LetMeSpy App Hacked, Sensitive Victim and User Data Leaked
Hackers breached the widely used Android phone monitoring app “LetMeSpy,” and leaked a file containing the sensitive data of people who were spied upon, as well as those who operated it. …
Hackers breached the widely used Android phone monitoring app “LetMeSpy,” and leaked a file containing the sensitive data of people who were spied upon, as well as those who operated it. …
A Belgian telecommunications company named ‘BICS,’ which cooperates with over 500 mobile operators in 200 countries worldwide, is accused of collecting user identification, phone, and web traffic …
DuckDuckGo has finally made its privacy-focused web browser available to all Windows users, as the project has exited the closed beta stage. Although still in beta, the DuckDuckGo team is now …
A researcher claims that Swing VPN, an app downloaded 5 million times via the Google Play store alone, is a DDoS botnet that uses people’s devices to launch debilitating attacks on websites and online …
A security researcher has shared more details about a method he followed to find the IP address of a Tor hidden service hosting the data that a Ragnar Locker ransomware affiliate had stolen from …
Threat actors continue to bet on the popularity of VPN apps to distribute their malware payloads onto the computers and mobile devices of unsuspecting users. Two cases brought to light by two …
Oregon and Louisiana authorities have alerted their citizens that hackers have accessed and stole sensitive personal details stored in their systems. The Oregon Driver & Motor Vehicle Services …
The personal and financial details of roughly 85 million people, the entire population of Turkey, was added to a website where visitors can search by name or other terms to quickly locate what …
Data protection authorities demand OpenAI to share more about how its AI-powered large-language model chatbot ChatGPT works and, more specifically, what happens to the questions users submit. ChatGPT …
Russia has started tentative blocks of the OpenVPN protocol on several mobile internet service providers since last week. The fact became known after several Moscow-based users complained about their …
The Federal Trade Commission (FTC) and the U.S. Department of Justice (DOJ) accuse Amazon of violating the Children’s Online Privacy Protection Act (COPPA) by not deleting sensitive voice and …
A security researcher has demonstrated an innovative phishing attack that takes advantage of Google’s debatable decision to offer risky top-level domains (TLDs) such as ZIP, for use on websites …
VPN Norton Secure VPN Based in USA Logs Connection logs Price $6.67/mo. Support Email Refund 30 days Website Norton.com With a pedigree that includes online security giants like Norton and LifeLock, …
Managed Care of North America, one of the largest dental care service providers in the United States, has admitted that the LockBit cyberattack the threat actors disclosed in early March 2023 has …
The BlackCat ransomware group, also known as ‘ALPHV,’ has claimed responsibility for the cyberattack that caused problems earlier in the month to Norton Healthcare, a healthcare provider …
The Irish Data Protection Commission (DPC) has imposed a record-breaking fine of €1,200,000 on Meta, Facebook’s parent company, for GDPR (General Data Protection Regulations) violations. The …
KeePass, a widely-used open-source password manager, saves user input in retrievable memory strings, including master passwords that protect the user’s credentials. The problem stems from how …
A Google security engineer has revealed that the Telegram application on macOS suffers from a vulnerability that could be exploited to gain unauthorized access to the device’s camera. Normally, …
Brightly Software has informed users of the SchoolDude app that hackers have gained access to its user database and stole sensitive information. Brightly is American company, subsidiary of Siemens, …
Twitter introduced a new layer of privacy and security on user communications, named Encrypted Direct Messages. This new feature is Twitter’s implementation of end-to-end encryption (E2EE) for direct …
The TunnelBear team has announced the support of the ECH (Encrypted Client Hello) protocol in their Android app to empower the tool’s censorship circumvention performance. ECH is a TLS protocol …
The Windows client of CyberGhost VPN older than version 8.3.10.10015 is vulnerable to a flaw that could allow attackers to perform command line injection and escalate their privileges on the impacted …
The Metropolitan Opera (Met) has admitted that threat actors have stolen the financial and personal details of thousands of employees and visitors, following the extortion by the Snatch ransomware …
Google and Apple have jointly submitted a proposed industry specification to prevent the misuse of Bluetooth location-tracking devices for unwanted tracking. More specifically, the two tech firms want …