Category Archives: Definitions

What is Pegasus Spyware? How does it work?

Pegasus is a spyware from the Israeli company NSO Group designed for surveillance. The program breaks into a smartphone on the “zero-click” principle – when no victim’s participation is required.

How does Pegasus work?

Unlike most spyware, this software does not require any action from the user (for example, opening an attached file in a message or providing credentials). The virus penetrates Android, iPhone or BlackBerry phones completely unnoticed by the user and, after installation, is able to access all his data, as well as remotely activate the camera or microphone, geolocation and “read” the contents of encrypted messages, including Telegram or WhatsApp.

Pegasus is able to penetrate a phone through several security holes in it. In particular, according to IT experts , sometimes it is quite enough to open a message in iMessage or SMS: no clicks, phishing, or calls. The program uses a vulnerability in the code to hack. Moreover, this is not always reflected in the device’s memory – after a reboot, the traces of a hacker attack disappear.

“This kind of espionage has dramatic and, in some cases, even fatal consequences for ordinary men and women, themselves targeted as a result of their work to expose politicians’ misconduct or defend the rights of fellow citizens,” Forbidden Stories said in a statement.

Pegasus monitors keystrokes on the infected device – all written communications and searches, even passwords, and transmits them to the client, as well as gives access to the phone’s microphone and camera.

What does the developer say?

Created in 2011 by former military personnel from the Israeli army’s “8200” electronic intelligence unit, the NSO Group claims that it works with intelligence and law enforcement agencies in 60 countries exclusively in the fight against terrorism, and in general, its technology is used every day for eliminating networks of pedophilia and drug trafficking, finding missing and kidnapped children, survivors trapped under destroyed buildings and protecting the airspace from the penetration of dangerous unmanned aerial vehicles. “

In a statement to Forbidden Stories, NSO promises to continue to “investigate and take appropriate action on any credible allegations of abuse.” At the same time, the current scandal is not the first for the company: in 2019, a vulnerability was discovered in WhatsApp, with the help of which NSO monitored users of the messenger.

Who will be responsible for the hacks

Heads of state and government, as well as several members of Arab royal families, were also on the list of possible targets for Pegasus, investigators say. “In the case of Azerbaijan, there are officials of the highest and middle ranks, both deputies and employees of pro-government NGOs,” adds Khadija Ismayilova.

The activities of the NSO Group were condemned by IT giants. “These cyber attacks are very sophisticated, cost millions of dollars to develop, are short-lived and are used to target specific individuals,” said Ivan Krstic, head of security architecture and development at Apple. we continue to work relanlessly to secure all of our customers. “

“Dangerous spyware NSO Group used to commit horrific violations of human rights around the world, and it must be stopped”, – he wrote on Twitter the head messenger WhatsApp Will Cathcart. Can governments and businesses team up to stop hacking attacks on journalists and activists?

“In the legislation of most countries there are legal norms prohibiting the use of such programs,” Vladimir Ozherelyev, an expert of the Russian human rights project “Roskomsvoboda”, explains to Present Time. the purpose, which will not allow to bring the developers of Pegasus to responsibility. Nevertheless, persons who knowingly misuse the program, including the use of official position, may be held liable. ” The expert does not exclude that in some cases, victims of cyberattacks can seek compensation in national and international courts.

Who used the Pegasus

Spyware was used by security officials from different countries to fight terrorism.
Hungary, Azerbaijan, Kazakhstan, India, Israel, Bahrain, Mexico, Morocco, Rwanda, Saudi Arabia,UAE.

Who was being followed with Pegasus

Pegasus was used to hack the phones of independent journalists, activists, human rights defenders, the military and politicians, including ministers, heads of government, diplomats, and oppositionists.

In Hungary, the smartphones of two employees of the investigative publication Direkt36 were hacked.

In Azerbaijan, with the help of Pegasus, they followed 48 journalists who criticized corruption in the country.

They also hacked journalists from major publications with a worldwide reputation: CNN, Associated Press, New York Times, Wall Street Journal, Bloomberg, Financial Times and others.

What is VPN, why we need it?


A Virtual Private Network (VPN) is a protected encrypted connection that enables the user to connect to the network. This allows internet users to bypass local restrictions and preserve confidentiality. Virtual networks are not affected by the number of communication channels they use. The virtual user does not own the physical network, which is a collection of computers and devices connected via common communication channels.


