Tag: phone
-
EU gives staff ‘burner phones, laptops’ for US visits
That would put America on the same level as China for espionage First seen on theregister.com Jump to article: www.theregister.com/2025/04/15/ec_burner_devices/
-
Chinese police ensnaring Tibetans over phone and internet activity, Human Rights Watch says
Dozens of people in Tibet have been arrested by Chinese authorities in recent years for “simply using a cellphone,” according to the nonprofit Human Rights Watch. First seen on therecord.media Jump to article: therecord.media/tibetans-arrests-internet-phone-use-china
-
Pre-Installed Malware on Cheap Android Phones Steals Crypto via Fake WhatsApp
Cheap Android phones with preinstalled malware use fake apps like WhatsApp to hijack crypto transactions and steal wallet recovery phrases. First seen on hackread.com Jump to article: hackread.com/pre-installed-malware-cheap-android-phones-crypto-fake-whatsapp/
-
How Online Poker Platforms Stay a Step Ahead of Cyber Threats
Online poker is exploding more people than ever are playing from their phones and laptops instead of going to casinos. With such change comes a big responsibility for poker sites and apps keeping everything safe. Players expect fast gameplay, smooth payments, and, most importantly, to feel safe. That’s why leading poker platforms are The post…
-
Wyden to block Trump’s CISA nominee until agency releases report on telecoms’ ‘negligent cybersecurity’
Oregon Sen. Ron Wyden (D) will block the nomination of Sean Plankey over what he called CISA’s “multi-year cover up of the phone companies’ negligent cybersecurity.” First seen on therecord.media Jump to article: therecord.media/wyden-blocks-plankey-nomination-cisa
-
Whatsapp plugs bug allowing RCE with spoofed filenames
Whatsapp makes for a popular attack vector: Whatsapp has been frequently targeted in the past for its popularity as an encrypted chatting platform. With over 10 billion downloads on Google Play Store alone, the platform makes for a lucrative target for threat actors.A similar security oversight was reported in July 2024 to be affecting the…
-
Google addresses 2 actively exploited vulnerabilities in security update
Serbian security services exploited one of the actively exploited vulnerabilities to break into the phone of a youth activist in Serbia, according to Amnesty International. First seen on cyberscoop.com Jump to article: cyberscoop.com/android-security-update-april-2025/
-
A flaw in Verizon’s iOS Call Filter app exposed call records of millions
A now-patched flaw in Verizon ‘s iOS Call Filter app exposed call records of millions. No abuse found. Only phone numbers and timestamps were at risk. A now-patched vulnerability in Verizon ‘s iOS Call Filter app could have been exploited to harvest the call records of millions of Americans. Verizon’s Call Filter app allows users…
-
Port of Seattle ‘s August data breach impacted 90,000 people
Port of Seattle is notifying 90,000 people of a data breach after personal data was stolen in a ransomware attack in August 2024. In August 2024, a cyber attack hit the Port of Seattle, which also operates the Seattle-Tacoma International Airport. The attack impacted websites and phone systems. According to The Seattle Times, the cyber…
-
Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials
A surge in phishing text messages claiming unpaid tolls has been linked to a massive phishing-as-a-service (PhaaS) operation. These scams, which have been hitting users’ phones in waves, are part of a sophisticated campaign leveraging a platform called Lucid. Cybercriminals behind this scheme are exploiting legitimate communication technologies like Apple iMessage and Android RCS to…
-
Counterfeit Phones Carrying Hidden Revamped Triada Malware
The malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/counterfeit-phones-infected-triada-malware
-
Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices
Counterfeit versions of popular smartphone models that are sold at reduced prices have been found to be preloaded with a modified version of an Android malware called Triada.”More than 2,600 users in different countries have encountered the new version of Triada, the majority in Russia,” Kaspersky said in a report. The infections were recorded between…
-
Hackers Hijack Telegram Accounts via Default Voicemail Passwords
The Israeli Internet Association has issued a public warning about a surge in cyberattacks targeting Telegram accounts in Israel. The campaign, traced to hackers in Bangladesh and Indonesia, exploits vulnerabilities in voicemail systems to hijack accounts and, in some cases, register new ones using phone numbers of individuals who have never used Telegram, including minors.…
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal
A haul of items seized by police reveals the scale and threat of payment fraud a crime that can have significant emotional impact on victimsOn a shelf between Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room are an 18-inch machete and a serrated <a href=”https://www.theguardian.com/uk-news/2023/dec/09/google-profiting-from-sale-of-zombie-knives-in-uk-despite-claims-of-ban”>zombie knife. Alongside the expensive…
-
Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online
Plus: Alleged Snowflake hacker will be extradited to US, internet restrictions create an information vacuum in Myanmar, and London gets its first permanent face recognition cameras. First seen on wired.com Jump to article: www.wired.com/story/top-trump-officials-phone-numbers-personal-information-online/
-
How to create an effective crisis communication plan
Tags: access, business, ciso, cloud, communications, corporate, cyber, cyberattack, cybersecurity, data, email, group, incident, incident response, infrastructure, mobile, monitoring, network, phone, risk, strategy, toolA crisis communications plan optimally prepares the company for all possible crisis scenarios. This includes clear rules of conduct and communication, prepared content, and secure communication channels and tools.Internet monitoring shows how the crisis is perceived in social networks and the media. Reputation-damaging publications can be identified early, and countermeasures can be initiated.Good communication in day-to-day business…
-
Report: Personal info on federal judges is widely accessible online, leading to safety risks
More than half of U.S. appellate court judges examined in a recent study were shown to have their personal data, including home addresses, phone numbers, names of relatives and case rulings, listed on people search sites. First seen on therecord.media Jump to article: therecord.media/personal-info-on-judges-widely-available-online
-
Report: Top Trump Officials’ Private Data Leaked
Private Details of Top Trump Officials Found Online Amid Growing Security Scandal. Private contact details of top Trump officials, including their phone numbers, emails and even some passwords, have been leaked online through commercial databases and hacked data dumps, raising security concerns over potential foreign access to Cabinet members’ private accounts and communications. First seen…
-
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps.”PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in a…
-
Arkana Security group claims the hack of US telco provider WideOpenWest (WOW!)
Arkana Security, a new ransomware group, claims to have breached the telecommunications provider WideOpenWest (WOW!). The new ransomware group Arkana Security claims to have hacked US telecom provider WOW!, stealing customer data. WideOpenWest (WOW!) is a US-based telecommunications company that provides broadband internet, cable TV, and phone services. It operates mainly in the Midwest and…
-
Importance of Regular Network Security Audit
A network is simply a way for devices like computers, phones, or servers to connect and communicate with each other. It is similar to a road system that allows cars to travel between different places. If we take the cars as data and the destinations as devices, we need to make sure there are no……
-
Scammers cash in on tax season
AI-powered phishing emails, deepfake phone calls, and fake tax prep websites are making tax scams more convincing and costly than ever, according to McAfee. Cybercriminals are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/21/tax-season-scams/

