article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 191
article thumbnail

Kaiser Permanente Discloses Data Breach Impacting 13.4 Million People

SecureWorld News

It is believed that PII (personally identifiable information) was transmitted to third-party vendors via mobile applications and other website tools used by the healthcare giant. Information collected by online trackers is often shared with an extensive network of marketers, advertisers, and data brokers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: ‘World password day’ reminds us to embrace password security best practices

The Last Watchdog

Use multi-factor authentication. Multi-factor authentication (MFA) is the process of protecting your digital password with a physical form of identification. For example, when you enter your password into an online account like Gmail, you may receive a code to your mobile phone that you’ll have to enter for an extra line of security.

Passwords 182
article thumbnail

Not the Invasion They Warned Us About: TikTok and the Continued Erosion of Online Privacy

Approachable Cyber Threats

social engineer a mobile provider employee to facilitate a SIM swap). Users must be better protected from the outset, and the only way to ensure that is to impose significant restrictions on data collection and usage by companies seeking to monetize or use it to their asymmetric benefit in any way.

article thumbnail

5 Tips for Choosing the Best Proxy Service Provider

IT Security Guru

The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. This is incredibly important when using residential or mobile proxies, which direct internet traffic through actual user devices.

article thumbnail

10 of the Riskiest Mobile Apps You Probably Downloaded

Spinone

Installation of non-approved apps on mobile devices that may be used for work falls under the category of shadow IT – software that is installed without approval of the company IT team and can introduce many security risks. Youtube Youtube is now so ubiquitous that the app is installed as standard on many mobile devices.

Mobile 40
article thumbnail

Financial cyberthreats in 2022

SecureList

Security solutions integrated into operating systems, two-factor authentication and other verification measures have helped reduce the number of vulnerable users. Additionally, in many markets mobile banking has been pushing out online banking, with more and more convenient and secure banking apps emerging. of attacks.

Banking 80