Tag: phone
-
Cloned Phones, Stolen Identities: The eSIM Hack No One Saw Coming
Embedded SIMs (eSIMs), officially known as Kigen eUICC, are transforming connectivity by allowing users to switch operators without physically swapping cards. These chips store digital profiles and support secure over-the-air provisioning, a boon for smartphones, IoT devices, and connected vehicles. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/breaking-euicc-security/
-
eSIM Bug in Millions of Phones Enables Spying, Takeover
eSIMs around the world may be fundamentally vulnerable to physical and network attacks because of a 6-year-old Oracle vulnerability in technology that underlies billions of cards. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/esim-bug-millions-phones-spying-takeover
-
SIM Swap Fraud Is Surging, and That’s a Good Thing
Now it’s time to build systems that attackers can’t reroute with a phone call. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/sim-swap-fraud-surging-good
-
SIM swapping attacks expose your online accounts to hackers, but your phone carrier can help
These carrier security settings can prevent your phone number from being hijacked or stolen. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/09/how-to-protect-your-cell-phone-number-from-sim-swap-attacks/
-
GitPhish: New Tool Automates GitHub Device Code Phishing Attacks
Security researchers revealed the dangers of GitHub Device Code Phishing”, a technique that leverages the OAuth 2.0 Device Authorization Grant flow. This method can turn a simple eight-digit code and a phone call into a full compromise of an organization’s GitHub repositories and software supply chain. Despite its simplicity, executing these attacks at scale has…
-
Trend Micro flags BERT: A rapidly growing ransomware threat
Low-code, high impact: BERT is not an isolated development, it is part of a growing wave of emerging ransomware groups that are proving both capable and elusive. In just the last three to four months, cybersecurity researchers have identified multiple new ransomware families that signal a shift toward leaner, low-code, and faster malware operations.For instance,…
-
How to protect your cell phone number from SIM swap attacks
These carrier security settings can prevent your phone number from being hijacked or stolen. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/09/how-to-protect-your-cell-phone-number-from-sim-swap-attacks/
-
Qantas attack reveals one phone call is all it takes to crack cybersecurity’s weakest link: humans
Tags: access, attack, breach, cyber, cybercrime, cybersecurity, data, data-breach, email, finance, healthcare, phone, riskOther sectors also at risk from attacks, including healthcare, finance and telecommunications, expert warns<ul><li>Get our <a href=”https://www.theguardian.com/email-newsletters?CMP=cvau_sfl”>breaking news email, <a href=”https://app.adjust.com/w4u7jx3″>free app or <a href=”https://www.theguardian.com/australia-news/series/full-story?CMP=cvau_sfl”>daily news podcast</li></ul>All it can take is a phone call. That’s what <a href=”https://www.theguardian.com/business/2025/jul/02/qantas-confirms-cyber-attack-exposes-records-of-up-to-6-million-customers”>Qantas learned this week when the personal information of up to 6 million customers was stolen by cybercriminals…
-
Google fined $314M for misusing idle Android users’ data
Google must pay $314M after a California court ruled it misused idle Android users’ data. The case ends a class-action suit filed in August 2019. A San Jose jury ruled that Google misused Android users’ cell phone data and must pay over $314.6 million in damages to affected users in California. Google is liable for…
-
CBP Wants New Tech to Search for Hidden Data on Seized Phones
Customs and Border Protection is asking companies to pitch tools for performing deep analysis on the contents of devices seized at the US border. First seen on wired.com Jump to article: www.wired.com/story/cbp-wants-new-tech-to-search-for-hidden-data-on-seized-phones/
-
Attackers Impersonate Top Brands in Callback Phishing
Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call adversary-controlled phone numbers. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/attackers-top-brands-callback-phishing
-
California jury orders Google to pay $314 million over data transfers from Android phones
Google’s data transfers from idle Android phones on cellular networks essentially amounted to stealing, lawyers alleged in a class-action case where a jury awarded $314 million to plaintiffs. Google said it will appeal. First seen on therecord.media Jump to article: therecord.media/google-lawsuit-data-collection-android-cellular
-
Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
