
Meta wins $167 million in damages from NSO group over Pegasus spyware
Meta first sued NSO Group in 2019, alleging that the Israeli firm used its Pegasus spyware to target over 1,400 individuals across 20 countries—including journalists, human rights activists, and political dissidents. According to Meta, the malware was delivered through WhatsApp video calls, even if those calls went unanswered.
A US judge previously found that NSO had violated the Computer Fraud and Abuse Act, setting the stage for the jury trial to determine financial damages. On Tuesday, the jury awarded $444,719 in compensatory damages and $167,254,000 in punitive damages to Meta. Meta calls ruling a 'critical deterrent'
Carl Woog, WhatsApp's VP of Global Communications, welcomed the verdict, calling it 'a critical deterrent to this malicious industry against their illegal acts aimed at American companies and the privacy and security of the people we serve.'
Meta has also said it plans to seek a court injunction to prevent NSO from targeting WhatsApp in the future and hopes to donate the awarded funds to digital rights organisations. NSO pledges to appeal
NSO Group, which describes itself as a 'cyber intelligence' company, maintained in court that Pegasus cannot be used on US phone numbers and claimed WhatsApp had suffered no actual harm.
Gil Lainer, a spokesperson for NSO, criticised the verdict, calling it 'another step in a lengthy judicial process.' He said the firm would explore 'further proceedings' or an appeal, adding: 'We firmly believe our technology plays a critical role in preventing serious crime and terrorism… this perspective was excluded from the jury's consideration.'
Despite the ruling, Meta acknowledged that recovering the damages may be a lengthy process.
Mobile finder: CMF Phone 2 Pro goes on sale in India
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


News18
31 minutes ago
- News18
Israeli Woman Plotted to Kill Netanyahu with RPG, Netanyahu Recalls Gaza Ceasefire Negotiators
Israeli Woman Plotted to Kill Netanyahu with RPG, Netanyahu Recalls Gaza Ceasefire Negotiators A 73-year-old Israeli woman has been charged with plotting to assassinate PM Benjamin Netanyahu with a rocket launcher, prosecutors said on July 24. According to the indictment, the terminally ill woman decided to kill Netanyahu after she learned of her diagnosis. She consequently decided to "sacrifice" her life in order to "save" the State of Israel from the current government, the prosecutor quoted her saying. She reportedly shared her plan with another activist and asked him to help her purchase a rocket-propelled grenade to carry out the woman's identity has not been released but the indictment papers described her an anti-government activist from Tel Aviv. Meanwhile, Israel is bringing the hostage negotiating team back from Qatar to 'continue consultations in Israel,' Israeli Prime Minister's office said on July 24. Earlier, Hamas said that it submitted its response to a Gaza ceasefire proposal, Anadolu reports. n18oc_world n18oc_crux0:00 INTRODUCTION2:28 ISRAELI OPPOSITION SLAMS 'GAZA WIPE OUT' REMARKS4:44 NETANAYHU RECALLS ISRAELI NEGOTIATORS BACK TO TEL AVIV


Time of India
38 minutes ago
- Time of India
WhatsApp Down: Millions of users unable to send messages or post status updates
WhatsApp suffered a widespread outage , leaving users unable to send messages or upload status updates. The sudden disruption sparked confusion globally, with many turning to other platforms for answers. While services gradually resumed, the issue highlighted just how reliant millions are on WhatsApp for daily communication and real-time connectivity, as per a report by News 18. Explore courses from Top Institutes in Please select course: Select a Course Category Artificial Intelligence MBA Cybersecurity others Management Product Management CXO Data Science Leadership PGDM Data Science Digital Marketing Healthcare Technology Public Policy healthcare Operations Management Degree Others Finance Project Management Data Analytics MCA Design Thinking Skills you'll gain: Duration: 7 Months S P Jain Institute of Management and Research CERT-SPJIMR Exec Cert Prog in AI for Biz India Starts on undefined Get Details Even though the disruption was only temporary, it caused a lot of buzz on social media as people tried to figure out what was going on. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like 20 Pieces of Clothing Older Women should Avoid Learn More Undo There are 1481 reports of WhatsApp outage on Downdetector as of 1:54 pm ET. FAQs What happened to WhatsApp today? Live Events Users experienced a sudden outage, unable to send messages or update statuses. Is WhatsApp working again now? For most users, services are back to normal, though some still report minor issues.


Time of India
3 hours ago
- Time of India
Two men arrested for duping man of 11 lakh in cyber fraud
New Delhi: Two men were arrested in connection with a cyber fraud case involving a theft of nearly Rs 11 lakh after posing as bank officials. The accused, identified as Shankar Dan (27) and Pradeep Kumar Dan (26), both residents of Dhanbad in Jharkhand, sent a APK — an Android Package file that installs an app on phones — to dupe the target. The complainant alleged that he received a phone call from an unknown number on June 30. The caller, introducing himself as a bank official, informed the complainant about bounced cheques. Under the pretext of verifying cheque images, the fraudster sent a malicious link to the complainant's WhatsApp. Upon opening the link and installing the attached APK file, the complainant did not find any cheque images as claimed. On suspecting fraud, he immediately disconnected the call, deleted the link and switched off his phone. However, after restarting the device, the complainant began receiving multiple SMS alerts regarding password changes and unauthorised financial transactions. "He lost Rs 10.6 lakh and a case was registered," police said. You Can Also Check: Delhi AQI | Weather in Delhi | Bank Holidays in Delhi | Public Holidays in Delhi DCP (southwest) Amit Goel said raids were conducted in various districts of Dhanbad, leading to Shankar's arrest. Pradeep was arrested from Tarapith in West Bengal. Shankar, who was the primary caller, randomly entered mobile numbers into an online payment app to reveal the bank associated with each number. Using this information, he contacted victims by impersonating a bank representative or manager. TNN