Tag: phone
-
Transnational Organized Crime Gang Steals $1 Million from Ontario Couple
Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly. It starts with the headlines. CTVNews: Ontario seniors GIVE AWAY MORE THAN $1 MILLION to scammers.CTVNews: Ontario couple LOSES MORE THAN $1 MILLION DOLLARS to fraud.Toronto Only:…
-
‘Scamming became the new farming’: inside India’s cybercrime villages
How did an obscure district in a neglected state become India’s byword for digital deceit?On the surface, the town of Jamtara appeared no different from neighbouring districts. But, if you knew where to look, there were startling differences. In the middle of spartan villages were houses of imposing size and unusual opulence. Millions of Indians…
-
Old threats, new consequences: 90% of cyber claims stem from email and remote access
Tags: access, ai, attack, awareness, cisco, ciso, citrix, cloud, communications, control, credentials, cve, cyber, cybersecurity, data, defense, detection, email, encryption, finance, fraud, hacker, insurance, mail, malicious, microsoft, network, phishing, phone, ransomware, risk, sophos, tactics, threat, tool, update, vpn, vulnerability2025 InsurSec Rankings Report, email and remote access remain the most prominent cyber threat vectors, accounting for 90% of cyber insurance claims in 2024.And, no surprise, larger companies continue to get hit hardest. But, interestingly, the virtual private networks (VPNs) many rely on are anything but secure, despite assumptions to the contrary.”We know from our…
-
LG Uplus is latest South Korean telco to confirm cybersecurity incident
Korean telecom giant LG Uplus is the third major phone provider in the past six months to report a cybersecurity incident. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/28/lg-uplus-is-latest-south-korean-telco-to-confirm-cybersecurity-incident/
-
MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?
This morning, I tried to power down my Samsung S23 smartphone. Related: Sam Altman seeks to replace the browser I long-pressed the side key expecting the usual “Power off / Restart” menu. Instead, a small Gemini prompt window appeared towards… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/my-take-have-you-noticed-how-your-phones-ai-assistant-is-starting-to-remap-what-you-trust/
-
Patients Sue Florida Hospital Over ‘Humiliating’ Photo Posts
Staff Allegedly Took Photos, Posted Pics on Social Media Without Patient Consent. A Florida hospital is facing several lawsuits filed by patients who alleged staff members used their personal phones to take and post humiliating photos on social medial of the patients without their consent while they were asleep or medicated, and semi-undressed. First seen…
-
CBP Searched a Record Number of Phones at the US Border Over the Past Year
Tags: phoneThe total number of US Customs and Border Protection device searches jumped by 17 percent over the 2024 fiscal year, but more invasive forensic searches remain relatively rare. First seen on wired.com Jump to article: www.wired.com/story/cbp-searched-a-record-number-of-phones-at-the-us-border-over-the-past-year/
-
How evolving regulations are redefining CISO responsibility
Tags: attack, awareness, breach, ciso, communications, compliance, credentials, cyber, cyberattack, cybersecurity, data, data-breach, governance, identity, incident response, intelligence, iot, nis-2, phone, regulation, resilience, risk, risk-management, sbom, service, software, threat, tool, vulnerabilityIncreasing attacks on IoT and OT device vulnerabilities Cyberattacks are increasingly driven by software vulnerabilities embedded in OT and IoT devices. The 2025 Verizon Data Breach Investigations Report noted that 20% of breaches were vulnerability-based, which is a close second to credential abuse, accounting for 22% of breaches. Year over year, breaches resulting from software…
-
Hamas lawyer seeks appeal following police’s seizure of his phone at Welsh port
Tags: phonePolice say that solicitors cannot have a ‘cast iron defence’ to protect their electronic devices from ever being searched First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633407/Hamas-lawyer-seeks-appeal-following-polices-seizure-of-his-phone-at-Welsh-port
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/
-
MPs urge government to stop Britain’s phone theft wave through tech
Committee says Apple, Google, and Samsung could render stolen handsets worthless if compelled to act First seen on theregister.com Jump to article: www.theregister.com/2025/10/25/uk_committee_phone_theft/
-
Tired of Unpaid Toll Texts? Blame the ‘Smishing Triad’
Chinese smishers, the bane of every American with a phone, have been shifting to lower-frequency, possibly higher-impact government impersonation attacks. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/unpaid-toll-texts-smishing-triad
-
DTTS – Zero Trust DNS Enforcement: Policy Violation Management
In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, including being able to enforce “My network, my rules” approach to egress control. However, in this world where existing applications need to…
-
Mobian makes Debian’s latest ‘Trixie’ release pocket-sized
Another phone Linux? The Reg attempts to disentangle the options First seen on theregister.com Jump to article: www.theregister.com/2025/10/21/mobian_trixie/
-
Mobian makes Debian’s latest ‘Trixie’ release pocket-sized
Another phone Linux? The Reg attempts to disentangle the options First seen on theregister.com Jump to article: www.theregister.com/2025/10/21/mobian_trixie/
-
MIND upgrades endpoint DLP (and more!)
Tags: ai, automation, business, cloud, compliance, control, credentials, data, endpoint, google, healthcare, identity, leak, microsoft, okta, phone, risk, service, threatMIND Flight 1021 with service to Stress-Free DLP is now boarding. All ticketed and confirmed passengers should make their way to the boarding gate at this time. The airport hums with noise. Rolling suitcases bump over tile floors, boarding announcements echo through speakers and the line at TSA snakes endlessly ahead. You shift your weight…
-
Maine 2025 Ballot Questions Redux
QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban prepaid postage on absentee ballot return envelopes, limit the number of drop boxes, require voters to……
-
International Sting Takes Down SIM Box Criminal Network
The operation took down a massive SIM card fraud network that provided fake phone numbers from more than 80 countries to criminals. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/international-sting-sim-box-criminal-network
-
Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/car-byod-risk
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
European police bust network selling thousands of phone numbers to scammers
Authorities raided a “SIM farm” operation that used tens of thousands of cards to enable fraud in several European countries, including Latvia and Austria. First seen on therecord.media Jump to article: therecord.media/europe-sim-farms-raided-latvia-austria-estonia

