article thumbnail

Spyware maker LetMeSpy shuts down after hacker deletes server data

TechCrunch

Poland-based spyware LetMeSpy is no longer operational and said it will shut down after a June data breach wiped out its servers, including its huge trove of data stolen from thousands of victims’ phones. Both Spytrac and Support King shut down following TechCrunch’s reporting.

Spyware 246
article thumbnail

Daily Crunch: Thousands of Google Play users download Android banking trojan

TechCrunch

Yet more spyware is out there, stealing your data : Sadly, the name of the Android spyware that is sucking up folks’ information is called TeaBot, which is a super-cute moniker. Regardless, it’s out in the market racking up downloads, which is pretty bad.

Banking 224
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thousands Download New Mandrake Android Spyware Version From Google Play 

Ooda Loop

Five applications were discovered to have been carrying a version of the Mandrake Android Spyware on Google Play for two years. During the applications’ time on Google Play, they had over 32,000 downloads. Mandrake is a spyware platform which allows attackers to completely control infected devices.

Spyware 59
article thumbnail

Radar Trends to Watch: August 2022

O'Reilly Media - Ideas

You can try it out, download it, and read its specifications. Lockdown mode provides an extreme degree of privacy; it is intended for people who believe they are being targeted by state-sponsored mercenary spyware. Tiny Core Linux is amazingly small: a 22MB download, and runs in 48MB of RAM. We hope to see more of this.

article thumbnail

What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020

Palo Alto Networks

Anyone can download software to create deep fakes, offering many possibilities for malicious activity. New forms of “stalkerware,” a type of spyware, tracks smartphone data from victims to build up a picture of their activities; this can be used to create faked videos, voice recordings or written communications.

article thumbnail

The Top 5 Mobile Security Threats and How to Mitigate Them

Palo Alto Networks

Mobile Malware: Every website visited or link clicked has the potential to infect mobile devices with malware, such as spyware, ransomware, Trojan viruses, adware and others. Malicious Apps : The world is full of software applications that can either be used over the internet or downloaded from websites, Apple App Store or Google Play.

Mobile 14
article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

Malware: This catch-all term encompasses a number of different cybersecurity threats, including everything from viruses and worms to banking trojans, adware, spyware and ransomware. Once these programs gain access to a targeted system, they can steal, destroy, encrypt or corrupt valuable databases, files and applications. .