Private networks are limited in that only some people can obtain them. VPNs are used to identify all participants and any information they transmit. Encryption protects the data from third parties. VPN is responsible for keeping the data confidential. It blocks unauthorized users from accessing the network, inspects the traffic source, and ensures that no data leaks out of the network.


All you have to do to connect to a VPN is to install the appropriate vpn software on personal computer or mobile app and activate it. Without VPN, Each user is assigned an IP address when he logs in to the network. This allows third parties to spy on him, such as seeing what websites he visits, what information he searches through search engines, and what he purchases. The VPN activates, and the original IP address disappears. Instead, the virtual private networks address is displayed.


Why do we need a VPN to protect our privacy?


Only the encryption key can make the transmitted data available. Access to sensitive corporate data may be required for remote work. Use an encrypted data connection to reduce the risk of them being leaked.
The VPN server does not store geolocation data. It is possible for him to be in another country, and the location may not be determined. The service might not keep a log of user activities. Because it doesn’t exist, nobody will have access to his past actions. You may not be able to view content that is intended for you when you travel abroad.

You can bypass local restrictions by choosing a foreign VPN. This will allow you to access blocked websites on your country’s territory. You can keep your anonymity. The VPN service is activated, and the internet connection is encrypted. User data will not be visible to third parties. Instead, they will be sent a set of unusable characters that cannot be translated by anyone without encryption keys.


Uses of VPN

These characters are only accessible to the network participants who have access to the devices from which data is transmitted. Many companies recommend that employees use VPNs to protect themselves from hackers. Cyberattacks are increasing in number around the globe. Therefore, there is a growing demand to connect to a virtual private network.

What is IoT and How Does it Work?

What is IoT?

The Internet of Things (IoT) is nothing but an electronic virtual interconnection network between devices, people, and also the Internet itself, which permits the exchange of data between these, allowing vital information regarding the usage and performance of both device and items to be recorded to get location routines, create tips, improve efficiency, and also make improved user experiences.

The Internet of things intends to alter people’s lives, making their routines more easy and far better. The Internet of Things (IoT) is a concept that refers to the interconnection of everyday objects to the internet, allowing them to send and receive data. It works by equipping these objects with sensors, actuators, and connectivity, enabling them to collect and exchange information. This data can then be analysed and used to automate processes, improve efficiency, and enhance decision-making.

With the communicating between objects and equipment, it’ll soon be possible to expect situations or requirements. By way of instance, throughout the quantity of information recorded, practitioners should have the ability to find methods to revert environmental troubles, cure acute illnesses, and a whole lot more.

Yet another essential result is a modest contradictory: with all the items around us being a portion of our own lives, facilitating our everyday lives, folks are going to have the ability to focus more about real relations, making more use in this period and achieving a high standard of living.

Thus do not think that IoT, artificial intelligence, or alternative brand new era notions will lead to a human connection between people. On the other, the further tech a part of our own lives, the longer we shall save our older worth.

The Way the Internet of Things functions

The Internet of Things copes with items attached throughout the Internet, exchanging information to build many activities. For that Internet of Things to work, three factors will need to be combined: apparatus, both the system, and also a controller system.

The device such as your Internet of Things is all: All of the things we utilize every day such as bulbs, clocks, coffee makers, toaster and microwave ovens, automobiles, Mobile Phones, washing machines, and detectors.

The management system on your Internet of Things would be Process All of the information that moves through the system which links the device to restrain every facet and also make new relations definite way to reevaluate the Way the Internet of things along with even the interconnection of everyday things works is your Fridge in your home will relate to the Internet and also through an Email that it will inform you:

If It’s not clear exactly what the Internet of things would be what exactly the items involved are, then we list below a few cases Which Are a fact in the routine of many individuals and businesses:

Hospitals could have devices associated with patients, sending real-time data like a heartbeat, blood pressure, and oxygenation.

Agriculture may utilize detectors to assess the humidity and temperature of their property or accounts for the chances of rain, helping manufacturers restrain plants.

Factories may utilize IoT to assess the efficacy of gear and counsel managers concerning the necessity for maintenance or purchase of all equipment and expanding this manufacturing facility.

Stores and supermarkets may depend on intelligent shelves that information once the minimum stock of a certain product is being contacted and information regarding services and products without output or close to market, helping to take activities like repositioning, promotions, and others.

