article thumbnail

Spyware maker LetMeSpy shuts down after hacker deletes server data

TechCrunch

Poland-based spyware LetMeSpy is no longer operational and said it will shut down after a June data breach wiped out its servers, including its huge trove of data stolen from thousands of victims’ phones. Both Spytrac and Support King shut down following TechCrunch’s reporting.

Spyware 246
article thumbnail

Going to TechCrunch Disrupt 2023 is cheaper when you bundle

TechCrunch

Seriously, though, when you bring your posse to Disrupt, you increase the networking ground you can cover and the opportunities you can discover and you can absorb more of the invaluable knowledge shared throughout the show. AI for SaaS Security Stage : Signal and the Future of Encrypted Messaging The Spyware Industry Is Out of Control.

Spyware 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020

Palo Alto Networks

New forms of “stalkerware,” a type of spyware, tracks smartphone data from victims to build up a picture of their activities; this can be used to create faked videos, voice recordings or written communications. The security industry is still working out its response to this new threat. Artificial intelligence and machine learning.

article thumbnail

Breaking Down the NASCIO Top 10 for 2023

Palo Alto Networks

With the Palo Alto Networks platform approach to building and operating a modernized, future-proof security framework, you can integrate cybersecurity into every initiative to protect data and ensure continuity of services. Palo Alto Networks takes a holistic approach to cybersecurity across the organization.

article thumbnail

Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know

Tenable

The simplest accurate description is "any weakness in your network that can be exploited." A vulnerability could also be a host on the network that lacks modern protections like next-generation firewalls or anti-malware features. computers, mobile devices or operational technology such as network switches and control systems).

Malware 89
article thumbnail

Radar trends to watch: August 2021

O'Reilly Media - Ideas

Google launches Intrinsic , a moonshot project to develop industrial robots. Amnesty International has released an open source tool for checking whether a phone has been compromised by Pegasus, the spyware sold by the NSO group to many governments, and used (among other things) to track journalists. Veins in materials? Web and Mobile.

Trends 139
article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

There's also the interruption of business to consider, as well as damage to the network and IT infrastructure — both of which can seriously hurt your organization's financial bottom line. Evaluating cyberthreats by industry (and risk level). It's also important to consider which attack types do the most damage, regardless of industry.

Malware 101