US firm says phone app spies on Hong Kong protesters | Inquirer Technology

US firm says phone app spies on Hong Kong protesters

/ 01:14 PM October 02, 2014
Hong-Kong-Democracy-Protest1

Riot police fire tear gas on student protesters occupying streets surrounding the government headquarters in Hong Kong, early Monday, Sept. 29, 2014. AP FILE PHOTO

HONG KONG — A US security firm says the Chinese government might be using a smartphone app to spy on pro-democracy protesters in Hong Kong.

The firm, Lacoon Mobile Security, says activists have received a link to the application that says it was created by a protest group. The firm said once downloaded, the software gives an outsider access to the phone’s address book, call logs and other information.

ADVERTISEMENT

Lacoon said the technical details of the application “lead us to believe that the Chinese government are behind the attack.”

China is, along with the United States and Russia, regarded as a leader in cyber warfare research. Security firms say they have traced an array of hacking efforts aimed at foreign governments and companies to computers in China.

FEATURED STORIES

RELATED STORIES

PH militants stage own ‘Umbrella Protest’

In New York, demonstrators back Hong Kong protesters

The latest tech news delivered to your inbox


TOPICS: Democracy, Hong Kong, Lacoon Mobile Security, protests, security, technology, US
Read Next
Don't miss out on the latest news and information.

Subscribe to INQUIRER PLUS to get access to The Philippine Daily Inquirer & other 70+ titles, share up to 5 gadgets, listen to the news, download as early as 4am & share articles on social media. Call 896 6000.

For feedback, complaints, or inquiries, contact us.

Subscribe to our technology news

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.



© Copyright 1997-2022 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.