347 Results for:spyware
- Sort by:
Illegal state surveillance in Africa ‘carried out with impunity’
28 Oct 2021Analysis of surveillance laws and practices in six African countries finds that existing privacy laws are failing to protect citizens from illegal digital surveillance, which is being facilitated and enabled by ... Read More
Apple to tap third party for physical security keys
08 Dec 2022Apple is launching a number of new security protections, including the addition of third-party-provided hardware security keys Read More
WikiLeaks reveals Australian police are using surveillance software
15 Sep 2014Australia's New South Wales police are using spyware that has been linked to repressive states, according to leaked documents Read More
Quiz: Defending mobile devices from viruses, spyware and malware
24 Jan 2007A five-question multiple-choice quiz to test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of SearchSecurity.com's Messaging Security School. Read More
MP3 search site pushes spyware, watchdogs say
06 Dec 2006A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org. Read More
Risk & Repeat: Apple bug bounty frustrations boil over
22 Oct 2021Security researchers criticized the Apple Security Bounty program and claimed the company ignored bug reports, denied bounty payments and silently patched vulnerabilities. Read More
Types of cloud malware and how to defend against them
27 Oct 2022Cloud malware isn't going away anytime soon, but organizations have a growing number of tools at their disposal to combat the threat. Read More
How to set up Palo Alto security profiles
22 Mar 2021Learning how to build and implement security profiles and policies can help novice admins make sure they use Palo Alto Networks firewalls effectively to protect their network. Read More
Exclusive Networks and Nuvias expanding security portfolios
19 May 2022Distributors Exclusive Networks and Nuvias sign fresh vendors as they look to cover a greater number of emerging threats Read More
How to ensure iPhone configuration profiles are safe
01 Mar 2023Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Read More