Tag: phone
-
‘Limited’ data leak at Aussie telco turns out to be 280K customer details
iiNet breach blamed on single stolen login, with emails, phone numbers, and addresses exposed First seen on theregister.com Jump to article: www.theregister.com/2025/08/20/tpg_telecom_iinet_breach/
-
Phone Searches at the US Border Hit a Record High
Tags: phoneCustoms and Border Protection agents searched nearly 15,000 devices from April through June of this year, a nearly 17 percent spike over the previous three-month high in 2022. First seen on wired.com Jump to article: www.wired.com/story/phone-searches-at-the-us-border-hit-a-record-high/
-
Phone Searches at the US Border Hit a Record High
Tags: phoneCustoms and Border Protection agents searched nearly 15,000 devices from April through June of this year, a nearly 17 percent spike over the previous three-month high in 2022. First seen on wired.com Jump to article: www.wired.com/story/phone-searches-at-the-us-border-hit-a-record-high/
-
New zero-day startup offers $20 million for tools that can hack any smartphone
Prices for hacking tools that allow governments to break into mobile phones keep going up, thanks to efforts by tech firms shoring up their cybersecurity. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/20/new-zero-day-startup-offers-20-million-for-tools-that-can-hack-any-smartphone/
-
Millions Allegedly Affected in Allianz Insurance Breach
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/millions-allianz-insurance-breach
-
Australian ISP iiNet Reports Data Breach, Customer Accounts Stolen
Australian ISP iiNet confirms data breach as hackers stole 280,000 email accounts, phone numbers and user data using… First seen on hackread.com Jump to article: hackread.com/australia-isp-iinet-data-breach-customer-accounts-stolen/
-
New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They are mainly targeting mobile payment services such as Apple Pay and Google Pay. This attack vector involves relaying stolen payment card credentials from compromised devices to mules’ burner phones, enabling…
-
McCullough Review into PSNI spying on journalists and lawyers delayed
Angus McCullough KC is to present findings of an independent review of police spying on phone data of lawyers, journalists and NGOs in Northern Ireland in October First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628835/McCullough-Review-into-PSNI-spying-on-journalists-and-lawyers-delayed
-
Ghanaian fraudsters arrested for BEC/Sakawa
In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.” In Ghana, the term for the same activity is “Sakawa.” Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or “Sakawa Chairman Busted” or “Sakawa Kingpin Bows to Extradition!” On 08AUG2025 the US Attorney’s office…
-
Air France, KLM Alert Authorities of Data Breach
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/air-france-klm-data-breach
-
Ransomware Hits Phone Repair Insurance Firm, Causing Millions in Damage
Wilhelm Einhaus, a businessman from Bockum-Hövel, Germany, pioneered cell phone insurance services, establishing a robust network that integrated innovative offerings like a 24-hour repair and replacement program. His enterprise expanded rapidly, partnering with major telecommunications providers such as Deutsche Telekom and 1&1, and distributing products through over 5,000 retail outlets nationwide. At its zenith, the…
-
German phone repair biz collapses following 2023 ransomware attack
Founder miffed over prosecutors holding onto its Bitcoin First seen on theregister.com Jump to article: www.theregister.com/2025/08/04/einhaus_group_ransomware_collapse/
-
Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits
Meta backs Pwn2Own Ireland 2025 in Cork, offering up to $1M for WhatsApp exploits; targets include phones and wearables, Oct 2124 via Zero Day Initiative. Meta is sponsoring ZDI’s Pwn2Own Ireland 2025 hacking competition, where participants can earn big prizes for smartphone, WhatsApp and wearable device exploits. Participants can earn up to $1 million for…
-
Another Telephone Phish
A person called me on the phone a few moments ago claiming to be from US Bank. He said there was some fraud detected on my account: someone created a new checking account with my identity information. “So, you have my identity information?” I asked. “Yes,” he replied. “Can you prove who you say you……
-
Senator warns of new UK surveillance risks to US citizens following Apple ‘back door’ row
US lawmarker raises concerns that UK may have ordered Google to introduce ‘backdoors’ into end-to-end encrypted back-ups impacting billions of Android phone users First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628083/Senator-warns-of-new-UK-surveillance-risks-to-US-citizens-following-Apple-back-door-row
-
New Choicejacking Attack Steals Data from Phones via Public Chargers
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds. First seen on hackread.com Jump to article: hackread.com/choicejacking-attack-steals-data-phones-public-chargers/
-
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Tags: attack, cybercrime, google, group, infrastructure, mandiant, phone, ransomware, software, tactics, vmwareThe notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America.”The group’s core tactics have remained consistent and do not rely on software exploits. Instead, they use a proven playbook centered on phone calls to an IT help desk,” Google’s Mandiant team…
-
The heartbreak of watching a parent fall for fraud: ‘Dad, this is a scam have you given her money?’ | Naima Brown
The scammers my dad encountered were not sophisticated, my father suspended his own disbelief wilfully. But many scammers <em>are</em> sophisticated and they’re getting harder to detectBomba wasn’t the first, but she exploded in our lives like a digital grenade. <em>She’s not real,</em> I told my dad then in his early seventies. I was in Australia…
-
Operation Dark Phone: Murder By Text this jaw-dropping tale of how police hacked gangs is like The Wire
This docu-drama is cleverly built around the messages intercepted by the National Crime Agency when they penetrated a chat network between criminal organisations. It’s hugely revealingPolice work rarely resembles The Shield or Line of Duty. It’s mostly paperwork, online training and referring people to driver offender courses. But sometimes life imitates art. In 2020, international…
-
Google took a month to shut down Catwatchful, a phone spyware operation hosted on its servers
Google has suspended the Firebase account of Catwatchful following a TechCrunch investigation. The spyware operation was caught using Google’s own servers to host and run its surveillance app, which was stealthily monitoring thousands of people’s phones. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/25/google-took-a-month-to-shut-down-catwatchful-a-phone-spyware-operation-hosted-on-its-servers/
-
Fresh allegations of ‘sustained’ police and MI5 surveillance against BBC reporters
The Investigatory Powers Tribunal is investigating claims that police spied on the phone of investigative journalist Chris Moore amid further claims of a sustained monitoring operation against BBC reporters in Northern Ireland between 2006 and 2022 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366627805/Fresh-allegations-of-sustained-police-and-MI5-surveillance-against-BBC-reporters
-
Surveillance Firm Exploits SS7 Flaw to Track User Locations
Tags: attack, cyber, exploit, flaw, infrastructure, intelligence, international, mobile, phone, threat, vulnerabilityA sophisticated surveillance operation has been discovered exploiting critical vulnerabilities in the global telecommunications infrastructure to track mobile phone users’ locations without authorization, security researchers have revealed. The attack leverages weaknesses in the decades-old SS7 (Signaling System No. 7) protocol that underpins international cellular networks. New Attack Method Discovered Security experts at Enea’s Threat Intelligence…
-
A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
The new SS7 bypass-attack tricks phone operators into disclosing a cell subscriber’s location, in some cases down to a few hundred meters. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/18/a-surveillance-vendor-was-caught-exploiting-a-new-ss7-attack-to-track-peoples-phone-locations/
-
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices.The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as Meiya…
-
Chinese authorities are using a new tool to hack seized phones and extract data
Researchers warned that Chinese residents, and visitors to China, should be aware of the tool’s existence and the risks it poses. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/16/chinese-authorities-are-using-a-new-tool-to-hack-seized-phones-and-extract-data/

