med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

364
active users

#stalkerware

1 post1 participant0 posts today
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>Researcher exploits SQL injection in stalkerware app Catwatchful, gaining access to 62k user accounts with plaintext credentials. Despite takedown attempts, service briefly reappeared still vulnerable.</p><p><a href="https://ericdaigle.ca/posts/taking-over-60k-spyware-user-accounts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ericdaigle.ca/posts/taking-ove</span><span class="invisible">r-60k-spyware-user-accounts/</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/SQLi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLi</span></a> <a href="https://infosec.exchange/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a></p>
Richi Jennings<p>Content warning: Domestic abuse, stalking, controlling behavior, Schadenfreude, irony.</p><p>A new data leak shows the dangers of secret, silent <a href="https://vmst.io/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a>. An app known as <a href="https://vmst.io/tags/Catwatchful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Catwatchful</span></a> appears to be just as insecure as all the others.</p><p>The Catwatchful app’s user login database was vulnerable to a simple <a href="https://vmst.io/tags/SQLinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLinjection</span></a> attack. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we call for Little Bobby Tables.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/07/catwatchful-stalkerware-data-breach-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/07/</span><span class="invisible">catwatchful-stalkerware-data-breach-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a> </p><p>(Also known as <a href="https://vmst.io/tags/spouseware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spouseware</span></a> and <a href="https://vmst.io/tags/creepware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>creepware</span></a>, this vile trade enables all manner of frightening and dangerous abuse, from stalking to serious sexual assault. It’s no laughing matter.)</p>
PrivacyDigest<p>Data <a href="https://mas.to/tags/breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breach</span></a> reveals <a href="https://mas.to/tags/Catwatchful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Catwatchful</span></a> 'stalkerware' is <a href="https://mas.to/tags/spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spying</span></a> on thousands of phones | TechCrunch </p><p>A <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> in a stealthy <a href="https://mas.to/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://mas.to/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> operation called Catwatchful has exposed thousands of its customers, including its administrator. <br><a href="https://mas.to/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> <a href="https://mas.to/tags/stalker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalker</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://techcrunch.com/2025/07/02/data-breach-reveals-catwatchful-stalkerware-spying-on-thousands-android-phones/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/02/data</span><span class="invisible">-breach-reveals-catwatchful-stalkerware-spying-on-thousands-android-phones/</span></a></p>
Keira (She/Her)<p>I will be doing some googling and homework of my own, but does anyone here know if something that shows up as "org.openoffice.script" on iOS is malware?</p><p>A friend got a warning from iOS about this script in her screentime app, and she's got a fucked up situation with an ex. The combination is worrying her.</p><p><a href="https://aus.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://aus.social/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://aus.social/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://pixelfed.social/arcturus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>arcturus</span></a></span> calling <em>"<a href="https://infosec.space/tags/Telegram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telegram</span></a>"</em> an <em>"<a href="https://infosec.space/tags/Encrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encrypted</span></a> <a href="https://infosec.space/tags/Messaging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Messaging</span></a> Service"</em> is as much of corporate propaganda lie as calling <em>"<a href="https://infosec.space/tags/MicrosoftRecall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftRecall</span></a>"</em> a productivity tool, not a <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> and <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a>!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@dalfen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dalfen</span></a></span> <span class="h-card" translate="no"><a href="https://respublicae.eu/@europarl_en" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>europarl_en</span></a></span> basically, <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> refuses to comply with <a href="https://infosec.space/tags/GDPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GDPR</span></a> by shoving their <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> (<a href="https://infosec.space/tags/Recall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recall</span></a>) into <a href="https://infosec.space/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> and Microsoft under <a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudAct</span></a> decided to cancel key <a href="https://infosec.space/tags/ICC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICC</span></a> staff's accounts for no valid reason than <a href="https://infosec.space/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> doesn't like the fact that they investigate <a href="https://infosec.space/tags/WarCrimes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WarCrimes</span></a> that happened in <a href="https://infosec.space/tags/Gaza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaza</span></a>.</p>