Intelligent radios and interior planning may utilize the IoT to bring automation into the houses, together with decorative recognition detectors for opening lights or curtains, lighting, and appliances triggered by voice controllers or drapes.

Autonomous vehicles are already being analyzed and found in a few portions of the earth, using artificial intelligence and joined devices to guarantee freedom, comfort, and protection to passengers.

What exactly is ITAD

It’s a good bet that technology plays a significant role in your place of business, no matter what industry you’re in. You can’t stay on top of your field without the correct computing tools, whether you manage an agro-business or a hedge fund. But what happens when your computers reach the end of their useful lives and must be retired? What are the safest ways to dispose of end-of-life equipment?



Because you don’t want unscrupulous actors to steal information from your old equipment, this creates a slew of data security concerns. It also poses environmental concerns, as you want to ensure that your outdated laptops aren’t causing harm to ecosystems or water supplies. IT asset disposal (ITAD) is a solution to this problem. So, what exactly is ITAD? It’s the process of safely discarding obsolete IT hardware and equipment. A good ITAD company will safely cleanse and dispose of your old devices. ITAD firms can also determine whether components of your unused equipment can be repurposed or resold.

Continue reading to find out more about how ITAD works and why it’s such a vital field in today’s society.  We’ll also discuss how to spot a reputable ITAD firm and what these services can achieve for your company.

What is the significance of ITAD?

As a company grows, more computers and network equipment are required. Some of this equipment will reach the end of its useful life cycle, while others will need to be improved or replaced before that time comes. Dealing with IT asset disposal has become an increasingly critical issue due to the increasing sophistication of equipment and the frequent cycling through of that technology.


ITAD has also become more sophisticated as a result of data security and environmental considerations. The days of just shredding computer gear and tossing it into the rubbish heap are long gone. Computing equipment must now be disposed of properly to prevent heavy metals, chemicals, and other dangerous elements from entering our soil and water.

Similarly, data privacy requirements have altered how businesses, organizations, and governments dispose of obsolete equipment.

A professional ITAD services provider can assist your company tackles these problems while also helping you save money in your IT budget. Your ITAD service provider should be able to recycle or refurbish the majority of your old equipment, and possibly even resell the devices that still have some life remaining in them. This means you’ll be able to put more money back into your budget, making it easier to keep your IT infrastructure up to date.

Data Center Expansion and IT Expansion


It’s probably not surprising to find that IT sales are increasing in almost every category. This is a result of the increasingly data-driven and connected society in which we all live and work. According to industry observers, the surge in IT spending is expected to continue in the future.

Global spending on all types of devices is anticipated to exceed $705 billion in 2021, according to Statista. This is an increase of 8% over 2020. In 2021, total IT investment is expected to reach $3.92 trillion, up 6.2 percent from 2020. ‌

The increase in investment is most noticeable in the data center. According to Statista, data center system expenditures are expected to reach $228 billion in 2021, a 6.2 percent raise over the previous year.

None of this comes as a surprise. Data has never been more important in business than it is now. Data-driven techniques like artificial intelligence and machine learning are being discovered by a growing number of industries as a way to revolutionize the way they do business. This inevitably leads to increased IT spending, especially as businesses try to keep up with the competition.


So, what does it all mean? To be successful today, your company must have a strategy in place for managing its physical assets. This plan will need to account for the entire life cycle of your IT assets, from procurement to disposal, in order to be genuinely effective. In an ideal world, that strategy would also include cost-cutting initiatives.

Data Security’s Price Tag

Businesses lose millions of dollars each year as a result of data breaches. According to the Ponemon Institute, the average data breach costs $3.86 million and can last up to 200 days, resulting in significant economic and productivity loss. Customer trust can be eroded by data breaches, which can put even the most successful businesses into a downward spiral from which it is impossible to recover.

According to popular belief, hackers are thought to target only government entities and large enterprises.  Contrary to popular belief, this is not the case. Small and midsize businesses are frequently targeted by hackers because they know that many small organizations make shortcuts when it comes to security.

Many small firms operate on a shoestring budget, so they don’t invest in network security, employee training, or properly disposing of unwanted IT assets.

Of course, data breaches aren’t merely a financial problem. International, national, and municipal rules can all impose severe penalties on anyone who fails to secure personal information. These regulations, such as the General Data Protection Regulation (GDPR), affect not only enterprises in the regulated regions, but also anyone who conducts business with them. If you fail to comply with data privacy standards, you could face harsh consequences.

