For months, JusTalk messages were accessible to everyone on the Internet

Credit to Author: Malwarebytes Labs| Date: Wed, 03 Aug 2022 12:25:38 +0000

A security researcher found an open database belonging to JusTalk, a China-based video call and messaging app company.

The post For months, JusTalk messages were accessible to everyone on the Internet appeared first on Malwarebytes Labs.

Read more

Photos of kids taken from spyware-ridden phones found exposed on the internet

Credit to Author: Malwarebytes Labs| Date: Thu, 16 Jun 2022 09:31:16 +0000

TheTruthSpy is an app programmed to siphon out photos, locations and more from smartphones.

The post Photos of kids taken from spyware-ridden phones found exposed on the internet appeared first on Malwarebytes Labs.

Read more

You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results

Credit to Author: BrianKrebs| Date: Fri, 29 Apr 2022 19:25:49 +0000

Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after Google rolled out a new policy enabling people under the age of 18 (or a parent/guardian) to request removal of their images from Google search results.

Read more

Apple Explains Mysterious iPhone 11 Location Requests

Credit to Author: BrianKrebs| Date: Thu, 05 Dec 2019 19:46:02 +0000

KrebsOnSecurity ran a story this week that puzzled over Apple’s response to inquiries about a potential privacy leak in its new iPhone 11 line, in which the devices appear to intermittently seek the user’s location even when all applications and system services are individually set never to request this data. Today, Apple disclosed that this behavior is tied to the inclusion of a new short-range technology that lets iPhone 11 users share files locally with other nearby phones that support this feature, and that a future version of its mobile operating system will allow users to disable it.

Read more

Avast, NordVPN Breaches Tied to Phantom User Accounts

Credit to Author: BrianKrebs| Date: Tue, 22 Oct 2019 00:32:57 +0000

Antivirus and security giant Avast and virtual private networking (VPN) software provider NordVPN each today disclosed months-long network intrusions that — while otherwise unrelated — shared a common cause: Forgotten or unknown user accounts that granted remote access to internal systems with little more than a password.

Read more

A week in security (January 21 – 27)

Credit to Author: Malwarebytes Labs| Date: Mon, 28 Jan 2019 18:00:14 +0000

A roundup of last week’s security news from January 21 to 27, including Modlishka, Crytekk, PUPs, and the State of Malware report.

Categories:

Tags:

(Read more…)

The post A week in security (January 21 – 27) appeared first on Malwarebytes Labs.

Read more

When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference?

Credit to Author: BrianKrebs| Date: Tue, 02 Oct 2018 23:42:24 +0000

A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it. When cybercriminals are the first to discover these missteps, usually the outcome is a demand for money in return for the stolen data. But when these screw-ups are unearthed by security professionals seeking to make a name for themselves, the resulting publicity often can leave the breached organization wishing they’d instead been quietly extorted by anonymous crooks.

Read more