nemo™ 🇺🇦<p>Cocospy, Spyic, &amp; Spyzie, stalkerware apps that spied on millions, have gone offline after a data breach. 😬 These apps allowed access to messages, photos, &amp; location data without consent. If you think your phone is compromised, dial ✱✱001✱✱ to check. <a href="https://mas.to/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> <a href="https://mas.to/tags/privacybreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacybreach</span></a> 📱🔒➡️ <a href="https://techcrunch.com/2025/05/19/cocospy-stalkerware-apps-go-offline-after-data-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/05/19/coco</span><span class="invisible">spy-stalkerware-apps-go-offline-after-data-breach/</span></a> <a href="https://mas.to/tags/oldnewz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oldnewz</span></a></p>
Scott Wilson<p>I'm sure <span class="h-card" translate="no"><a href="https://hachyderm.io/@evacide" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>evacide</span></a></span> has opinions about this article's premise </p><p><a href="https://infosec.exchange/tags/sarcasm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sarcasm</span></a> <a href="https://infosec.exchange/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> <a href="https://infosec.exchange/tags/cyberstalking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberstalking</span></a> </p><p><a href="https://infosec.exchange/@maldr0id/114427021291757028" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@maldr0id/114</span><span class="invisible">427021291757028</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mk.absturztau.be/@Baa" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Baa</span></a></span> <a href="https://infosec.space/tags/MicrosoftTeams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftTeams</span></a> is garbage.amd.I'll refuse.to use this <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a>.with <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> built-in even if I end up homeless!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://hai.z0ne.social/@Erpel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Erpel</span></a></span> I'm glad <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> like that is so illegal in <a href="https://infosec.space/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a> that no employer dares this shite!</p>
Marcel SIneM(S)US<p>DNIP Briefing #14: Diskurse brauchen Regeln - Das Netz ist politisch <a href="https://dnip.ch/2025/02/25/dnip-briefing-14-diskurse-brauchen-rege/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/02/25/dnip-briefi</span><span class="invisible">ng-14-diskurse-brauchen-rege/</span></a> </p><p><a href="https://social.tchncs.de/tags/Meinungsfreiheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meinungsfreiheit</span></a> <a href="https://social.tchncs.de/tags/FreeSpeech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeSpeech</span></a> <a href="https://social.tchncs.de/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://social.tchncs.de/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Überwachung</span></a> <a href="https://social.tchncs.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.tchncs.de/tags/X" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>X</span></a> <a href="https://social.tchncs.de/tags/Twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Twitter</span></a> <a href="https://social.tchncs.de/tags/TwitterX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TwitterX</span></a> <a href="https://social.tchncs.de/tags/TwiX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TwiX</span></a> <a href="https://social.tchncs.de/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElonMusk</span></a> <a href="https://social.tchncs.de/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> 🇺🇦 <a href="https://social.tchncs.de/tags/UkraineWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UkraineWar</span></a> <a href="https://social.tchncs.de/tags/Russland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russland</span></a> <a href="https://social.tchncs.de/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.tchncs.de/tags/Starlink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Starlink</span></a> <a href="https://social.tchncs.de/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> :apple_inc: <a href="https://social.tchncs.de/tags/Grok3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Grok3</span></a> <a href="https://social.tchncs.de/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a> <a href="https://social.tchncs.de/tags/GoogleGemini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleGemini</span></a> <a href="https://social.tchncs.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.tchncs.de/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://social.tchncs.de/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://social.tchncs.de/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://social.tchncs.de/tags/End2EndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>End2EndEncryption</span></a> <a href="https://social.tchncs.de/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> <a href="https://social.tchncs.de/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> <a href="https://social.tchncs.de/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> :firefox: <a href="https://social.tchncs.de/tags/DNIPBriefing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNIPBriefing</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://troet.social/@friedi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>friedi</span></a></span> das ist auch nichts anderes als <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a>, nur als <a href="https://infosec.space/tags/Appliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Appliance</span></a>... </p><ul><li>War schon beim <a href="https://infosec.space/tags/Gizmondo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gizmondo</span></a> shice!<a href="https://www.youtube.com/watch?v=dv6UaHZxUys" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=dv6UaHZxUys</span><span class="invisible"></span></a></li></ul><p><a href="https://infosec.space/tags/FuckStalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FuckStalkerware</span></a></p>
Miguel Afonso Caetano<p>"A consumer-grade spyware operation called SpyX was hit by a data breach last year, TechCrunch has learned. The breach reveals that SpyX and two other related mobile apps had records on almost two million people at the time of the breach, including thousands of Apple users.</p><p>The data breach dates back to June 2024 but has not been previously reported, and there is no indication that SpyX’s operators ever notified its customers or those targeted by the spyware.</p><p>The SpyX family of mobile spyware is now, by our count, the 25th mobile surveillance operation since 2017 known to have experienced a data breach, or otherwise spilled or exposed their victims’ or users’ data, showing that the consumer-grade spyware industry continues to proliferate and put people’s private data at risk. </p><p>The breach also provides a rare look at how stalkerware like SpyX can also target Apple customers.</p><p>Troy Hunt, who runs data breach notification site Have I Been Pwned, received a copy of the breached data in the form of two text files, which contained 1.97 million unique account records with associated email addresses."</p><p><a href="https://techcrunch.com/2025/03/19/data-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/19/data</span><span class="invisible">-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://tldr.nettime.org/tags/SpyX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpyX</span></a> <a href="https://tldr.nettime.org/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://tldr.nettime.org/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> <a href="https://tldr.nettime.org/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> is still hosting <a href="https://hachyderm.io/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> victims' data weeks after breach alert<br><a href="https://hachyderm.io/tags/Cocospy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cocospy</span></a>, <a href="https://hachyderm.io/tags/Spyic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyic</span></a>, and <a href="https://hachyderm.io/tags/Spyzie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyzie</span></a>, have collectively compromised over 3.1 million Android phones, which we know because apps each had a <a href="https://hachyderm.io/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> in Feb.<br>As part of our investigation into stalkerware operations, which included analyzing the apps themselves, TechCrunch found that some of the contents of a device compromised by the stalkerware apps are being uploaded to storage servers run by <a href="https://hachyderm.io/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a>. <br><a href="https://techcrunch.com/2025/03/13/amazon-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/13/amaz</span><span class="invisible">on-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> is still hosting <a href="https://mastodon.thenewoil.org/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> victims’ data weeks after breach alert</p><p><a href="https://techcrunch.com/2025/03/13/amazon-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/13/amaz</span><span class="invisible">on-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://mastodon.thenewoil.org/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://systemli.social/@anneroth" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>anneroth</span></a></span> was, <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> ist nicht als <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> verboten?</p><p>WTF??</p>
Avoid the Hack! :donor:<p>Here’s Week 9 of the <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> Roundup:</p><p>- <a href="https://infosec.exchange/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@mozillaofficial" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mozillaofficial</span></a></span> updates <a href="https://infosec.exchange/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> privacy notice, adds Terms of Use<br>- Edge Canary disabling manifestv2 extensions<br>- DOGE allegedly exposing sensitive endpoints to the public internet<br>- More PII leaks by <a href="https://infosec.exchange/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> apps<br>- Surveillance tech in the office is very… invasive<br>- <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> threatens to cease operations in Sweden if e2e encryption is forced to be backfired by law</p><p>… and more, of course.</p><p><a href="https://infosec.exchange/tags/privacymatters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacymatters</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://avoidthehack.com/privacy-week9-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">avoidthehack.com/privacy-week9</span><span class="invisible">-2025</span></a></p>
earthling<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@sambowne" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sambowne</span></a></span> </p><p>"With Cocospy and Spyic, you can usually enter ✱✱001✱✱ on your Android phone app’s keypad and then press the “call” button to make the stalkerware apps appear on-screen — if they are installed. This is a feature built into Cocospy and Spyic to allow the person who planted the app on the victim’s device to regain access. In this case, the feature can also be used by the victim to determine if the app is installed."</p><p><a href="https://mastodon.social/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> <br><a href="https://mastodon.social/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <br><a href="https://mastodon.social/tags/Cocospy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cocospy</span></a> <br><a href="https://mastodon.social/tags/Spyic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyic</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>A security vulnerability in a pair of phone-monitoring apps is exposing the personal data of millions of people who have the apps unwittingly installed on their devices, according to a security researcher who found the flaw. <br><a href="https://kolektiva.social/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalkerware</span></a> <a href="https://kolektiva.social/tags/Cocospy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cocospy</span></a> <br><a href="https://techcrunch.com/2025/02/20/stalkerware-apps-cocospy-spyic-exposing-phone-data-of-millions-of-people/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/02/20/stal</span><span class="invisible">kerware-apps-cocospy-spyic-exposing-phone-data-of-millions-of-people/</span></a></p>
The New Oil<p>Your <a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> phone could have <a href="https://mastodon.thenewoil.org/tags/stalkerware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stalkerware</span></a> — here’s how to remove it</p><p><a href="https://techcrunch.com/2025/02/20/remove-android-spyware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/02/20/remo</span><span class="invisible">ve-android-spyware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/guide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guide</span></a></p>