Tag: phone
-
ICE Rolls Facial Recognition Tools Out to Officers’ Phones
Plus: US feds charge alleged masterminds behind infamous forum, Scattered Spider targets airlines, and hackers open a valve at a Norwegian dam. First seen on wired.com Jump to article: www.wired.com/story/ice-rolls-facial-recognition-tools-out-to-officers-phones/
-
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service.According to TechCrunch, which first reported the feature, users are being served a new pop-up message…
-
Sky ECC distributor released from French custody pending trial
Tags: phoneCanadian businessman accused of distributing Sky ECC encrypted phones has been released on bail after over four years in custody without a trial First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626653/Sky-ECC-distributor-released-from-French-custody-pending-trial
-
Bank of America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands like Apple, Bank of America, Facebook, HP, Microsoft, Netflix, and PayPal. This sophisticated attack, technically termed a >>search parameter injection attack,
-
OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as it exposes sensitive data through a weakly secured WiFi hotspot. The flaw, cataloged as CVE-2025-27387, has been rated as high severity and was published in the National Vulnerability Database and GitHub Advisory Database within the…
-
Canada says telcos were breached in China-linked espionage hacks
Salt Typhoon previously hacked phone and telco giants across the United States. First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/23/canada-says-telcos-were-breached-in-china-linked-espionage-hacks/
-
Police to gain powers to grab online data when they seize phones and laptops
Academics and civil liberties experts say that proposed ‘authoritarian’ powers to allow police to trawl online and cloud services used by owners of seized devices should require approval from a judge First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626070/Police-to-gain-powers-to-grab-online-data-when-they-seize-phones-and-laptops
-
Thousands of UK government laptops, phones and tablets have been lost or stolen
Exclusive: ‘Systemic risk’ to cybersecurity after devices worth more than £1m a year are taken or lostThousands of UK government laptops, phones and tablets worth more than £1m have been either lost or stolen, freedom of information disclosures have revealed, triggering warnings of a “systemic risk” to the nation’s cybersecurity.The Department for Work and Pensions…
-
Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
Threat actors are increasingly exploiting the trust users place in sponsored search results on platforms like Google to orchestrate sophisticated scams. These malicious entities craft deceptive advertisements that mimic legitimate websites, particularly targeting popular brands and tech support services. By leveraging the visibility of paid ads, which often appear at the top of search results,…
-
European consumers are mostly saying ‘non’ to trading in their old phones
Tags: phoneAre they using it to death then locking it in a drawer? Schemes needed as shipments of refurbed kit dips First seen on theregister.com Jump to article: www.theregister.com/2025/06/18/used_phones_europe/
-
Scammers Insert Fake Support Numbers on Real Apple, Netflix, PayPal Pages
Cybercriminals are injecting fake support phone numbers onto official sites like Bank of America and Netflix. Learn how ‘search parameter injection’ scams work and protect yourself now. First seen on hackread.com Jump to article: hackread.com/scammers-fake-support-numbers-real-apple-netflix-paypal/
-
Foreign aircraft, domestic risks
Tags: access, attack, authentication, best-practice, blueteam, breach, computer, control, cyber, cybersecurity, data, defense, detection, encryption, firmware, framework, government, Hardware, injection, leak, malicious, malware, monitoring, network, nist, phone, risk, software, supply-chain, technology, threat, update, vulnerabilityCondensed threat matrix Legacy protocols create new attack surfaces : One of the banes of the OT world is the reliance on legacy technology that cannot easily be patched or upgraded without causing major disruptions. Similarly, the Boeing 747-8 employs a hybrid bus architecture. While it integrates modern flight management technologies like the Thales TopFlight Flight…
-
Out of Juice? TSA Says Don’t Plug Into Airport USB Ports
Tags: phonePhone low on charge at the airport? Don’t be tempted to use a public USB to recharge, according to the TSA – beware of “juice-jacking.” First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/out-of-juice-tsa-says-dont-plug-into-airport-usb-ports/
-
Indian Car-Sharing Firm Zoomcar Latest to Suffer Breach
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/indian-car-sharing-firm-zoomcar-breach
-
GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
