SlideShare a Scribd company logo
1 of 6
Pegasus Scandal……
BY ADITYA KASHYAP
EX- NAVODAYAN
2 TIMES NDA CONFERENCE
OUT
WHAT IS PEGASUS SPYWARE ?
This Photo by Unknown Author is licensed
under CC BY-NC
Pegasus is a spyware which is designed by the NSO group which
is owned by Israel In basically the Pegasus spyware is designed for
the tracking and different type of purposes which we can say
comes under the privacy and the Pegasus operates on both
iOS Pegasus was capable of reading text messages, tracking
calls, collecting passwords, location tracking, accessing the target
device's microphone and camera, and harvesting information from
apps. The spyware is named after the mythical winged
horse Pegasus—it is a Trojan horse that can be sent "flying
through the air" to infect phones.
History of Pegasus
 NSO Group was previously owned by American private equity firm Francisco
partners, but it was bought back by its founders in 2019. The company states that
it provides "authorized governments with technology that helps them combat
terror and crime .“ NSO Group has published sections of contracts which require
customers to use its products only for criminal and national security investigations
and has stated that it has an industry-leading approach to human rights.
PRONS OF PEGASUS
 Good thing about the PEGASUS is that it is weapon to counter the terrorism.
 Able to stop the illegal smuggling through phones and technology.
 Give enormous advantage to government to counter various antinational activities in
between countries.
 Counter dark web.
 To fail premeditated conspiracy.
CONS OF PEGASUS
 If Pegasus is used by militants
 Negative use of this.
 Example facebook approaches the Pegasus
 By our governments
 Recent case of our country.
Thank you

More Related Content

What's hot

Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Mobile Application Penetration Testing
Mobile Application Penetration TestingMobile Application Penetration Testing
Mobile Application Penetration TestingBGA Cyber Security
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10Pawel Rzepa
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
OSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with MaltegoOSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with MaltegoRaghav Bisht
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabBoni Yeamin
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 

What's hot (20)

Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Mobile security
Mobile securityMobile security
Mobile security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Mobile Application Penetration Testing
Mobile Application Penetration TestingMobile Application Penetration Testing
Mobile Application Penetration Testing
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
OSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with MaltegoOSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with Maltego
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Mobile security
Mobile security Mobile security
Mobile security
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 

Recently uploaded

12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdftaxguruedu
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-Indiatheunitedindian7
 

Recently uploaded (8)

12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 
Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-India
 

Pegasus scandal

  • 1. Pegasus Scandal…… BY ADITYA KASHYAP EX- NAVODAYAN 2 TIMES NDA CONFERENCE OUT
  • 2. WHAT IS PEGASUS SPYWARE ? This Photo by Unknown Author is licensed under CC BY-NC Pegasus is a spyware which is designed by the NSO group which is owned by Israel In basically the Pegasus spyware is designed for the tracking and different type of purposes which we can say comes under the privacy and the Pegasus operates on both iOS Pegasus was capable of reading text messages, tracking calls, collecting passwords, location tracking, accessing the target device's microphone and camera, and harvesting information from apps. The spyware is named after the mythical winged horse Pegasus—it is a Trojan horse that can be sent "flying through the air" to infect phones.
  • 3. History of Pegasus  NSO Group was previously owned by American private equity firm Francisco partners, but it was bought back by its founders in 2019. The company states that it provides "authorized governments with technology that helps them combat terror and crime .“ NSO Group has published sections of contracts which require customers to use its products only for criminal and national security investigations and has stated that it has an industry-leading approach to human rights.
  • 4. PRONS OF PEGASUS  Good thing about the PEGASUS is that it is weapon to counter the terrorism.  Able to stop the illegal smuggling through phones and technology.  Give enormous advantage to government to counter various antinational activities in between countries.  Counter dark web.  To fail premeditated conspiracy.
  • 5. CONS OF PEGASUS  If Pegasus is used by militants  Negative use of this.  Example facebook approaches the Pegasus  By our governments  Recent case of our country.