article thumbnail

Weekly Update 441

Troy Hunt

Processing data breaches (especially big ones), can be extremely laborious. And so it was with the latest stealer logs, a corpus of data that took the better part of a month to process. And, of course, everyone commenting on them is an expert, so there's a heap of opinions out there.

Spyware 210
article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. In September 2014, U.S. In September 2014, U.S.

Spyware 229
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 409

Troy Hunt

This week, the issue that really has me worked up is data breach victim notification or more specifically, lack thereof. Most, but not all; the corporate victims (and yes, companies who suffer data breaches are still victims themselves), rarely set individual victim notification as a priority.

article thumbnail

Security Affairs newsletter Round 501 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

warn of PRC-linked cyber espionage targeting telecom networks U.S. Hackers stole millions of dollars from Uganda Central Bank International Press Newsletter Cybercrime INTERPOL financial crime operation makes record 5,500 arrests, seizures worth over USD 400 million Hackers Stole $1.49

article thumbnail

Roku experiences another data breach; Apple notifies users about mercenary spyware attacks

Security Boulevard

It’s rare to see a data breach study observers call a “mixed bag.” The post Roku experiences another data breach; Apple notifies users about mercenary spyware attacks appeared first on Security Boulevard.

article thumbnail

DevilsTongue Spyware Targets Windows Zero-Day Vulnerabilities

Heimadal Security

A new report by Microsoft and Citizen Lab has tracked DevilsTongue spyware, a threat that targets zero-day vulnerabilities in Windows systems. Threat actors seem to belong to an Israeli-based spyware company by its name Candiru or Sourgum. What Is a Spyware?

Spyware 119
article thumbnail

Pegasus Project – how governments use Pegasus spyware against journalists

Security Affairs

Pegasus Project investigation into the leak of 50,000 phone numbers of potential surveillance targets revealed the abuse of NSO Group’s spyware. Pegasus Project is the name of a large-scale investigation into the leak of 50,000 phone numbers of potential surveillance targets that revealed the abuse of NSO Group’s spyware.

Spyware 131