Answer - D
Explanation - The Facebook's subsidiary company-WhatsApp, filed a lawsuit in the United States California's Northern District Federal Court against Israel-based cyber-arms firm- the NSO Group, for infecting 'specific' group of WhatsApp users worldwide, mainly belong to civil societies, through their spyware program-Pegasus (also known as Trident). The phenomenon of 'Pegasus' origin is from the Greek mythology where an immortal, winged horse with an ability to fly, had an arsenal of supernatural powers - a free passage from the mortal to the immortal realm. Equipped with powerful coding, the NSO group's Pegasus program can survive OS (Operating System) reboot, factory resets, and OS upgrades. Other than Android and iOS, it can breach into the Symbian and Blackberry OS devices. It can infiltrate the smartphones, irrespective of the OS, in incognito mode and majorly work on three aspects:
- collection of the historical data on the device,
- continuous monitoring of the activities or actions, and
- transmission of the data to third-party anonymously.
Answer - D
Explanation - The Facebook's subsidiary company-WhatsApp, filed a lawsuit in the United States California's Northern District Federal Court against Israel-based cyber-arms firm- the NSO Group, for infecting 'specific' group of WhatsApp users worldwide, mainly belong to civil societies, through their spyware program-Pegasus (also known as Trident). The phenomenon of 'Pegasus' origin is from the Greek mythology where an immortal, winged horse with an ability to fly, had an arsenal of supernatural powers - a free passage from the mortal to the immortal realm. Equipped with powerful coding, the NSO group's Pegasus program can survive OS (Operating System) reboot, factory resets, and OS upgrades. Other than Android and iOS, it can breach into the Symbian and Blackberry OS devices. It can infiltrate the smartphones, irrespective of the OS, in incognito mode and majorly work on three aspects:
- collection of the historical data on the device,
- continuous monitoring of the activities or actions, and
- transmission of the data to third-party anonymously.