Are you infected by Pegasus?

Security experts from iVerify have developed an application to detect traces of Pegasus spyware on mobiles .

Pegasus has been available on the market for some time and its best customers are various governments from around the world, who use it to spy on journalists, the opposition or activists.

We've talked about this in the past (no names, no showing). This particular spyware is available for Android and iOS and it is not really known how widespread its use is.

The app launched by iVerify could help better understand the extent of infections.

Η iVerify αποκαλεί την εφαρμογή Mobile Hunting.
It is integrated into the company's iVerify Basic app and other enterprise apps for Android and iOS.
Preliminary scans of 2.500 devices using the they concluded that 2,5 per 1.000 were infected by Pegasus on average.

While 2,5 may not sound like much, when you consider the number of devices out there the results are alarming. For every 1 million devices, 2.500 may be infected by Pegasus. If you take the 310 million mobile devices in circulation in the United States alone, you end up with more than 750.000 infected devices from Pegasus alone.

Please note the app is not free.

To test if your device is infected by Pegasus, it is necessary to create a full device log and share it with the iVerify app.

The log is uploaded and then analyzed by the company. This option is available once every 90 days for iVerify Basic users.

Note: Full error reports contain a lot of information about the device and the software. This includes device logs, system message logs, stack traces, file system folder logs and more.

 

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















giorgos

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).