Remove Data collection Remove Spyware Remove Technology
article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 228
article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

Every third email, meanwhile, contained spyware , which is used by threat actors to steal payment data or other sensitive info to then put it on sale in the darknet or blackmail its owner. Ransomware operators have focused on targeted attacks,choosing large victims with a higher payment capacity. About Group-IB.

Phishing 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web tracking report: who monitored users’ online activities in 2023–2024 the most

SecureList

Types of web tracking Web tracking can be classified into several categories based on the methods and technologies employed: Cookies Cookies are small text files that websites place on a user’s device to store information about their visits, such as login credentials, preferences, and tracking identifiers.

article thumbnail

Best Anti-Malware Software for Mac 2025

eSecurity Planet

Unlike traditional antivirus programs, which primarily focus on viruses, anti-malware solutions address a wider array of threats, including spyware, adware, ransomware, and trojans. While effective, some users have privacy concerns about Avast’s data collection on user behavior. Visit Avast 5.

article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Since 2004, there's been an annual event designed to "Promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world." The pop up blocker in particular was a big help with the proliferation of adware and spyware plugging into advertising networks.

article thumbnail

APT trends report Q2 2023

SecureList

Following this, we released the first of a series of additional reports describing the final payload in the infection chain: a highly sophisticated spyware implant that we dubbed “TriangleDB” Operating in memory, this implant periodically communicates with the C2 (command and control) infrastructure to receive commands.

Malware 98
article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. Based on the data collected by the Post-Validator, it is most likely that: The Post-Validator is deployed to ensure that the infected victim is the intended one. FinSpy, also known as FinFisher or Wingbird , is an infamous surveillance toolset.