Endpoint
9/4/2012
01:55 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AceSpy Spy Software Exposes Social Media Naughtiness

AceSpy v6.0 now includes full Facebook monitoring and restriction

JACKSONVILLE, Fla., Sept. 4, 2012 /PRNewswire/ -- Retina-X Studios, LLC, a leading monitoring software publisher, has released AceSpy v6.0 for Windows. Among several new features is full Facebook monitoring and restriction. The software allows parents to silently monitor and restrict Facebook and other social media websites. They are able to see every single action their child does and block those they deem inappropriate.

First created in 2003, AceSpy is a hidden program which silently records detailed activities of a monitored computer. Results are accessed inside an easy-to-understand user interface. Activities such as typed keystrokes, websites visited, Facebook activity, chats and visual screenshots can be viewed on demand. The software can automatically forward all emails and chats directly to the parents' email address.

The Facebook Monitoring feature silently captures activities such as mail, search and IM chatting. The IM viewer allows users to monitor conversations live as they occur in real time. Offline IM monitoring records the IM window every 15 seconds logging both sides of the conversation.

"Social media sites are quickly becoming the bane of our existence. If a parent suspects their child is doing something naughty, they should investigate. With AceSpy, parents can learn whether or not their child is behaving themselves on social networks. They can also block activities they don't want to happen," said CEO James Johns.

Further parental control features allow parents to set up scheduled usage times limiting access to the entire computer, thus creating a controlled environment. Along with time restrictions, users will also have the option of blocking specific websites from being viewed by creating a URL or keyword list of restricted sites.

The advanced watch list system alerts a parent to pre-specified events. They can monitor for specific keywords within a website or email and then receive an alert if the keyword is encountered. Alerts can be sent via email or text message.

AceSpy Spy Software is available now for Windows and Mac OS X computers at http://www.acespy.com/details.html

About Retina-X Studios, LLC: Founded in 2003, Retina-X Studios designs and develops tools which allow parents and employers to monitor the usage of computers, tablets and smartphones. The entire Retina-X Studios lineup is available at http://www.retinax.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.