Tag: phone
-
Sorry, Amazon, you couldn’t pick a worse time to bring a phone to market: IDC analyst
Tags: phoneThe market is contracting First seen on theregister.com Jump to article: www.theregister.com/2026/03/20/amazon_phone_worst_possible_time/
-
Sorry, Amazon, you couldn’t pick a worse time to bring a phone to market: IDC analyst
Tags: phoneThe market is contracting First seen on theregister.com Jump to article: www.theregister.com/2026/03/20/amazon_phone_worst_possible_time/
-
Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck
Plus: The FBI admits it’s buying phone data to track Americans, Iranian hackers disrupt medical care at Maryland hospitals, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-cyberattack-on-a-car-breathalyzer-firm-leaves-drivers-stuck/
-
TDL 018 – How To Think, Not What To Think – Mitch Prior
Tags: access, ai, apple, attack, backup, blockchain, business, cctv, china, ciso, cloud, computer, conference, control, credentials, cvss, cyber, cybersecurity, data, defense, detection, exploit, finance, firmware, google, infrastructure, intelligence, Internet, iot, jobs, law, mail, malware, military, network, phone, privacy, resilience, risk, router, software, strategy, switch, technology, threat, tool, vulnerability, wifi, zero-trustThe Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in 2018″, the early days of Zero Trust”, the duo explores why the “why” behind technical…
-
CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices
The U.S. cybersecurity agency urged companies to prevent access to systems used for remotely managing their fleets of employee devices after hackers broke into a major U.S. medical tech giant and remotely wiped thousands of phones and computers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/19/cisa-urges-companies-to-secure-microsoft-intune-systems-after-hackers-mass-wipe-stryker-devices/
-
Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web
Customer conversations with chatbots can include contact information and personal details that make it easier for scammers to launch phishing attacks and commit fraud. First seen on wired.com Jump to article: www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/
-
Glassworm Malware Infects Popular React Native npm Packages
Tags: attack, country, credentials, cyber, international, malicious, malware, phone, supply-chain, windowsA new Glassworm-linked supply chain attack has briefly turned two popular React Native npm packages into delivery vehicles for Windows credential-stealing malware. On March 16, 2026, malicious versions of AstrOOnauta’s react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8 were published to npm, each embedding an identical staged loader that executes during a routine npm install. Together, these packages account for…
-
Glassworm Malware Infects Popular React Native npm Packages
Tags: attack, country, credentials, cyber, international, malicious, malware, phone, supply-chain, windowsA new Glassworm-linked supply chain attack has briefly turned two popular React Native npm packages into delivery vehicles for Windows credential-stealing malware. On March 16, 2026, malicious versions of AstrOOnauta’s react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8 were published to npm, each embedding an identical staged loader that executes during a routine npm install. Together, these packages account for…
-
Revealed: How HMRC has been quietly building surveillance capabilities
HMRC has bought phone scanning equipment and analysis software capable of extracting data from mobile devices as it steps up its electronic intelligence gathering capabilities, an investigation by Computer Weekly reveals First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639490/Revealed-How-HMRC-has-been-quietly-building-surveillance-capabilities
-
Revealed: How HMRC has been quietly building surveillance capabilities
HMRC has bought phone scanning equipment and analysis software capable of extracting data from mobile devices as it steps up its electronic intelligence gathering capabilities, an investigation by Computer Weekly reveals First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639490/Revealed-How-HMRC-has-been-quietly-building-surveillance-capabilities
-
875 Million Android Phones Face Risk Due to Hidden Chip Flaw
A MediaTek chip flaw could put up to 875 million Android phones at risk, exposing how a locked device can still be vulnerable below the surface. The post 875 Million Android Phones Face Risk Due to Hidden Chip Flaw appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-android-chip-flaw-875m/
-
Fake rooms, props and a script to lure victims: inside an abandoned Cambodia scam centre
Sprawling compound, including mock-up banks and police offices, uncovered by Thai military during border clashesIt is as if you have walked into a branch of one of Vietnam’s banks. A row of customer service desks, divided by plastic screens, with landline phones, promotional leaflets and staff business cards. A seated waiting area and a private…
-
New Critical MediaTek Vulnerability Exposes Android Phone PINs to Theft in 45 seconds
A newly discovered hardware vulnerability in the MediaTek Dimensity 7300 chipset is putting millions of Android users at risk. By exploiting this flaw, physical attackers can bypass security layers to steal device PINs, decrypt storage, and extract cryptocurrency seed phrases in just 45 seconds. The vulnerability affects roughly 25% of the global Android market, causing…
-
