Curated from: unboxingspace21.blogspot.com
Ideas, facts & insights covering these topics:
12 ideas
·1.95K reads
14
Explore the World's Best Ideas
Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.
The Pegasus spyware, developed by Israeli software company NSO Group, has targeted globally more than 50,000 phone numbers, including 300 in India, for surveillance
14
447 reads
The Pegasus Project, an investigation by an international media consortium, has revealed that more than 50,000 phone numbers were targeted by spyware created by NSO Group, an Israeli software company. On the list were 300 verified phone numbers in India, including those of ministers, opposition leaders, a sitting judge, more than 40 journalists, and several activists and business persons. But what is Pegasus, who is it for, how does it infect devices, and what can it do?
13
148 reads
Spyware is any malicious software designed to enter your computer device, gather your data, and forward it to a third party without your consent.
Pegasus, developed by NSO Group, is perhaps the most powerful spyware ever created. It is designed to infiltrate smartphones — Android and iOS — and turn them into surveillance devices.
The Israeli company, however, markets it as a tool to track criminals and terrorists — for targeted spying and not mass surveillance. NSO Group sells the software to governments only.
12
127 reads
A single license, which can be used to infect several smartphones, can cost up to Rs 70 lakh. According to a 2016 price list, NSO Group charged its customers $650,000 to infiltrate 10 devices, plus an installation fee of $500,000.
11
213 reads
Pegasus exploits undiscovered vulnerabilities, or bugs, in Android and iOS. This means a phone could be infected even if it has the latest security patch installed.
A previous version of the spyware — from 2016 — infected smartphones using a technique called “spear-fishing”: text messages or emails containing a malicious link were sent to the target. It depended on the target clicking the link—a requirement that was done away with in subsequent versions.
11
126 reads
By 2019, Pegasus could infiltrate a device with a missed call on WhatsApp and could even delete the record of this missed call, making it impossible for the user to know they had been targeted. In May that year, WhatsApp said Pegasus had exploited a bug in its code to infect more than 1,400 Android phones and iPhones this way, including those of government officials, journalists, and human rights activists. It soon fixed the bug.
11
119 reads
Pegasus also exploits bugs in iMessage, giving it backdoor access to millions of iPhones. The spyware can also be installed over a wireless transceiver (radio transmitter and receiver) located near a target.
12
131 reads
Once installed on a phone, Pegasus can intercept and steal more or less any information on it, including SMSes, contacts, call history, calendars, emails, and browsing histories. It can use your phone’s microphone to record calls and other conversations, secretly film you with its camera, or track you with GPS.
11
117 reads
Researchers at Canadian cybersecurity organization The Citizen Lab first encountered Pegasus on a smartphone of human rights activist Ahmed Mansoor.
11
130 reads
The Citizen Lab published a report that identified 45 countries in which Pegasus was being used. As with the latest revelations, the list included India.
11
114 reads
WhatsApp revealed that journalists and human rights activists in India had been targets of surveillance by operators using Pegasus.
12
119 reads
The Pegasus Project, an international investigative journalism effort, revealed that various governments used the software to spy on government officials, opposition politicians, journalists, activists, and many others. It said the Indian government used it to spy on around 300 people between 2017 & 2019.
11
164 reads
IDEAS CURATED BY
Hi, Readers we are Unboxing Space here we do all kind of Tech videos, Unboxing, Review, Tips & Tricks, Information & so many interesting things. To watch our videos you can SUBSCRIBE to our channel & Blog so you don’t Miss any informative thing. by IGDM
Learn more about technologyandthefuture with this collection
How to build trust in a virtual environment
How to manage remote teams effectively
How to assess candidates remotely
Related collections
Similar ideas
15 ideas
Zero-day vulnerability: What it is, and how it works
unboxingspace21.blogspot.com
11 ideas
Here’s how to check if your phone is Hacked or Not
unboxingspace21.blogspot.com
5 ideas
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates