Security News

The Looming Maximum of Maximums

The Wall Street Journal’s Christopher Mims wrote about the possibility of hackers breaching a major data broker. This event would be the data world’s equivalent of the maximum of maximums.

Who Cares?
Comments I’ve read asked why should people care about what you buy? Why is this data valuable to a criminal or anyone else unless it belongs to someone with […]

By |September 15th, 2015|

Leo Privacy Guard threat report whitepaper

Last month we posted that we had discovered some unusual activity by Leo Privacy Guard. Today, we are releasing a Threat Report detailing the information that this app collects about users and sends to a server in Singapore.
The information taken includes sensitive identifying details such as the IMEI, a unique phone identifier, and IMSI, which identifies […]

By |September 9th, 2015|

Spotify: Sign Away Broad Privacy Rights Or Don’t Use Our Service

A lot has been written about how Spotify is changing its EULA, and we at SpyAware have certainly seen it taking a huge amount of information.

See what Spotify is up to on Your Android Phone
SpyAware watches Spotify data as it moves in and out of your Android phone. The screenshot at right shows that, within […]

By |August 22nd, 2015|

A Gentler View of Personal Privacy

In which I attempt to use the phrase “individual dossiers” without making you click over to pictures of a cat nursing hedgehogs.
Alan Henry with LifeHacker wrote an piece last week titled “Another Day, Another Hack: What Security News Should You Care About?” It’s aimed at consumers, but it’s a good lesson for companies like ours […]

By |August 17th, 2015|

The New Threat to Privacy: Data Brokers. Who They Are, What They’re Selling and How to Stop Them

Who are Data Brokers?
Data brokers are private companies that collect and assemble your information with one purpose: to create a complete dossier on you. They do this by correlating data gathered from an enormous variety of sources, including your mobile phone.

What kind of information do they collect?
Just to begin with, it includes basic demographics such […]

By |August 2nd, 2015|

Mobile is the Weak Link

Recently, John McAfee said, “Our paradigms for protecting corporate assets  no longer work,” said MacAfee.
He went on to discuss a consulting gig he had with a government contractor in which he discovered that the company’s competitor had installed a trojan horse on employees’ smartphones that intercepted data about contracts so that they could underbid the company every time.

The New Entry […]

By |July 30th, 2015|

The 2 Big Reasons Why Google and Facebook Will Never Protect Your Data

You’ve just downloaded Google Voice, and you love its price tag: Free. But there’s a tradeoff. You are voluntarily exposing your every word and the words of the people with whom you speak to Google’s voice recognition algorithms.
On the plus side, this means you can read your voicemail just like your emails. On the minus […]

By |July 29th, 2015|

Data Transparency Stops Bullies

Data was once hard to get and hard to take action on. Now, it is easy to get but many users still assume that action won’t be taken. However, it’s also far easier to take action on information than ever before.
For instance, Getty Images had a long-standing practice of scooping up business owners who had […]

By |July 22nd, 2015|

The Mobile Data Free-For-All Continues

After many, many warnings and hacks, some app authors are still not taking adequate precautions with their users’ data. When mobile app authors send and store unencrypted usernames and passwords, they fail to keep their promise to protect user data.

When a company rushes to ship an application by cutting security corners, it can give pirates […]

By |June 23rd, 2015|

Could You Go To Jail for Clearing Your Cache?

The recent publicity around use of the Sarbanes-Oxley act to prosecute people who, literally, have cleared their browser cache, is another sign that federal authorities believe that laws entitle them to private data, no matter how it has been generated.
However, the world is now awash in data that is easily created and even more easily […]

By |June 17th, 2015|