article thumbnail

Weekly Update 441

Troy Hunt

Spyware / stalkerware apps Cocospu and Spyic leaker their data for all to see (and since that recording, Spyzie has also been added to the list) The Zimi Senoa IoT switches are beautiful. (.but but I think that Bluetooth mesh via a proprietary hub is going to be a show-stopper)

Spyware 213
article thumbnail

Beware the Cyber Ghouls: Spooky Threats Lurking in Digital Shadows

SecureWorld News

Spooky fact : The infamous Mirai botnet attack in 2016 turned more than 600,000 IoT devices into cyber zombies, leading to one of the most significant DDoS attacks in history. Warding off zombies : Regularly update device firmware, patch IoT devices, and monitor for unusual traffic patterns.

IoT 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fitbit Spyware Steals Personal Data via Watch Face

Threatpost

Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face.

Spyware 133
article thumbnail

Spyware in the IoT – the Biggest Privacy Threat This Year

SiteLock

Simply defined, the internet of things (IoT) is a network of Internet-connected objects able to collect and exchange data. In today’s digital-driven world, IoT connects almost everything including homes, offices, and vehicles, allowing users the convenience of activating and operating nearly any device remotely. Think again.

IoT 98
article thumbnail

Security Affairs newsletter Round 515 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog GitLab addressed critical auth bypass flaws in CE and EE North Korea-linked APT group ScarCruft spotted using new Android spyware KoSpy Experts warn of a coordinated surge in the exploitation attempts of SSRF vulnerabilities Meta warns of actively exploited (..)

Spyware 73
article thumbnail

Courts Hand Down Hard Jail Time for DDoS

Krebs on Security

Kaye launched the attack using a botnet powered by Mirai , a malware strain that enslaves hacked Internet of Things (IoT) devices like poorly-secured Internet routers and Web-based cameras for use in large-scale cyberattacks. Daniel Kaye , an Israel-U.K. to face charges there.

DDOS 226
article thumbnail

Tenda Router Zero-Days Emerge in Spyware Botnet Campaign

Threatpost

A variant of the Mirai botnet, called Ttint, has added espionage capabilities to complement its denial-of-service functions.

Spyware 111