Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Angelsence, a supportive technology company that provides position monitoring devices for people with disabilities, has learned TechCrunch on the open internet to identify personally and its users specific location.
The company’s exposed server secured the exposed server on Monday more than a week after the researchers at the security agency Ambgard alert data leaks.
AngelSense laps shared the exclusive details of the exclusive with the exclusive of UPigard exposure after solving the laps. Have upgard Since a blog post published In the incident.
New Jersey-based Angels GPS Tracker and Location Observation to thousands of customers, In the list of mobile applicationsAnd it has been characterized by law enforcement and police departments across the United States.
According to Angelsence researchers, Angelsence kept an internal database published on the Internet without any password, allowing someone to access data inside by using knowledge about the public IP address of a web browser and database. The database was preserving the real-time updated logs from an angels system, which included the personal information of Angels customers, as well as technical logs about the agency systems.
Upsgard says it has received the personal data of customers such as name, postal address and phone number in the open database. Researchers said that they also found GPS coordinates with related health information about the person tracking individuals, which include conditions such as autism and dementia. Researchers found email addresses, passwords and authentication tokens for access to customer accounts, as well as partial credit card information – all of them were visible on the platext, Upigord said.
It is not known how long the database was opened or how many customers were affected. According to the list of databases related to internet-facing devices and systems, the open logging database of AngelSense was first spotted online on January 14, though it could be published some time ago.
AngelSense Chief Executive Doron Sommer confirmed to TechCrunch that the company took the open server offline after the first email of the AppGard was initially detected as spam.
Somar said, “The problem was raised when Upsgard called us,” said Somar. “After the invention of it, we worked instantly to legitimize the information we provided and remedy the weakness.”
“We note that without the UPGARD, we do not have any information that any data on the logging system has been possible is possible. Likewise, we have no evidence or indication that data has been abused or is under threat of abuse, “Sommer told TechCrunch that data” was not personal information. ”
Sommer does not say whether there is a technical way to determine if there was any access to the protected server before the invention of the Upsgard.
When asked if the company had planned to inform the affected customers and those who had been published, Sommer said the company was still investigating.
Sommer said, “If a notice is given to the regulators or persons, we must supply it.”
Sommer does not respond to the follow-up investigation by press time.
Database exposure results in the wrong configuration of the wrong configuration due to human errors, without the intention of polluted, and has become increasingly common in recent years. As a result of lapses similar to exposed databases Spiers of sensitive US military emailsReal-time leaked to text messages Contains two-factor codeAnd Chat History from AI ChatbotsThe