Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more There’s a good chance you were affected by the Equifax hack of 143 million nam...read more Facebook has the ability to spy on users in their homes and offices because of...read more

One Of Most Popular Mac Apps Acts Like Spyware

APPLE PRIDES ITSELF on prioritizing user security and privacy. It counts the iOS and Mac App Stores, where customers can download an array of trusted, vetted software, as cornerstones of that initiative. But while the approach does minimize situations where ...

Spyware demo shows how spooks hack mobile phones

Intelligence agencies’ secretive techniques for spying on mobile phones are seldom made public. But a UK security firm has shown the BBC how one tool, sold around the world to spooks, actually works. It allows spies to take secret pictures with a phone&#...

Researchers uncover latest version of Chinese spyware used to target dissidents

Security researchers believe a newly discovered variant of mobile malware, dubbed xRAT, represents t...

Targeted spyware Apps for Android eradicated by Google

Google’s Android Security has found and blocked a series of targeted spyware apps, part of the Lip...