Antivirus

How smart devices are leaving consumer privacy vulnerable

2018 was a big year for consumer privacy as the Cambridge Analytica and Facebook data privacy hearings helped shed further light on the issue. Added to this was the fact that app location tracking and privacy bugs were found in widely-used apps such as Apple’s FaceTime.Smartphones could arguably be the greatest spying device ever created…


2018 was a big year for consumer privacy as the Cambridge Analytica and Facebook data privacy hearings helped shed further light on the issue. Added to this was the fact that app location tracking and privacy bugs were found in widely-used apps such as Apple’s FaceTime.

Smartphones could arguably be the greatest spying device ever created with a camera, microphone and a location tracker all in one place and carried everywhere a user goes. While nation-states have targeted smartphones for traditional spying, it has also become a lucrative way to collect consumer’s personal information.

TechRadar Prospoke with Symantec’s Director of Product Management for Security Response, Kevin Haley to learn more about the firm’s latest report and how businesses and consumers can better protect their privacy online.

  • Smart homes at greater security risk than ever
  • Six ways to stay safe when buying smart tech
  • Smart home security: 10 hacks to protect your home from hackers

Symantec recently released its latest Internet Security Threat Report (ISTR). Can you give us a little background on the annual report and share some of this year’s findings?

Sure this is a report we’ve been doing for 20 years. It’s our look back at the year and what happened in the threat landscape and it gives us an opportunity to understand what happened and get insight as to what’s going to happen next. 

What are some of the newest targets revealed in the report?

Well we’re seeing a huge focus by attackers on IoT devices. We’re seeing a lot of routers and internet connected cameras being attacked. They’re responsible for about 90 percent of all attacks that we’re seeing. But things that may not register as a huge number are things like industrial control systems, satellite systems and telecoms. Nation state attackers are going after parts of the infrastructure which include things like that and of course that’s a big concern as well.  

Image Credit: Shutterstock

Image Credit: Shutterstock

How has the growth of smart home technology left consumers more open to hackers?

Consumers have a lot more devices connected to the Internet in their homes. Those are more opportunities for somebody to get into their home. And this has been a real issue with IoT devices because these devices generally don’t have very good security on them and often consumers put them on and d

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading
Antivirus

The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
Read More

Continue Reading
Antivirus

Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading