Tag: phone
-
Privacy Roundup: Week 4 of Year 2025
Tags: access, ai, apt, attack, backup, botnet, breach, cctv, cve, cybersecurity, data, data-breach, detection, email, exploit, firmware, flaw, google, group, identity, infrastructure, korea, lazarus, leak, login, malicious, malware, north-korea, phishing, phone, privacy, regulation, remote-code-execution, risk, router, scam, service, software, startup, technology, threat, tool, update, virus, vulnerability, windowsThis is a news item roundup of privacy or privacy-related news items for 19 JAN 2025 – 25 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
Greek authorities subject refugees to invasive surveillance
Greek border authorities are subjecting asylum seekers to invasive phone confiscations and artificial intelligence-powered surveillance, in another potential violation of European data protection laws First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366618223/Greek-authorities-subject-refugees-to-invasive-surveillance
-
The CFO may be the CISO’s most important business ally
CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the goal for CISOs should be to reset this dynamic and forge a strong, collaborative alliance with their critical leadership counterparts.Take the CFO, for example. For many CISOs,…
-
Stay on top of tech: five ways to take back control, from emails to AI
Is tech calling the shots in your life? From making AI work smarter to tracking stolen phones, our expert explains how to get aheadAsking ChatGPT to write your emails is so two years ago. Generative AI tools are now going beyond the basic text-prompt phase. Take Google’s <a href=”https://notebooklm.google/”>NotebookLM, an experimental “AI research assistant” that…
-
SIM Swapping and How to Prevent it
SIM swapping attacks have been a threat for years, but gained mainstream attention in 2019 when hackers took over the cellular account of Twitter CEO Jack Dorsey. Because we use our cell phone number as an authentication method for a variety of online services and applications, this type of attack is far more insidious than……
-
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617630/German-court-finds-hacked-EncroChat-phone-evidence-inadmissible
-
Abandoned Backdoors: How Malicious Infrastructure Lives On
Studying Backdoors in Web Shells, Researchers Find 4,000 Infected Systems How many servers are infected by web shells designed to give attackers remote access to systems, but now phone home to malicious infrastructure that’s now abandoned or expired? Security researchers who posed that question have counted 4,000 such systems, including in government and education. First…
-
The biggest data breach fines, penalties, and settlements so far
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
Telegram hands over data on thousands of users to US law enforcement
Telegram reveals that the communications platform has fulfilled 900 U.S. government requests, sharing the phone number or IP address information of 2,253 users with law enforcement. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/
-
Meet PhishWP The New WordPress Plugin That’s Turning Legit Sites into Phishing Traps
One morning, you decide to make a purchase from a seemingly reputable online store. The website displays a familiar checkout interface resembling Stripe’s payment process. You enter your payment details, feeling confident in the website’s legitimacy: Credit card number Expiration date CVV Billing address You even enter a one-time password (OTP) sent to your phone,……
-
More telecom firms were breached by Chinese hackers than previously reported
Tags: access, at&t, attack, breach, china, cisco, communications, cyber, cyberespionage, cybersecurity, data, defense, disinformation, espionage, exploit, finance, fortinet, framework, government, group, hacker, Hardware, infrastructure, intelligence, international, microsoft, mobile, network, phone, regulation, risk, risk-management, router, spy, technology, threat, vulnerabilityChinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported.New victims, Charter Communications, Consolidated Communications, and Windstream, add to a growing list that already includes AT&T, Verizon, T-Mobile, and Lumen Technologies.Earlier, the US authorities informed that nine telecom firms have been affected by the Chinese espionage…
-
Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion
Many cars know where you’ve been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing. The post Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion appeared first on SecurityWeek.…
-
Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety
Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises. Plus, in our ‘Aware Much’ segment, Scott shares tips on protecting your data if your phone is stolen. Happy New Year and welcome……
-
Memo to Trump: US telecoms is vulnerable to hackers. Please hang up and try again | John Naughton
Tags: best-practice, exploit, finance, government, hacker, infrastructure, login, password, phone, service, vulnerabilityState-backed cyberspies are exploiting ageing infrastructure to penetrate every corner of the US government, it seems even its phone-tapping systemsYou know the drill. You’re logging into your bank or another service (Gmail, to name just one) that you use regularly. You enter your username and password and then the service says that it will send…
-
More telcos confirm China Salt Typhoon security breaches as White House weighs in
