Tag: mobile
-
French Mobile Operators Join Forces to Tackle Rising Fraud
France’s four leading mobile operators, Bouygues, Free, Orange and SFR, have taken steps to combat mobile fraud as part of the GSMA Open Gateway initiative First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/france-mno-tackle-rising-fraud/
-
Cyberangriff auf einen Mobile Device Management-Anbieter, viele Schulen weltweit betroffen
First seen on mobileguardian.com Jump to article: www.mobileguardian.com/security-incident-august-2024/
-
In The Box – Mobile Malware Webinjects Marketplace
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace
-
Cybercriminals Evolve Antidetect Tooling for Mobile OS-Based Fraud
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/cybercriminals-evolve-antidetect-tooling-for-mobile-os-based-fraud
-
Erkenntnisse von T-Mobile (USA) über (chinesische) Hackerangriffe auf das Netz
In den USA wurden ja Netzwerke von Mobilfunk- und Internetprovidern durch mutmaßlich chinesische Hacker (möglicherweise über Monate) infiltriert. T-Mobile USA hat jetzt Erkenntnisse vorgelegt, wie die Angreifer auf die eigene Infrastruktur zugreifen wollten, aber abgewiesen werden konnten. Ich hatte es … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/11/30/erkenntnisse-von-t-mobile-usa-ueber-chinesische-hackerangriffe-auf-das-netz/
-
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed.These intrusion attempts “originated from a wireline provider’s network that was connected to ours,” Jeff Simon, chief security officer at T-Mobile, said in a statement. “We see…
-
T-Mobile rebuffed breach attempts by hackers likely connected to China’s Salt Typhoon
First seen on therecord.media Jump to article: therecord.media/tmobile-salt-typhoon-hacking-china
-
T-Mobile says telco hackers had ‘no access’ to customer call and text message logs
The phone giant said hackers did not access the contents or logs of customer phone calls or text messages, during an industry-wide attack on phone and internet companies. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/27/t-mobile-says-telco-hackers-had-no-access-to-customer-call-and-text-message-logs/
-
Mobile Threat Defense: Safeguarding Your Data on the Go
First seen on scworld.com Jump to article: www.scworld.com/native/mobile-threat-defense-safeguarding-your-data-on-the-go
-
T-Mobile Says Sensitive Customer Data Wasn’t Impacted In China-Linked Attack
T-Mobile CISO Jeff Simon said a post Wednesday that ‘our defenses protected our sensitive customer information,’ in the wake of reports about a major hacking operation by a China-linked threat actor targeting internet service providers. First seen on crn.com Jump to article: www.crn.com/news/security/2024/t-mobile-says-sensitive-customer-data-wasn-t-impacted-in-china-linked-attack
-
Chinese hackers breached T-Mobile’s routers to scope out network
T-Mobile says the Chinese “Salt Typhoon” hackers who recently compromised its systems as part of a series of telecom breaches first hacked into some of its routers to explore ways to navigate laterally through the network. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-breached-t-mobiles-routers-to-scope-out-network/
-
Mobile security policy missing at most SMEs, CyberSmart survey finds
New research conducted by CyberSmart, provider of SME security solutions indicates that organisations not only allow employees to use their personal mobile phones to compete work tasks but actively expect them to. The research, conducted by OnePoll in Autumn 2024, polled 250 small-medium enterprise (SME) business owners or leaders in the UK, found that 60%…
-
Zscaler beleuchtet Trends, Risiken und Zero-Trust-Defense-Strategien für Mobile, IoT- und OT-Cybersecurity
Zscaler veröffentlicht seinen jährlichen mit dem Überblick über die mobile und IoT-/OT-Cyberbedrohungslandschaft von Juni 2023 bis Mai 2024. Die Ergebnisse des Reports unterstreichen die Dringlichkeit für Organisationen, die Sicherheit von mobilen Geräten, IoT- und OT-Systemen neu zu bewerten. ThreatLabz identifizierte mehr als 200 bösartige Apps im […] First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/11/26/zscaler-beleuchtet-trends-risiken-und-zero-trust-defense-strategien-fuer-mobile-iot-und-ot-cybersecurity/
-
