Remove Data collection Remove Mobile Remove Technology
article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 229
article thumbnail

All enterprises are at risk of mobile attacks says Check Point Software Technologies

CyberSecurity Insiders

Checkpoint Software Technologies released a mobile security report of 2021 that states that almost all enterprises operating in the world are at the risk of facing mobile attacks. It gives an insight on how organizations can defend themselves against such attacks by following a basic mobile cyber hygiene.

Mobile 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.

article thumbnail

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

The Last Watchdog

As digital technologies become more immersive and tightly integrated with our daily lives, so too do the corresponding intrusive attacks on user privacy. To test the true extent of data collection in VR, we designed a simple 30-person user study called MetaData. Related: The case for regulating facial recognition.

Risk 222
article thumbnail

US Federal Judge Upholds Automakers' Right to Record Texts, Call Logs

SecureWorld News

The lawsuit, filed in 2020, alleged that the automakers' practice of collecting and storing this sensitive data without customers' knowledge or consent constituted a violation of the Washington Privacy Act (WPA). For the auto manufacturers involved, this is a significant victory.

article thumbnail

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

“ Bluetana ,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests. student and principal author of the study.

Banking 262
article thumbnail

Canada ordered ByteDance to shut down TikTok operations in the country over security concerns

Security Affairs

The Canadian government ordered ByteDance to wind up TikTok Technology Canada, Inc. s operations in Canada through the establishment of TikTok Technology Canada, Inc. The US already warned of the alleged link between the Chinese company and the Communist Party, accusing TikTok of collecting and sharing data for Chinese intelligence.