A former intern at the UK’s intelligence agency GCHQ has been sentenced to seven and a half years in prison after admitting to smuggling top secret data out of a secure facility using his mobile phone, in a breach described by prosecutors as a “flagrant violation” of national security protocols. Hasaan Arshad, 25, a computer…
-
Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
The personal data includes customer names, phone numbers, and car registration numbers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/16/car-sharing-giant-zoomcar-says-hacker-accessed-personal-data-of-8-4-million-users/
-
‘We’re being attacked all the time’: how UK banks stop hackers
Devastating attacks at M&S, the Co-op and Harrods highlight risks as lenders say cybersecurity is biggest expenseIt is every bank boss’s worst nightmare: a panicked phone call informs them a cyber-attack has crippled the IT system, rapidly unleashing chaos across the entire UK financial industry.As household names in other industries, including Marks & Spencer, grapple…
-
RFK Jr. Orders HHS to Give Undocumented Migrants’ Medicaid Data to DHS
Plus: Spyware is found on two Italian journalists’ phones, Ukraine claims to have hacked a Russian aircraft maker, police take down major infostealer infrastructure, and more. First seen on wired.com Jump to article: www.wired.com/story/rfk-jr-orders-hhs-to-give-undocumented-migrants-medicaid-data-to-dhs/
-
Paragon Graphite Spyware used a zero-day exploit to hack at least two journalists’ iPhones
Security researchers at Citizen Lab revealed that Paragon’s Graphite spyware can hack fully updated iPhones via zero-click attacks. Citizen Lab has confirmed that Paragon’s Graphite spyware was used to hack fully updated iPhones, targeting at least two journalists in Europe. The group found forensic evidence showing the phones had communicated with the same spyware server.…
-
Google Bug Allowed Brute-Forcing of Any User Phone Number
The weakness in Google’s password-recovery page, discovered by a researcher called Brutecat, exposed private user contact information to attackers, opening the door to phishing, SIM-swapping, and other attacks. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/google-bug-brute-forcing-phone-number
-
A flaw could allow recovery of the phone number associated with any Google account
A vulnerability could allow recovery of the phone number associated with a Google account by carrying out a brute force attack. The security researcher who goes online with the moniker >>brutecat
-
Google vulnerability leaking phone numbers remediated
First seen on scworld.com Jump to article: www.scworld.com/brief/google-vulnerability-leaking-phone-numbers-remediated
-
5 plead guilty to laundering nearly $37 million stolen through Cambodian cyber scam centers
The scheme is based in Cambodia, where people residing in scam centers contact U.S. victims through phone calls, texts, dating apps and other avenues to promote fake cryptocurrency investments. First seen on therecord.media Jump to article: therecord.media/guilty-pleas-cambodia-cyber-scams
-
Cloud brute-force attack cracks Google users’ phone numbers in minutes
Chocolate Factory fixes issue, pays only $5K First seen on theregister.com Jump to article: www.theregister.com/2025/06/10/google_brute_force_phone_number/
-
Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
Google has stepped in to address a security flaw that could have made it possible to brute-force an account’s recovery phone number, potentially exposing them to privacy and security risks.The issue, according to Singaporean security researcher “brutecat,” leverages an issue in the company’s account recovery feature.That said, exploiting the vulnerability hinges on several moving parts,…
-
Google Vulnerability Allowed Hackers to Access User Phone Numbers
A security researcher has disclosed a critical vulnerability in Google’s account recovery system that allowed attackers to brute-force and obtain the phone numbers of any Google user. The vulnerability , discovered in 2025, exploited Google’s username recovery form that continued to function without JavaScript, bypassing modern security protections and enabling systematic phone number enumeration attacks.…
-
Spyware maker cuts ties with Italy after government refused audit into hack of journalist’s phone
Israel-based spyware maker Paragon and Italy’s government had a falling out over the company’s offer to help investigate what happened on journalist Francesco Cancellato’s phone. First seen on therecord.media Jump to article: therecord.media/paragon-spyware-maker-cuts-ties-italy-government
-
Google patched bug leaking phone numbers tied to accounts
A vulnerability allowed researchers to brute-force any Google account’s recovery phone number simply by knowing a their profile name and an easily retrieved partial phone number, creating a massive risk for phishing and SIM-swapping attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-patched-bug-leaking-phone-numbers-tied-to-accounts/

