Tag: phone
-
Hardening browser security with zero-trust controls
Tags: access, api, authentication, automation, browser, chrome, cisa, cloud, compliance, container, control, corporate, credentials, crowdstrike, data, data-breach, detection, edr, email, encryption, endpoint, exploit, fido, finance, framework, google, governance, group, Hardware, identity, kubernetes, least-privilege, login, malicious, malware, mfa, microsoft, network, nist, okta, passkey, password, phishing, phone, risk, risk-assessment, sap, service, soar, theft, threat, tool, update, wifi, windows, zero-trust1. Identity-first access control Network proximity is now an inferior trust signal. Only federated, cryptographically verifiable identity tokens issued by centralized enterprise IdPs using OIDC or SAML are permitted as gates to corporate resources. This transition, well-documented by FIDO Alliance and Microsoft research, transfers the very concept of “inside” the organization from the network to…
-
Asus supplier hit by ransomware attack as gang flaunts alleged 1 TB haul
Laptop maker says a vendor breach exposed some phone camera code, but not its own systems First seen on theregister.com Jump to article: www.theregister.com/2025/12/05/asus_supplier_hack/
-
ASUS confirms vendor breach as Everest gang leaks data, claims ArcSoft and Qualcomm
ASUS confirms a third-party breach after Everest leaks sample data. Hackers also claim ArcSoft and Qualcomm. ASUS says a third-party breach exposed data after Everest ransomware leaked samples, claiming they have hacked ASUS, ArcSoft, and Qualcomm. ASUS says a supplier breach exposed some phone camera source code but did not affect products, internal systems, or…
-
A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code
Privacy stalwart Nicholas Merrill spent a decade fighting an FBI surveillance order. Now he wants to sell you phone service”, without knowing almost anything about you. First seen on wired.com Jump to article: www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/
-
India Withdraws Order Mandating Pre-Installation of Sanchar Saathi Cybersecurity App on Smartphones
India has reversed its earlier directive requiring mobile phone manufacturers and importers to pre-install the government-backed Sanchar Saathi application on all new smartphones sold in the country. The Communications Ministry announced on Wednesday that the government had “decided not to make the pre-installation mandatory for mobile manufacturers,” marking a notable shift just 48 hours after the original order was issued. First seen…
-
Samsung reveals its first tri-fold phone and its desktop mode
Tags: phoneBuyers get a one-time discount on screen repairs, which hardly screams ‘we nailed this three-screen thing’ First seen on theregister.com Jump to article: www.theregister.com/2025/12/02/samsung_galaxy_z_trifold/
-
Iran Hackers Take Inspiration From Snake Video Game
MuddyWater Hides Malware With Game Delay Technique. Iranian nation-state hackers took inspiration from a mobile phone time-killing mainstay, say security researchers who spotted hackers downloading malware masquerading as the Snake video game. A callback to the game isn’t nostalgia, say researchers at Eset. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/iran-hackers-take-inspiration-from-snake-video-game-a-30177
-
Iran Hackers Take Inspiration From Snake Video Game
MuddyWater Hides Malware With Game Delay Technique. Iranian nation-state hackers took inspiration from a mobile phone time-killing mainstay, say security researchers who spotted hackers downloading malware masquerading as the Snake video game. A callback to the game isn’t nostalgia, say researchers at Eset. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/iran-hackers-take-inspiration-from-snake-video-game-a-30177
-
Coupang Data Breach Exposes Personal Information of 33.7 Million Customers
South Korean e-commerce giant Coupang has admitted to a significant data breach that exposed the personal information of about 33.7 million customers. This figure is close to the company’s entire user base, making it one of the most significant known data breaches in the country. According to Coupang, the stolen data includes names, phone numbers,…
-
India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
India’s telecommunications ministry has ordered major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days.According to a report from Reuters, the app cannot be deleted or disabled from users’ devices.Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows users…
-
Mandatory ‘Undeletable’ Security App to Be Installed on Every Smartphone in India
In a significant decision that will affect millions of mobile phone users, the Indian government has ordered all smartphone companies to install a specific security app on every new device sold in the country. The Department of Telecommunications (DoT) issued this order on November 28, 2025. The government has told phone makers that they have…
-