Why New York is a Prime Location for Leading Mobile Development Agencies
Tags: mobileNew York, the city that never sleeps, is renowned as a global epicentre for innovation, creativity, and business… First seen on hackread.com Jump to article: hackread.com/new-york-prime-location-mobile-development-agencies/
-
Privacy-focused mobile phone launches for high-risk individuals
The mobile company Cape’s Android-based phone complies with U.S. law but claims to offer a higher degree of privacy for users. First seen on cyberscoop.com Jump to article: cyberscoop.com/cape-phone-privacy-calea-tracking/
-
>>Ghost Tap<< Emerges: Cybercriminals Exploit NFC Relay for Contactless Cash-Outs
ThreatFabric reveals a new tactic allowing fraudsters to anonymously drain stolen credit cards linked to mobile wallets. A new and concerning trend in financial cybercrime has surfaced, dubbed >>Ghost Tap
-
Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025
This blog shares Zimperium’s 2025 mobile security trends and threat predictions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/zimperium-predicts-data-privacy-emphasis-more-evasive-phishing-attacks-and-rise-of-sideloading-in-2025/
-
New Ghost Tap attack abuses NFC mobile payments to steal money
Cybercriminals have devised a novel method to cash out from stolen credit card details linked to mobile payment systems such as Apple Pay and Google Pay, dubbed ‘Ghost Tap,’ which relays NFC card data to money mules worldwide. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/
-
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale.The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.”Criminals can now misuse…
-
Salt Typhoon Hits T-Mobile as Part of Telecom Attack Spree
The company says no sensitive data was stolen, but federal agencies claim otherwise. CISA and FBI sources said attackers accessed all records of specific customers and the private communications of targeted individuals. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/salt-typhoon-tmobile-telecom-attack-spree
-
T-Mobile Breached in Major Chinese Cyber-Attack on Telecoms
T-Mobile was hit by Salt Typhoon, a Chinese cyber-espionage group targeting US and global telecom firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/tmobile-breached-chinese/
-
The Urgent And Critical Need To Prioritize Mobile Security
Organizations that get serious about mobile risks will reduce business risk and boost trust and confidence in their employees, customers, business partners and investors. The post The Urgent And Critical Need To Prioritize Mobile Security appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/the-urgent-and-critical-need-to-prioritize-mobile-security/
-
Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters
Tags: access, ai, api, attack, authentication, awareness, business, cloud, communications, compliance, control, credentials, crime, data, defense, detection, encryption, exploit, finance, fraud, Hardware, iam, international, mfa, mobile, office, PCI, privacy, regulation, risk, service, software, strategy, technology, threat, vulnerabilityFraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters madhav Tue, 11/19/2024 – 05:28 International Fraud Awareness Week (November 17-23) is a critical time to consider the significant risks that fraud poses to individuals and organizations. Thanks to AI, fraud attempts and successful attacks are alarmingly common and more advanced, with many…
-
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.The adversaries, tracked as Salt Typhoon, breached the company as part of a “monthslong campaign” designed to harvest cellphone communications of “high-value intelligence targets.” It’s not clear what information was…
-
Brave on iOS adds new “Shred” button to wipe site-specific data
Brave Browser 1.71 for iOS introduces a new privacy-focused feature called “Shred,” which allows users to easily delete site-specific mobile browsing data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/brave-on-ios-adds-new-shred-button-to-wipe-site-specific-data/
-
T-Mobile reportedly compromised in sweeping Chinese attack against telcos
First seen on scworld.com Jump to article: www.scworld.com/brief/t-mobile-reportedly-compromised-in-sweeping-chinese-attack-against-telcos