Intrusions allowed Beijing to ‘geolocate millions of individuals, record phone calls at will’ First seen on theregister.com Jump to article: www.theregister.com/2024/12/30/att_verizon_confirm_salt_typhoon_breach/
-
A US soldier was arrested for leaking presidential call logs
US authorities have arrested soldier Cameron John Wagenius for his alleged involvement in leaking presidential phone records. US authorities arrested Cameron John Wagenius (20), a US Army soldier, suspected of involvement in leaking presidential call logs. The soldier was arrested in Fort Hood, Texas, he is suspected to be the hacker who using the moniker…
-
US soldier linked to Trump call log hack arrested in Texas
Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, charged with two counts of selling or attempting to sell confidential phone records without the customer’s authorization.But behind the scant details provided in the charge sheet submitted to the US District Court for the Western District of Washington at…
-
Arrest of US Army Soldier Tied to AT&T and Verizon Extortion
Cameron Wagenius Suspected of Extorting Snowflake Customers Over Stolen Data. A serving member of the U.S. Army has been arrested on a two-count indictment tied to the theft and sale of confidential phone records, reportedly tied to the theft of terabytes of data from AT&T, Verizon and other customers of cloud data warehousing platform Snowflake.…
-
7 biggest cybersecurity stories of 2024
Tags: access, ai, alphv, at&t, attack, authentication, breach, business, china, cio, ciso, citrix, cloud, credentials, crowdstrike, crypto, cyber, cybercrime, cybersecurity, data, data-breach, deep-fake, detection, email, espionage, exploit, extortion, finance, google, government, group, hacking, healthcare, incident response, infection, insurance, intelligence, international, jobs, lockbit, malicious, malware, mandiant, mfa, microsoft, network, nis-2, north-korea, office, phishing, phone, privacy, ransomware, regulation, risk, risk-management, scam, service, software, strategy, tactics, technology, threat, ukraine, update, vulnerability, windowsCybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention.But a few incidents in particular had far-reaching consequences, with the potential to reshape industry protections, shake up how vendors secure customers’ systems, or drive security leaders to reassess their strategies.Longer-term trends such as increased cybersecurity regulations and the impact of…
-
One third of adults can’t delete device data
Easier to let those old phones gather dust in a draw, survey finds First seen on theregister.com Jump to article: www.theregister.com/2024/12/24/uk_device_data_deletion/
-
ICO Warns of Mobile Phone Festive Privacy Snafu
The Information Commissioner’s Office has warned that millions of Brits don’t know how to erase personal data from their old devices First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ico-warns-festive-mobile-phone/
-
US government urges high-ranking officials to lock down mobile devices following telecom breaches
The move to urge Americans to use end-to-end encrypted apps comes as China-backed gangs are hacking into phone and internet giants. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/19/us-government-urges-high-ranking-officials-to-lock-down-mobile-devices-following-telecom-breaches/
-
Called your doctor after-hours? ConnectOnCall hackers may have stolen your medical data
The hackers stole names, phone numbers, dates of birth and information related to health conditions, treatments and prescriptions. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/16/called-your-doctor-after-hours-connectoncall-hackers-may-have-stolen-your-medical-data/
-
XDR provider Arctic Wolf buys BlackBerry’s Cylance suite
Tags: ai, business, ceo, ciso, cybersecurity, detection, edr, endpoint, government, infrastructure, office, phone, risk, service, soc, technologyUS provider Arctic Wolf has struck a deal to buy BlackBerry’s Cylance endpoint security suite, which it will integrate into its Aurora extended detection and response (XDR) platform.Arctic Wolf said this morning that if the deal is approved by regulators, the company will be able to offer one of the largest open XDR security platforms…
-
Israeli spyware maker Paragon bought by US private equity giant
The company’s spyware, dubbed Graphite, is capable of hacking phones and stealing private communications. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/16/israeli-spyware-maker-paragon-bought-by-u-s-private-equity-giant/
-
Serbian police used Cellebrite to unlock, then plant spyware on, a journalist’s phone
Amnesty said it found NoviSpy, an Android spyware linked to Serbian intelligence, on the phones of several members of Serbian civil society following police stops. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/15/serbian-police-used-cellebrite-to-unlock-then-plant-spyware-on-a-journalists-phone/
-
Serbian government used Cellebrite to unlock phones, install spyware
Serbian police and intelligence officers used Cellebrite forensic extraction software to unlock journalists’ and activists’ phones and install previously unknown … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/16/serbian-government-used-cellebrite-to-unlock-phones-install-spyware/
-
Israeli spyware maker Paragon bought by U.S. private equity giant
The company’s spyware, dubbed Graphite, is capable of hacking phones and stealing private communications. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/16/israeli-spyware-maker-paragon-bought-by-u-s-private-equity-giant/