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
India’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days.According to a report from Reuters, the app cannot be deleted or disabled from users’ devices.Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows…
-
âš¡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day, code packages, cloud accounts, email, chat, phones, and “trusted” partners, and turn them against us.One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link on a phone,…
-
Japanese beer giant Asahi says ransomware attack may have exposed data of 1.5 million people
The company said the compromised information includes names, gender, addresses and phone numbers, but not credit-card details. First seen on therecord.media Jump to article: therecord.media/asahi-says-ransomware-incident-exposed-data
-
Japanese beer giant Asahi says ransomware attack may have exposed data of 1.5 million people
The company said the compromised information includes names, gender, addresses and phone numbers, but not credit-card details. First seen on therecord.media Jump to article: therecord.media/asahi-says-ransomware-incident-exposed-data
-
Apple’s lousy AI didn’t stop it beating Samsung’s smartphone sales for the first time since 2011
Analyst Counterpoint says second-hand phones are also helping Cupertino to the smartphone shipment summit First seen on theregister.com Jump to article: www.theregister.com/2025/11/27/counterpoint_smartphone_market_predictions/
-
Apple’s lousy AI didn’t stop it beating Samsung’s smartphone sales for the first time since 2011
Analyst Counterpoint says second-hand phones are also helping Cupertino to the smartphone shipment summit First seen on theregister.com Jump to article: www.theregister.com/2025/11/27/counterpoint_smartphone_market_predictions/
-
Multiple London councils report disruption amid ongoing cyberattack
Three London councils reported disruption, prompting officials to shut down phone lines and networks and activate emergency plans. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/26/multiple-london-councils-report-disruption-amid-ongoing-cyberattack/
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
Bug in jury systems used by several US states exposed sensitive personal data
An easy-to-exploit vulnerability in a jury system made by Tyler Technologies exposed the personally identifiable data of jurors, including names, home addresses, emails, and phone numbers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/26/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data/
-
Bug in jury systems used by several US states exposed sensitive personal data
An easy-to-exploit vulnerability in a jury system made by Tyler Technologies exposed the personally identifiable data of jurors, including names, home addresses, emails, and phone numbers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/26/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data/
-
Bug in jury systems used by several US states exposed sensitive personal data
An easy-to-exploit vulnerability in a jury system made by Tyler Technologies exposed the personally identifiable data of jurors, including names, home addresses, emails, and phone numbers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/26/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data/
-
London councils enact emergency plans after three hit by cyber-attack
Royal Borough of Kensington and Westminster city council investigate whether data has been compromised as Hammersmith and Fulham reports hack to the ICOThree London councils have reported a cyber-attack, sparking the roll out of emergency plans as they investigate whether any data has been compromised.The Royal Borough of Kensington and Chelsea, and Westminster city council,…
-
Two London councils enact emergency plans after being hit by cyber-attack
Royal Borough of Kensington and Chelsea and Westminster city council investigate whether data has been compromisedAt least two London councils have been hit by a cyber-attack and have invoked emergency plans as they investigate whether any data has been compromised.The Royal Borough of Kensington and Chelsea and Westminster City council, which share some IT infrastructure,…
-
London councils probe cyber incident as shared IT systems knocked offline
Three boroughs confirm investigation amid service outages, disrupted phone lines, and limited online access First seen on theregister.com Jump to article: www.theregister.com/2025/11/26/cyberattack_london_councils/
-
Harvard reports vishing breach exposing alumni and donor contact data
Harvard revealed its Alumni Affairs systems suffered a vishing breach, exposing emails, phone numbers, addresses, donation data and biographical info. Harvard revealed that threat actors breached its Alumni Affairs and Development systems through a vishing attack, exposing contact, donation, and biographical data of students, staff, alumni. Harvard says the breached systems held no Social Security…

