A startup called Farnsworth & Co. has found a niche in the dark overlap between surveillance, malware, and civil litigation. Their product? Personal data stolen from infected computers—now available for purchase by debt collectors, divorce lawyers, and anyone with a grudge and a budget.
The company’s entire business hinges on access to data siphoned off by infostealer malware. This kind of software quietly grabs login credentials, browsing histories, cookies, emails, and contact lists from unsuspecting users. It then bundles the stolen data into searchable profiles. Farnsworth, for its part, packages this information and sells it as “intelligence services.” [Read more…]
A new cybersecurity threat is emerging as attackers use DNS records—the very system that directs internet traffic—to hide malware. Instead of relying on email attachments or suspicious downloads,
If you use an Android phone, there’s a good chance Google’s Gemini AI is now interacting with your apps, even if you thought you had disabled it. The company recently rolled out changes that grant Gemini new levels of access to messages, phone calls, and third-party apps like WhatsApp, regardless of whether users had previously opted out. If that sounds invasive, it’s because it is.
You click a link. It takes you to a site that looks exactly right. The logo matches, the name checks out, and everything feels familiar. But something’s off. And before you realize what it is, you’ve handed over your login, your credit card, or worse, your network credentials. The trick wasn’t in the layout or the content. It was in the letters.
A surveillance app marketed as a stealthy tool for parents has exposed sensitive data from over 62,000 users, raising fresh concerns about the real audience for apps like it.