Tag: phone
-
Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security
President Donald Trump signed a $901 billion Pentagon policy bill that features a slew of cyber provisions, including a requirement that senior Defense Department officials use phones with “enhanced cybersecurity protections.” First seen on therecord.media Jump to article: therecord.media/trump-signs-ndaa-cyber-command
-
Raspberry Pi used in attempt to take over ferry
Tags: ceo, control, dns, Hardware, infrastructure, intelligence, malware, monitoring, network, phoneProceed with caution: Villanustre encouraged anyone discovering such a device to proceed cautiously. “Disconnecting the device could result in losing important forensic information if not careful. It’s not too hard to equip the device with a tiny battery or supercapacitor that would give it enough time to wipe itself out if disconnected from the network or…
-
The Raspberry Pi wakeup call: Why enterprises must rethink physical security
Tags: ceo, control, dns, Hardware, infrastructure, intelligence, malware, monitoring, network, phoneProceed with caution: Villanustre encouraged anyone discovering such a device to proceed cautiously. “Disconnecting the device could result in losing important forensic information if not careful. It’s not too hard to equip the device with a tiny battery or supercapacitor that would give it enough time to wipe itself out if disconnected from the network or…
-
The Raspberry Pi wakeup call: Why enterprises must rethink physical security
Tags: ceo, control, dns, Hardware, infrastructure, intelligence, malware, monitoring, network, phoneProceed with caution: Villanustre encouraged anyone discovering such a device to proceed cautiously. “Disconnecting the device could result in losing important forensic information if not careful. It’s not too hard to equip the device with a tiny battery or supercapacitor that would give it enough time to wipe itself out if disconnected from the network or…
-
‘Cellik’ Android RAT Leverages Google Play Store
The remote access Trojan lets an attacker remotely control a victim’s phone and can generate malicious apps from inside the Play Store. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/cellik-android-rat-leverages-google-play-store
-
New spyware discovered on Belarusian journalist’s phone after interrogation
Researchers at the nonprofit Reporters Without Borders discovered a previously unknown spyware tool on the phone of a Belarusian journalist who had been detained by security services. First seen on therecord.media Jump to article: therecord.media/spyware-belarus-journalist-rsf
-
NDSS 2025 Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report
Session 6A: LLM Privacy and Usable Privacy Authors, Creators & Presenters: Xiaoyuan Wu (Carnegie Mellon University), Lydia Hu (Carnegie Mellon University), Eric Zeng (Carnegie Mellon University), Hana Habib (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University) PAPER Transparency or Information Overload? Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report Apple’s App Privacy…
-
NDSS 2025 Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report
Session 6A: LLM Privacy and Usable Privacy Authors, Creators & Presenters: Xiaoyuan Wu (Carnegie Mellon University), Lydia Hu (Carnegie Mellon University), Eric Zeng (Carnegie Mellon University), Hana Habib (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University) PAPER Transparency or Information Overload? Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report Apple’s App Privacy…
-
Man jailed for teaching criminals how to use malware
A 49-year-old man has received a five-and-a-half year jail sentence after admitting to creating detailed video tutorials that showed members of a criminal gang how to infect Android phones with spyware and drain their bank accounts. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/man-jailed-for-teaching-criminals-how-to-use-malware
-
Security flaws in Freedom Chat app exposed users’ phone numbers and PINs
The founder of Freedom Chat said the company has reset user PINs and released a new version to app stores. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/11/security-flaws-in-freedom-chat-app-exposed-users-phone-numbers-and-pins/
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
Coupang CEO Resigns Following Major Data Breach Exposing 34 Million Customers
South Korea’s largest online retailer, Coupang, has been rocked by a massive data breach that exposed the personal details of nearly 34 million customers, forcing CEO Park Dae-jun to resign amid mounting scrutiny from regulators and the public. The breach, one of the most severe in South Korea’s history, reportedly included names, email addresses, phone…
-
Rise in Device-Driven Cybercrime and Expanding Ransomware Threats Put India on Alert
Recent data released by the National Crime Records Bureau (NCRB) paints a troubling picture of the rapid rise in cybercrime in India, particularly cases executed through mobile phones and computers. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cybercrime-in-india-ncrb-report-2023-2025/
-
Defense bill addresses secure phones, AI training, cyber troop mental health
The compromise legislation has other cyber provisions besides on commercial spyware, joint NSA-Cyber Command leadership and streamlining regulations. First seen on cyberscoop.com Jump to article: cyberscoop.com/2026-ndaa-cybersecurity-secure-phones-ai-training-cyber-troop-mental-health/