Data Security and ITAD


Your old gear still has data on it, and it’s extremely probable that it contains sensitive information about your staff and customers. If you dispose of obsolete equipment without first erasing the data on it, you risk exposing personal information to hackers or identity thieves.

Fortunately, ITAD companies follow best practices for rigorous data sanitization, ensuring that none of your personal information is exposed. As a result, your customers can have faith in your abilities to protect their personal information. Of course, this implies that your company will be safe from anyone who might try to steal data from your old devices, and you will not be accountable for any penalties incurred as a result of a data breach.

IT asset recovery is a related service provided by ITAD experts. IT asset recovery can help you get the most value out of your retired or obsolete computing hardware while ensuring that no data is lost.

Endpoint Devices and ITAD


When you think of data security, you probably think of a data center, but staff cell phones and other devices are also at risk of data breaches at the point of disposal. As “Bring Your Own Device” (BYOD) grows more widespread, businesses will need to be more watchful in this area.

ITAD providers may recycle almost any type of obsolete hardware, including cell phones, tablets, and laptops. They may also assist your organization in developing a long-term strategy for disposing of and tracking all of the equipment used to run your business. A data sanitization policy should be part of that plan. It should also include a method for determining whether or not a device can be reused and when it should be discarded. ‌

Recycling and Reusing


A good ITAD services provider can assist you in developing a strategy for greater sustainability. This necessitates a thorough examination of the possibilities for repurposing any device within your organization. It also entails looking at secondary and tertiary markets for data center equipment that could be repurposed (after being sanitized of data, of course).

There’s also a growing trend toward repairing and repurposing equipment whenever possible, which feeds into the sustainable hardware movement and a goal of zero waste. In the end, this is a win-win situation because it saves money for businesses while also lowering the stress on global resources.

An ITAD service provider should be dedicated to being a responsible steward of your — and the world’s — resources.

The best use of Code Obfuscation

Developers didn’t have to worry about networks in the early days of computing. They could just concentrate on making sure their program did what it was supposed to do and didn’t crash too frequently.

And the average person who came into contact with the software posed little danger. Most consumers wouldn’t bother reading the user manuals that came with the software, much less analyzing the code for flaws.

Then came the internet, which completely transformed everything.

Computer networks become interconnected almost instantaneously. And as the networks expanded in complexity, so did the chances that someone who didn’t belong there would find their way in.

And, more often than not, such persons would have the abilities to take advantage of flaws in the code.

That brings us to the present day. It’s a moment when cyber-threats are at an all-time high. And reports of cyber-attacks appear to arrive on a daily basis.

As a result, network administrators are increasingly deploying advanced defensive mechanisms to protect their networks from intrusions. They now expect software developers to go above and beyond to protect their code from illegal access.

Despite this, coding schools still do not emphasize the hardening of computer code. However, it is quickly becoming a must in modern application development.

To aid with that, I’ll explain what code obfuscation is in this essay. I’ll also offer you an overview of the six most important code obfuscation techniques in use today to get you started on the road to better secure software development.

What is the definition of code obfuscation?


Code obfuscation is a term that refers to a set of programming techniques that are used to hide parts of a program’s code. It’s the most effective approach for programmers to protect their work from unauthorized access or modification by hackers or intellectual property thieves.

Finally, code obfuscation techniques may change the structure and methods by which a program operates, but they never change the program’s output.

The problem is that many code obfuscation techniques add to the overhead of a program and lengthen its execution time.

As a result, knowing which strategies are mostly penalty-free and which can cause performance concerns is crucial. It’s possible to balance protection with performance in a real-world application if you know the costs.

The six most often used code obfuscation techniques are listed below.

1. Get Rid of Extraneous Information
The first code hardening strategy that should be used in every circumstance is to remove everything unnecessary from your code.

This will simplify your codebase and decrease the attack surface you must protect.

This entails getting rid of unnecessary functions, debugging data, and as much metadata as feasible. In other words, everything that could provide an attacker with a road map to a vulnerability.

2. Change the Data
The next step is to alter the data that your code processes in such a way that it is no longer recognizable.

Replace values with expressions, change the format of the data storage you employ, or even employ binary versions of your code’s numbers all add to the complexity. And that complexity will make it tough for someone attempting to reverse-engineer your code to extract anything meaningful.

