article thumbnail

Spyware maker LetMeSpy shuts down after hacker deletes server data

TechCrunch

Poland-based spyware LetMeSpy is no longer operational and said it will shut down after a June data breach wiped out its servers, including its huge trove of data stolen from thousands of victims’ phones. The notice said LetMeSpy is blocking users from logging in or signing up with new accounts.

Spyware 246
article thumbnail

The Security Stage debuts at Disrupt 2023

TechCrunch

How do we protect our most valuable information from hostile states without establishing U.S. Can governments keep cyberspace safe and protect our information without compromising its values or violating human rights? data laws at home? What can early companies do today to protect users’ data from overreaching surveillance?

Spyware 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

FireScam Android Malware Packs Infostealer, Spyware Capabilities

Ooda Loop

A recently identified Android malware described as an information stealer and spyware has broad monitoring capabilities that allow it to harvest and exfiltrate sensitive information from numerous applications.

Spyware 59
article thumbnail

Daily Crunch: Thousands of Google Play users download Android banking trojan

TechCrunch

Yet more spyware is out there, stealing your data : Sadly, the name of the Android spyware that is sucking up folks’ information is called TeaBot, which is a super-cute moniker. Now the public EV company is saying that if you ordered your vehicle before the start of March, no price hikes for you!

Banking 224
article thumbnail

Pegasus Spyware: Vulnerability Chaining's Next Level

TechBeacon

Once the message is opened (or, possibly, even if it's not), the victimized endpoint is at the mercy of the spyware’s commands. The story is as old as phishing itself. A malicious message is sent, disguised as something innocuous.

Spyware 98
article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

The information in the report can help drive strategic planning for enterprise technologists and members of the enterprise cyber security team and it is well worth a read by any CTO, CIO, CISO and most other members of enterprise technology teams. It is for those that want to inform their strategies with facts. - Physical Theft.

Report 124