article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

Less than a week ago, security researcher Nitish Shah directed KrebsOnSecurity to an open database on the Web that allowed anyone to query up-to-the-minute mSpy records for both customer transactions at mSpy’s site and for mobile phone data collected by mSpy’s software. The database required no authentication.

Spyware 192
article thumbnail

GUEST ESSAY: Threat hunters adapt personas, leverage AI to gather intel in the Dark Web

The Last Watchdog

It extends beyond the Deep & Dark Web to: unindexed Web forums, messaging boards, and marketplaces, encrypted messaging systems, and code repositories. Data collections released after ransomware attacks. There are many facets to what I’ll call “The Underground.” Databases with critical IP and/or PII. Staying vigilant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious ads for restricted messaging applications target Chinese users

Malwarebytes

While we don’t know the threat actor’s true intentions, data collection and spying may be one of their motives. In this blog post, we share more information about the malicious ads and payloads we have been able to collect. Malicious ads Visitors to google.cn are redirected to google.com.hk

Malware 102
article thumbnail

For months, JusTalk messages were accessible to everyone on the Internet

Malwarebytes

JusTalk, a popular mobile video calling and messaging app with 20 million global users, exposed a massive database of supposedly private messages to the public Internet for months. It also houses hundreds of gigabytes of data and is hosted on a Huawei cloud server in China. Zack Whittaker, TechCrunch.

article thumbnail

For months, JusTalk messages were accessible to everyone on the Internet

Malwarebytes

JusTalk, a popular mobile video calling and messaging app with 20 million global users, exposed a massive database of supposedly private messages to the public Internet for months. It also houses hundreds of gigabytes of data and is hosted on a Huawei cloud server in China. Zack Whittaker, TechCrunch.

article thumbnail

Top 10 Cloud Privacy Recommendations for Consumers

McAfee

If they can tie that to your email address, and another service obtains your zip-code and a third service asks for your mobile number, you can see that anyone collating that information could have enough to try to steal your identity. This is more common than you think—you should never use a service that claims it owns your data.

article thumbnail

10 of the Riskiest Mobile Apps You Probably Downloaded

Spinone

Installation of non-approved apps on mobile devices that may be used for work falls under the category of shadow IT – software that is installed without approval of the company IT team and can introduce many security risks. Youtube Youtube is now so ubiquitous that the app is installed as standard on many mobile devices.

Mobile 40