#stalkerware

[ follow ]
fromTechCrunch
1 week ago

A new security flaw in TheTruthSpy phone spyware is putting victims at risk | TechCrunch

Independent security researcher Swarang Wade found the vulnerability, which allows anyone to reset the password of any user of the stalkerware app TheTruthSpy and its many companion Android spyware apps, leading to the hijacking of any account on the platform. Given the nature of TheTruthSpy, it's likely that many of its customers are operating it without the consent of their targets, who are unaware that their phone data is being siphoned off to somebody else.
Information security
fromTheregister
1 month ago

Stalkerware seller exposed by sloppy SQL security

A security researcher uncovered an SQL vulnerability in stalkerware Catwatchful, allowing him to steal a database with 62,000 user accounts, including administrator credentials.
Information security
fromTechCrunch
2 months ago

Hacked, leaked, exposed: Why you should never use stalkerware apps | TechCrunch

Stalkerware industry suffers major data breaches, affecting thousands of victims and revealing sensitive personal information multiple times.
fromTechCrunch
2 months ago

Exclusive: Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones

Catwatchful is spyware masquerading as a child monitoring app that claims to be "invisible and cannot be detected," all the while uploading the victim's phone's private contents to a dashboard viewable by the person who planted the app.
Privacy technologies
Privacy technologies
fromDatabreaches
3 months ago

Cocospy stalkerware apps go offline after data breach

Three stalking apps, Cocospy, Spyic, Spyzie, are offline following exposure of major security flaws allowing unauthorized access to user data.
fromTechCrunch
3 months ago

Cocospy stalkerware apps go offline after data breach | TechCrunch

The recent shutdown of stalking apps Cocospy, Spyic, and Spyzie marks a significant moment in the fight against hidden surveillance tactics.
Privacy technologies
[ Load more ]