Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/29/2007
03:32 AM
50%
50%

FlexiSPY Spills BlackBerry Secrets

Vervata has released new versions of its controversial FlexiSPY mobile phone spy software

BANGKOK, Thailand -- Vervata Co. Ltd. announced today that it has released new versions of its controversial FlexiSPY mobile phone spy software for Blackberry, Windows Mobile, and the latest Nokia Series 60 phones.

The FlexiSPY software, which runs invisibly in the background and can only be accessed using a secret code, is available in two versions, PRO and LIGHT.

FlexiSPY LIGHT silently records all SMS messages, call logs, emails and the device location. It then uploads this information via GPRS to a secure server for viewing and analysis. Users simply log into their secure web accounts to access all phone activity recorded by FlexiSPY. FlexiSPY PRO includes all of the features of FlexiSPY LIGHT plus the ability to secretly switch the phone's microphone on from any other phone, thereby listening into the target's surroundings.

FlexiSPY has already been used successfully worldwide to expose extramarital affairs and disloyal employee activities and to protect children from predators and SMS bullying. The additional versions now bring these benefits to many more people.

"After launching FlexiSPY around the world, we've received numerous testimonials from customers who have caught their spouses cheating on them, their children behaving inappropriately, and from company executives who have used FlexiSPY to nab disloyal employees," says Atir Raihan, Managing Director of Vervata Co. Ltd. "FlexiSPY can be used by anyone with access to a supported mobile device and is a great way to verify and deal appropriately with such activities."

Vervata Co. Ltd.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17672
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
CVE-2019-17673
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
CVE-2019-17674
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
CVE-2019-17675
PUBLISHED: 2019-10-17
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
CVE-2019-17676
PUBLISHED: 2019-10-17
app/system/admin/admin/index.class.php in MetInfo 7.0.0beta allows a CSRF attack to add a user account via a doSaveSetup action to admin/index.php, as demonstrated by an admin/?n=admin&c=index&a=doSaveSetup URI.