As initially reported on The Intercept, GCHQ (the UK Governments equivalent of the NSA) and the NSA were able to hack Kaspersky Software’s ant-virus software to track users and infiltrate networks. This information comes directly from documents released by Edward Snowden.
The hacked software was then used to monitor email and web traffic to obtain intelligence. The most interesting part of this story from BlackFog’s perspective is the way the software was hacked was to monitor the traffic originating from the end users computer and Kaspersky servers. Most anti-virus tools collect a lot of information on your computer and send it back to their central servers. This information contains uniquely identifiable data that can be used to track exactly who this user is and what they are up to.
Rest assured, this is precisely why BlackFog does not collect information on your computer and send it back to our networks and one of the founding principles we use to keep your computer secure.
For a more detailed report on this privacy breach please refer to the article below.
Click here for the full article as reported on The Intercept.
Related Posts
What Causes Victims to Pay in a Ransomware Attack? The Psychology
Learn the main reasons why victims of a ransomware attack are forced to pay, such as the need to avoid operational disruption or the deceptive methods used by attackers to establish confidence.
BlackFog Announces SOC 2 Type II and TX-RAMP Certifications
BlackFog earns SOC 2 Type II and TX-RAMP certifications, boosting trust in its ADX technology for robust data security and ransomware prevention.
The Hidden Crisis: How Stress is Forcing 1 in 4 Chief Information Security Officers to Quit
A Hidden Crisis A Chief Information Security Officer (CISO) has always had huge responsibility. But with increased cyberthreats and a growing workload, security leaders are under siege. According to research we [...]
Ransomware Detection: Effective Strategies and Tools
What ransomware detection tools and techniques should businesses be using in order to improve their security?
Understanding Double Extortion Ransomware: Prevention and Response
What is double extortion ransomware and what should firms know in order to protect against this threat?
Key Steps for Effective Enterprise Data Protection
How must firms adapt to a challenging enterprise data protection landscape in 2023 and beyond?