-
Hardening browser security with zero-trust controls
Tags: access, api, authentication, automation, browser, chrome, cisa, cloud, compliance, container, control, corporate, credentials, crowdstrike, data, data-breach, detection, edr, email, encryption, endpoint, exploit, fido, finance, framework, google, governance, group, Hardware, identity, kubernetes, least-privilege, login, malicious, malware, mfa, microsoft, network, nist, okta, passkey, password, phishing, phone, risk, risk-assessment, sap, service, soar, theft, threat, tool, update, wifi, windows, zero-trust1. Identity-first access control Network proximity is now an inferior trust signal. Only federated, cryptographically verifiable identity tokens issued by centralized enterprise IdPs using OIDC or SAML are permitted as gates to corporate resources. This transition, well-documented by FIDO Alliance and Microsoft research, transfers the very concept of “inside” the organization from the network to…
-
Asus supplier hit by ransomware attack as gang flaunts alleged 1 TB haul
Laptop maker says a vendor breach exposed some phone camera code, but not its own systems First seen on theregister.com Jump to article: www.theregister.com/2025/12/05/asus_supplier_hack/
-
ASUS confirms vendor breach as Everest gang leaks data, claims ArcSoft and Qualcomm
ASUS confirms a third-party breach after Everest leaks sample data. Hackers also claim ArcSoft and Qualcomm. ASUS says a third-party breach exposed data after Everest ransomware leaked samples, claiming they have hacked ASUS, ArcSoft, and Qualcomm. ASUS says a supplier breach exposed some phone camera source code but did not affect products, internal systems, or…
-
A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code
Privacy stalwart Nicholas Merrill spent a decade fighting an FBI surveillance order. Now he wants to sell you phone service”, without knowing almost anything about you. First seen on wired.com Jump to article: www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/
-
India Withdraws Order Mandating Pre-Installation of Sanchar Saathi Cybersecurity App on Smartphones
India has reversed its earlier directive requiring mobile phone manufacturers and importers to pre-install the government-backed Sanchar Saathi application on all new smartphones sold in the country. The Communications Ministry announced on Wednesday that the government had “decided not to make the pre-installation mandatory for mobile manufacturers,” marking a notable shift just 48 hours after the original order was issued. First seen…
-
Samsung reveals its first tri-fold phone and its desktop mode
Tags: phoneBuyers get a one-time discount on screen repairs, which hardly screams ‘we nailed this three-screen thing’ First seen on theregister.com Jump to article: www.theregister.com/2025/12/02/samsung_galaxy_z_trifold/
-
Iran Hackers Take Inspiration From Snake Video Game
MuddyWater Hides Malware With Game Delay Technique. Iranian nation-state hackers took inspiration from a mobile phone time-killing mainstay, say security researchers who spotted hackers downloading malware masquerading as the Snake video game. A callback to the game isn’t nostalgia, say researchers at Eset. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/iran-hackers-take-inspiration-from-snake-video-game-a-30177
-
Iran Hackers Take Inspiration From Snake Video Game
MuddyWater Hides Malware With Game Delay Technique. Iranian nation-state hackers took inspiration from a mobile phone time-killing mainstay, say security researchers who spotted hackers downloading malware masquerading as the Snake video game. A callback to the game isn’t nostalgia, say researchers at Eset. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/iran-hackers-take-inspiration-from-snake-video-game-a-30177
-
India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
India’s telecommunications ministry has ordered major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days.According to a report from Reuters, the app cannot be deleted or disabled from users’ devices.Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows users…
-
Coupang Data Breach Exposes Personal Information of 33.7 Million Customers
South Korean e-commerce giant Coupang has admitted to a significant data breach that exposed the personal information of about 33.7 million customers. This figure is close to the company’s entire user base, making it one of the most significant known data breaches in the country. According to Coupang, the stolen data includes names, phone numbers,…
-
Mandatory ‘Undeletable’ Security App to Be Installed on Every Smartphone in India
In a significant decision that will affect millions of mobile phone users, the Indian government has ordered all smartphone companies to install a specific security app on every new device sold in the country. The Department of Telecommunications (DoT) issued this order on November 28, 2025. The government has told phone makers that they have…
-
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
India’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days.According to a report from Reuters, the app cannot be deleted or disabled from users’ devices.Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows…

