article thumbnail

Privacy Device Designed to Defend Against Illegal Wireless Tracking

SecureWorld News

RELATED: Tech CEO Fined $410K for Selling Illegal Spyware ] One company that is helping fight against the illegal use of BLE trackers is Berkeley Varitronics Systems (BVS). BVS has been at the forefront of the wireless security industry for 50 years, designing, building, and shipping thousands of innovative security products.

Wireless 104
article thumbnail

COVID-bit: the wireless spyware trick with an unfortunate name

Naked Security

It's not the switching that's the problem, it's the switching of the switching!

Wireless 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISOs, beware of spyware tools for illicit competitive intelligence

CSO Magazine

Elite de Carga would sell these capabilities to the Mexican state government of Baja and Durango for what was tacitly understood to be for political as well as law enforcement purposes.

Spyware 128
article thumbnail

5 Things Your Small Business Cybersecurity Plan Must Cover

CyberSecurity Insiders

Protect your wireless system with full backups. Make sure your wireless network is protected, concealed, and safe. . Use passcodes and anti-spyware programs. Adopting and applying cybersecurity principles can help you secure your company and decrease the danger of a data breach. Develop a mobile device protection strategy.

article thumbnail

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Malwarebytes

April’s global shutdown was accompanied by a staggering rise in the use of stalkerware, a short-hand term for the type of mobile monitoring and spyware apps that are sometimes deployed by abusive partners. New adversaries crawled out of the woodwork, too. The pandemic also created new challenges to online privacy.

Malware 133
article thumbnail

Agent Tesla includes new password-stealing capabilities from browsers and VPNs

Security Affairs

Agent Tesla is a spyware that is used to spy on the victims by collecting keystrokes, system clipboard, screenshots, and credentials from the infected system. To do this, the spyware creates different threads and timer functions in the main function. They usually achieve persistence via registry key entry or scheduled task.

Passwords 145
article thumbnail

S3 Ep113: Pwning the Windows kernel – the crooks who hoodwinked Microsoft [Audio + Text]

Naked Security

Return o' the rookit, super-sneaky wireless spyware, credit card skimming, and patches galore. Listen and learn!