashdot: News for nerds, stuff that matters https://ift.tt/31bA5dS
via IFTTT

Comments

Popular posts from this blog

An AI Epidemiologist Sent the First Warnings of the Wuhan Virus

An anonymous reader shares a report: On January 9, the World Health Organization notified the public of a flu-like outbreak in China: a cluster of pneumonia cases had been reported in Wuhan, possibly from vendors' exposure to live animals at the Huanan Seafood Market. The US Centers for Disease Control and Prevention had gotten the word out a few days earlier, on January 6. But a Canadian health monitoring platform had beaten them both to the punch, sending word of the outbreak to its customers on December 31 . BlueDot uses an AI-driven algorithm that scours foreign-language news reports, animal and plant disease networks, and official proclamations to give its clients advance warning to avoid danger zones like Wuhan. Speed matters during an outbreak, and tight-lipped Chinese officials do not have a good track record of sharing information about diseases, air pollution, or natural disasters. But public health officials at WHO and the CDC have to rely on these very same health of...

4 Trends that are Transforming the Future of Healthcare

4 Trends that are Transforming the Future of Healthcare Yoav Vilner / AI , Health , ReadWrite From drinking one’s own urine as a cure for broken bones to blood-letting to sending electrical shocks through a person’s body as a cure for mental illness — healthcare has a somewhat jaded past. Fortunately, as technology has improved our ability to study human physiology, medical professionals have become increasingly adept at diagnosing and curing […] from ReadWrite - The Blog of Things https://ift.tt/37qWAxu via IFTTT

New Web Service Can Notify Companies When Their Employees Get Phished

Starting today, companies across the world have a new free web service at their disposal that will automatically send out email notifications if one of their employees gets phished . From a report: The service is named " I Got Phished " and is managed by Abuse.ch, a non-profit organization known for its malware and cyber-crime tracking operations. Just like all other Abuse.ch services, I Got Phished will be free to use. Any company can sign-up via the I Got Phished website. Signing up only takes a few seconds. Subscribing for email notifications is done on a domain name basis, and companies don't have to expose a list of their employee email addresses to a third-party service. Once a company's security staff has subscribed to the service, I Got Phished will check its internal database for email addresses for the company's email domain. This database contains logs from phishing operations, with emails for phished victims. from Slashdot: News for nerds, stuff tha...