October 10, 2011, 8:07 AM EDT By Cornelius Rahn and Brian Parkin (Updates with government comments in third paragraph.) Oct. 10 (Bloomberg) — The German government is using spying software that violates the country’s constitutional law because it contains functions beyond the interception of Internet-based communication, a hacker organization said….
German ’Trojan’ Spyware May Violate Constitution
Enlarge image German ’Trojan’ Spyware Violates Constitution a11/ZUMA Press/Newscom The malware can be used to control hardware such as microphones and cameras for room surveillance as well as upload falsified evidence to the target hard drive. SECURITY ESSEN 2008 – DIE LEITMESSE F‹R SICHERHEIT: DAS ‹BERWACHUNGSSYSTEM CAM2IP VON GEUTEBR‹CK /…
German government denies use of Trojan horse program to spy on people
BERLIN – Germany’s Interior Ministry says no federal security services were involved in using a Trojan horse program to spy on people through their computers. View full post on federal hacker – Yahoo! News Search Results View full post on National Cyber Security
Chaos Computer Club ‘outs’ German Government’s spyware
Chaos Computer Club ‘outs’ German Government’s spyware By David HeathMonday, 10 October 2011 23:42 Business IT – Security Claiming the usual “it arrived in an anonymous brown paper bag,” the Chaos Computer Club has announced the reverse engineering of what is claimed to be the German authorities’ intercept malware, Quellen-TKÜ….
ANLEITUNG Spirit Jailbreak iPhone iPad iPod 3.1.2, 3.1.3, 3.2 German DEUTSCH HD
Spirit: spiritjb.com Artikel: www.appletrend.de Leider in schlechter Audioqualität wegen eingebautem Mikrofon. HINWEIS: Ich würde immer ein Back-Up machen, bevor ich irgendetwas ausprobiere! View full post on National Cyber Security
Malware Exploit Found for iOS Devices by German Researchers
Germany’s Federal Office for Information Security issued a warning today that iPhones, iPads and the iPod Touch have a “critical weaknesses,” the Associated Press reports. The malware is delivered by an infected PDF that can affect the user’s device without them knowing. The same a result would occur when a…