Remove Data collection Remove Internet Remove Spyware
article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 228
article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Today is the 20th Safer Internet Day. 2004 was a key year for several safety activities, encompassing both Safer Internet Day and the Safer Internet Forum. Was the general state of the Internet at the time so bad that all of these events sprang up almost out of necessity? You may be asking, why 2004?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Anti-Malware Software for Mac 2025

eSecurity Planet

Unlike traditional antivirus programs, which primarily focus on viruses, anti-malware solutions address a wider array of threats, including spyware, adware, ransomware, and trojans. Visit Intego Mac Internet Security 3. While effective, some users have privacy concerns about Avast’s data collection on user behavior.

article thumbnail

Web tracking report: who monitored users’ online activities in 2023–2024 the most

SecureList

Incognito mode only ensures that all your data like browsing history and cookies is cleared after you close the private window. It also does not make you anonymous to your internet service provider (ISP) or protect you from adware or spyware that might be tracking your online behavior, cryptominers, or worse.

article thumbnail

Spam and phishing in 2022

SecureList

In a typical internet hoax manner, crypto scam sites offered visitors to get rich quick by paying a small fee. In reality, the scheme worked the way any other internet hoax would: the self-professed altruists went off the radar once they received the deposit.

Phishing 118
article thumbnail

APT trends report Q2 2023

SecureList

Following this, we released the first of a series of additional reports describing the final payload in the infection chain: a highly sophisticated spyware implant that we dubbed “TriangleDB” Operating in memory, this implant periodically communicates with the C2 (command and control) infrastructure to receive commands.

Malware 98
article thumbnail

TheTruthSpy stalkerware, still insecure, still leaking data

Malwarebytes

In 2022, we published an article about how photographs of children taken by a stalkerware-type app were found exposed on the internet because of poor cybersecurity practices by the app vendor. The stalkerware-type app involved, TheTruthSpy, has shown once again that the way in which it handles captured data shows no respect to its customers.

Spyware 141