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Tags: access, attack, authentication, best-practice, ceo, computer, credentials, cyber, cyberattack, data, flaw, group, hacker, identity, infrastructure, intelligence, iran, jobs, mobile, phone, service, software, supply-chain, theft, threat, updateHandala claims credit: The Handala threat group quickly claimed responsibility for the attack. While the group’s involvement is just a claim for now, Stryker employees reportedly saw a version of the Handala logo a cartoon of a Palestinian boy with his back turned and hands crossed behind him on affected devices.Handala’s identity is hard to…
-
Police Scotland Fined After Sharing Victim’s Phone Data
The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/police-scotland-fined-sharing/
-
Vulnerability in MediaTek Chips Could Impact 25% Android Smartphones
Security researchers have identified a serious Android phone vulnerability that could affect the global smartphone ecosystem. The flaw, discovered by the security research team at Ledger, may expose sensitive information from millions of Android smartphones powered by certain Android chipsets. According to researchers, the issue could potentially impact devices representing roughly 25% of Android phones…
-
Vulnerability in MediaTek Chips Could Impact 25% Android Smartphones
Security researchers have identified a serious Android phone vulnerability that could affect the global smartphone ecosystem. The flaw, discovered by the security research team at Ledger, may expose sensitive information from millions of Android smartphones powered by certain Android chipsets. According to researchers, the issue could potentially impact devices representing roughly 25% of Android phones…
-
Microsoft Authenticator to nuke Entra creds on rooted and jailbroken phones
Warning, lockout, then wipe if your device trips detection First seen on theregister.com Jump to article: www.theregister.com/2026/03/10/microsoft_authenticator_checks/
-
Met Police to ‘trial’ handheld facial recognition tech
Tags: phoneLondon Mayor Sadiq Khan reveals in a scrutiny session with London Assembly members that the Met is set to trial a facial recognition phone app for police officers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639898/Met-police-to-trial-handheld-facial-recognition-tech
-
Met Police to ‘trial’ handheld facial-recognition tech
Tags: phoneLondon Mayor Sadiq Khan reveals in a scrutiny session with London Assembly members that the Met is set to trial a facial-recognition phone app for officers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639898/Met-police-to-trial-handheld-facial-recognition-tech
-
Ericsson blames vendor vishing slip-up for breach exposing thousands of records
Crooks used simple phone scam to compromise vendor account, spilling personal and financial data belonging to more than 15,000 people First seen on theregister.com Jump to article: www.theregister.com/2026/03/10/ericsson_blames_vendor_vishing_slipup/
-
Salt Typhoon is hacking the world’s phone and internet giants, here’s everywhere that’s been hit
Salt Typhoon is by far one of the most prolific hacking groups in recent years, breaching some of the top American phone companies. Here are all the countries that have been targeted. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/salt-typhoon-china-who-has-been-hacked-global-telecom-giants/
-
Salt Typhoon is hacking the world’s phone and internet giants. Here’s everywhere that’s been hit.
Salt Typhoon is by far one of the most prolific hacking groups in recent years, breaching some of the top American phone companies. Here are all the countries that have been targeted. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/salt-typhoon-china-who-has-been-hacked-global-telecom-giants/
-
Product Showcase: Fing Desktop puts network visibility on your screen
Phones, laptops, smart TVs, cameras, and smart home equipment all use the same network. Knowing what’s connected helps users manage performance and security. Fing Desktop … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/product-showcase-fing-desktop-network-monitoring/
-
CBP Used Online Ad Data to Track Phone Locations
Plus: Proton helped the FBI identify a protester, the Leakbase cybercrime forum was busted in an international operation, and more. First seen on wired.com Jump to article: www.wired.com/story/cbp-used-online-ad-data-to-track-phone-locations/
-
New Jersey county says malware attack took down phone lines, IT systems
Passaic County, home to nearly 600,000 people in Northern New Jersey, published a statement on Wednesday evening warning residents that it is aware of a “malware attack” affecting county IT systems and phone lines. First seen on therecord.media Jump to article: therecord.media/new-jersey-county-says-malware-attack-took-down-phones
-
Police do not have to explain to lawyer Fahad Ansari why they seized his phone data, says court
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639704/Police-do-not-have-to-explain-to-lawyer-Fahad-Ansari-why-they-seized-his-phone-data-says-court
-
Zero-day in Android phone chips under active attack
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639578/Zero-day-in-Android-phone-chips-under-active-attack
-
Shadow AI vs Managed AI: What’s the Difference? FireTail Blog
Tags: access, ai, api, attack, breach, chatgpt, ciso, cloud, computer, control, credentials, credit-card, data, data-breach, framework, google, injection, intelligence, Internet, law, LLM, malicious, mitre, monitoring, network, password, phishing, phone, risk, software, switch, threat, tool, training, vulnerabilityMar 04, 2026 – – Quick Facts: Shadow AI vs. Managed AIShadow AI is a visibility gap: It refers to any AI tool used by employees that the IT department doesn’t know about. Most companies have 10x more AI tools in use than they realize.Managed AI is a “Paved Path”: It uses approved, secure versions…
-
Motorola partners with GrapheneOS for future phones
Don’t expect to see compatible hardware before 2027 First seen on theregister.com Jump to article: www.theregister.com/2026/03/02/motorola_grapheneos/