The spyware operation’s exposed customer email addresses and passwords were shared with data breach notification service Have I Been Pwned. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/02/data-breach-reveals-catwatchful-stalkerware-spying-on-thousands-android-phones/
-
AT&T rolls out “Wireless Lock” feature to block SIM swap attacks
AT&T has launched a new security feature called “Wireless Lock” that protects customers from SIM swapping attacks by preventing changes to their account information and the porting of phone numbers while the feature is enabled. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/atandt-rolls-out-wireless-lock-feature-to-block-sim-swap-attacks/
-
Drug cartel hacked FBI official’s phone to track and kill informants, report says
Tags: phoneOfficial was connected to FBI probe of cartel kingpin JoaquÃn “El Chapo” Guzmán. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/06/mexican-drug-cartel-hacked-fbi-officials-phone-to-track-informant-report-says/
-
DOJ: Cartel Hacked Phones, Cameras to Track FBI Informants
New Report Says Mexican Cartel Hired Hacker to Identify, Track and Kill FBI Sources. A Justice Department watchdog found a Mexican cartel hired a hacker to tap mobile data and Mexico City cameras, helping track, intimidate and kill potential U.S. informants linked to El Chapo while calling for reforms to protect sensitive investigations from rapidly…
-
Mexican drug cartel hacker spied on FBI official’s phone to track and kill informants, report says
The watchdog revealed the 2018 incident as part of an audit of the FBI”s counter-surveillance efforts. First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/30/mexican-drug-cartel-hacker-spied-on-fbi-officials-phone-to-track-and-kill-informants-report-says/
-
Facebook wants access to your camera roll for AI photo edits
Facebook asks users to allow >>cloud processing>cloud processing
-
Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
A cartel affiliate notified an FBI agent about a hacker who infiltrated cameras and phones to track an FBI official’s meetings, the DOJ inspector general said. First seen on cyberscoop.com Jump to article: cyberscoop.com/hacker-helped-kill-fbi-sources-witnesses-in-el-chapo-case-according-to-watchdog-report/
-
ICE Rolls Facial Recognition Tools Out to Officers’ Phones
Plus: US feds charge alleged masterminds behind infamous forum, Scattered Spider targets airlines, and hackers open a valve at a Norwegian dam. First seen on wired.com Jump to article: www.wired.com/story/ice-rolls-facial-recognition-tools-out-to-officers-phones/
-
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service.According to TechCrunch, which first reported the feature, users are being served a new pop-up message…
-
Sky ECC distributor released from French custody pending trial
Tags: phoneCanadian businessman accused of distributing Sky ECC encrypted phones has been released on bail after over four years in custody without a trial First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626653/Sky-ECC-distributor-released-from-French-custody-pending-trial
-
Bank of America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands like Apple, Bank of America, Facebook, HP, Microsoft, Netflix, and PayPal. This sophisticated attack, technically termed a >>search parameter injection attack,
-
OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as it exposes sensitive data through a weakly secured WiFi hotspot. The flaw, cataloged as CVE-2025-27387, has been rated as high severity and was published in the National Vulnerability Database and GitHub Advisory Database within the…
-
Canada says telcos were breached in China-linked espionage hacks
Salt Typhoon previously hacked phone and telco giants across the United States. First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/23/canada-says-telcos-were-breached-in-china-linked-espionage-hacks/
-
Police to gain powers to grab online data when they seize phones and laptops
Academics and civil liberties experts say that proposed ‘authoritarian’ powers to allow police to trawl online and cloud services used by owners of seized devices should require approval from a judge First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626070/Police-to-gain-powers-to-grab-online-data-when-they-seize-phones-and-laptops
-
Thousands of UK government laptops, phones and tablets have been lost or stolen
Exclusive: ‘Systemic risk’ to cybersecurity after devices worth more than £1m a year are taken or lostThousands of UK government laptops, phones and tablets worth more than £1m have been either lost or stolen, freedom of information disclosures have revealed, triggering warnings of a “systemic risk” to the nation’s cybersecurity.The Department for Work and Pensions…