String encryption, for example, can be used to make plain text strings in your code unreadable. Simple base64 encoding can be used to encrypt strings, resulting in the following code:

String s = “Hello World”;

Into:

String s = new String(decryptString(“SGVsbG8gV29ybGQ=”));

Although an experienced programmer can easily figure out what’s going on here, dealing with several strings is time-consuming and annoying.

Data transformations are an excellent initial line of defense when paired with other code obfuscation techniques.

3. Use Order Obfuscation in the Process
One of the most difficult aspects of obfuscating code is ensuring that it continues to function as intended once you’ve finished.

However, there’s no rule that says you have to run your code in a specific order. You can still get the proper result if you change the order of operations in your code, but it will be much more difficult for a third party to comprehend what your code is doing.

The only caveat is that you must be careful not to build too many useless loops and dead ends, as this will slow down the execution speed of your code.

Take a look at the following code, which calculates the total and average of 100 values as an example:

int i=1, sum=0, avg=0

while (i = 100)

{

sum+=i;

avg=sum/i;

i++;

}int i=1, sum=0, avg=0

while (i = 100)

{

sum+=i;

avg=sum/i;

i++;

}

It’s easy to hide what the code is doing by using a conditional variable. This is because analyzing the function would necessitate knowing what is being fed into it in the first place.

The conditional variable ‘random’ in the following snippet provides a more complex code structure that is significantly more difficult to decipher:

int random = 1;

while (random != 0)

{

switch (random)

{

Case 1:

{

i=0; sum=1; avg=1;

random = 2;

break;

}

case 2:

{

if (i = 100)

random = 3;

else random = 0;

break;

}

case 3:

{

sum+=i;avg=sum/i ; i++;

random = 2;

break;

}

}

}

4. Experiment with Debug Obfuscation
Examining your code’s debug information can sometimes reveal a wealth of information about your code to a determined attacker.

In other situations, they may discover the keys to deciphering some of your other obfuscation measures.

As a result, it’s a good idea to limit access to debugging information whenever possible. When that isn’t an option, it’s critical to hide any identifiable information in the debugging report.

5. Make use of address randomized addresses
Memory handling mistakes have been the most common software vulnerabilities exploited by hackers for nearly three decades, despite the fact that every coder is aware of the problem.

It isn’t simply among newbies who have this problem. Memory problems account for over 70% of the vulnerabilities in Google’s Chrome web browser.

The truth is that preventing all memory programming problems is nearly difficult, especially when utilizing languages like C and C++. However, you can aid by including certain memory randomization features in your code.

If your code and data’s virtual addresses are provided random values during execution, finding and exploiting any unpatched vulnerabilities becomes far more difficult.

It also has another advantage. It makes it difficult, if not impossible, to duplicate even a successful hack of your code. That alone reduces the chances of an attacker wasting their time attempting to compromise your software.

6. Rotate the code that has been obfuscated.
As effective as the measures listed above are at frustrating attackers, they are far from flawless. Even if you have adequate time and abilities, you will be able to defeat them. However, this brings us to one of the most important obfuscation tactics.

Because all obfuscation strategies seek to make an attacker’s task more complicated, anything you can do to send them back to square one is a great defensive strategy. So, to keep your code safe, take advantage of the internet.

You can send out frequent updates that change the nature and specificity of your obfuscation strategies. Every time you do, all of the time and effort someone may have put into cracking your software is wasted.

It won’t be worth it for anyone to try to keep up an analysis long enough to succeed if you swap your obfuscation strategies frequently enough.

Obscurity as a kind of security
The bottom issue here is that ‘unhackable’ code does not exist. There will always be a vulnerability somewhere, no matter how hard a coder tries. But that’s not to say you shouldn’t keep trying.

However, in the real world, your code does not need to be flawless. It simply has to be difficult enough to crack that no one in their right mind would even attempt it. And for those who aren’t rational, it just has to be complicated and time-consuming enough to keep them away.

That’s exactly what the six strategies listed above can help you with. But keep in mind that no defense is free. When adopting these choices, make sure to balance the potential execution time penalties with the benefits they give.

Throwing every potential curveball might be worth it if you’re working on something very sensitive. If you’re writing a quote of the day generator, though, you may not need to be as concerned.

But, regardless of how you go about it, don’t forget to harden your code in some way. In a world where cybersecurity risks lurk around every turn, it’s the only way to go.