I feel that the major difference (by law) between #Google / #Meta services and #Trojans, #Keyloggers, and other #viruses is that, in the 1st case, users click the 'I accept' button, while in the 2nd case, there's no such button. So, it could be the reason why #SurveillanceCapitalism #barons aren't in prisons like developers of Trojans and other viruses. All this stuff is the same not-compliant with #GDPR.

Please, fix me if I am wrong! I need feedback.

#trojan #virus #whatsapp #instagram

Der neue #Cybersecurity Digest ist online! 📲
Die Themenexperten von HiSolutions haben in der August-Ausgabe News aus der Welt der Informationssicherheit für Sie zusammengetragen und bewertet:

👉 Erkenntnisse aus dem #Stackoverflow Developer Survey 2025
👉 Praktische Analyse eines #Keyloggers
👉 Datengarantien von #Microsoft in der EU
👉 Daten-Archäologie im Internet

Jetzt lesen + abonnieren ▶️ https://www.hisolutions.com/detail/digest-august-2025

#ITSicherheit @brahms

Can AI like DeepSeek really create malware and keyloggers? 🤖🔒 Dive into the potential dangers of AI in cybersecurity and how it could impact digital security. #AI #DeepSeek #CyberSecurity #Malware #Keyloggers #TechRisks

https://pupuweb.com/can-ai-like-deepseek-really-create-malware-and-keyloggers/

Can AI Like DeepSeek Really Create Malware and Keyloggers? - PUPUWEB

Is Generative AI a Threat to Cybersecurity? DeepSeek's Vulnerabilities Explained The Growing Concerns Around AI Misuse Cybersecurity experts are

PUPUWEB
#Malware infiltrates #Pidgin messenger’s official #plugin repository
The Pidgin messaging app removed the #ScreenShareOTR plugin from its official third-party plugin list after it was discovered that it was used to install #keyloggers, information stealers, and malware commonly used to gain initial access to corporate networks.
https://www.bleepingcomputer.com/news/security/malware-infiltrates-pidgin-messengers-official-plugin-repository/ #opensource
Malware infiltrates Pidgin messenger’s official plugin repository

The Pidgin messaging app removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered that it was used to install keyloggers, information stealers, and malware commonly used to gain initial access to corporate networks.

BleepingComputer
- YouTube

Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Call me old fashioned but I even like my #keyloggers without #AI.

#microsoft #keylogger

#ACEMAGIC, which also sells as #ACEMAGICIAN, found on #Amazon selling cheap #computers, ships computers with #malware that includes #trojans, #keyloggers, credential theft malware, and so on. The malware is in the restore partition, so doing a restore from that partition does not wipe the malware.

If you bought one of these, buy a legit copy of #Windows and completely format the machine with a fully clean install. Then change all of your passwords.

Otherwise, stay the fuck away from them.

Business-oriented threat involving ‘several types of malware all at once’ remains active
A malware campaign that prompted an FBI alert in April has amounted to more than 10,000 attacks against at least 200 targets worldwide, according to cybersecurity researchers.
The threat involves “several types of malware all at once,”
https://therecord.media/cryptominer-keylogger-backdoor-threat-fbi-alert #malware #attack #business #cryptominers #backdoor #keyloggers
Business-oriented threat involving ‘several types of malware all at once’ remains active

A malware campaign that the U.S. warned about in April is still dumping cryptominers, keyloggers and more on organizations worldwide, Kaspersky said.

How Keyloggers Have Evolved From the Cold War to Today

Keyloggers have been used for espionage since the days of the typewriter, but today's threats are easier to get and use than ever.

Dark Reading
How safe is sharing keyboard mouse between work laptop & my own personal laptop

I'm not at all concerned more about wireless part of security, and I have also read through the risks of wireless MITM which is the least possibility in my scenario. What I need to know is if my work

Information Security Stack Exchange