Tag: phone
-
Researchers find Jordan government used Cellebrite phone-cracking tech against activists
The incidents occurred amid Gaza protests and suggest human rights violations, Citizen Lab said. First seen on cyberscoop.com Jump to article: cyberscoop.com/researchers-find-jordan-government-used-cellebrite-phone-cracking-tech-against-activists/
-
Jordan used Cellebrite phone-hacking tools against activists critical of Gaza war, report finds
The findings, published by Citizen Lab Thursday, are based on the research institute’s digital forensic analysis of seized phones in four cases and Jordanian court records in three cases. First seen on therecord.media Jump to article: therecord.media/jordan-used-cellebrite-against-activists-critical-gaza-war
-
UStrive security lapse exposed personal data of its users, including children
The online mentoring site UStrive exposed email addresses, phone numbers, and other non-public information to other logged-in users. The nonprofit told TechCrunch that the issue is now fixed, but wouldn’t commit to alerting affected individuals. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/20/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children/
-
UStrive security lapse exposed personal data of its users, including children
The online mentoring site UStrive exposed email addresses, phone numbers, and other non-public information to other logged-in users. The nonprofit told TechCrunch that the issue is now fixed, but wouldn’t commit to alerting affected individuals. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/20/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children/
-
UStrive security lapse exposed personal data of its users, including children
The online mentoring site UStrive exposed email addresses, phone numbers, and other non-public information to other logged-in users. The nonprofit told TechCrunch that the issue is now fixed, but wouldn’t commit to alerting affected individuals. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/20/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children/
-
Supreme Court to consider whether geofence warrants are constitutional
The Supreme Court agreed to hear a case challenging the constitutionality of geofence warrants, which let law enforcement compel companies to provide the location data of cell phones at specific times and places. First seen on therecord.media Jump to article: therecord.media/supreme-court-geofence-constitutionality
-
This Intune update isn’t optional, it’s a kill switch for outdated apps
Tags: access, android, authentication, business, control, corporate, cybersecurity, data, infrastructure, malware, microsoft, mitigation, password, phone, risk, service, switch, threat, tool, updateiOS line-of-business (LOB) and custom iOS apps using the Intune App SDK must update to SDK version 20.8.0 or later for apps compiled with Xcode 16, and to 21.1.0 or later for apps compiled with Xcode 26.Apps using the wrapper must update to the new version of the Intune App Wrapping Tool for iOS: version…
-
Redmi Buds Vulnerability Could Allow Call Data Theft and Firmware Instability
Xiaomi’s Redmi Buds series faces critical security flaws that enable attackers to steal sensitive call data and crash devices without authentication. Two newly disclosed vulnerabilities affect Redmi Buds 3 Pro through 6 Pro, allowing unauthenticated adversaries within Bluetooth range to access private phone numbers and trigger repeated denial of service conditions. The vulnerabilities stem from…
-
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens’ devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE’s data tools. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/
-
Verizon Outage Felt Across United States
Cause Unknown But Many Previous Outages Due to Software Misconfiguration. Verizon customers along the Eastern Seaboard and Southern parts of the United States lost mobile phone connectivity Wednesday in an incident that appears to have peaked around 1 p.m. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/verizon-outage-felt-across-united-states-a-30524
-
US gov’t: House sysadmin stole 200 phones, caught by House IT desk
Scheme allegedly cost taxpayers $150,000. First seen on arstechnica.com Jump to article: arstechnica.com/tech-policy/2026/01/us-govt-house-sysadmin-stole-200-phones-caught-by-house-it-desk/
-
Verizon Wireless outage puts phones in SOS mode without cell service
Verizon Wireless is suffering a massive outage in the US, with customers reporting their phones stuck in SOS mode with no cellular service. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/mobile/verizon-wireless-outage-puts-phones-in-sos-mode-without-cell-service/
-
Ugandan officials turn off internet on eve of national elections
The Uganda Communication Commission (UCC) started turning off internet and mobile phone services on Tuesday, according to Amnesty International. First seen on therecord.media Jump to article: therecord.media/uganda-internet-shutdown-elections
-
Tories vow to boot under-16s off social media and ban phones in schools
Tags: phoneOpposition leader Kemi Badenoch pitches age limits and classroom curbs as fixes for behavior and mental health First seen on theregister.com Jump to article: www.theregister.com/2026/01/12/conservatives_social_media_ban/
-
A massive breach exposed data of 17.5M Instagram users
A massive breach exposed data of 17.5M Instagram users, triggering mass password reset emails and fears that stolen data is already circulating online. A major data breach has exposed the personal data of about 17.5 million Instagram users, Malwarebytes Labs researchers warn. Exposed data includes usernames, physical addresses, phone numbers, and email addresses,. Since January…
-
Massive Instagram Data Breach Exposes Personal Details of 17.5 Million Users
A staggering cybersecurity incident has come to light, with 17.5 million Instagram users’ personal information exposed in a data breach advertised on dark web marketplaces. Cybersecurity firm Malwarebytes first alerted the public via X (formerly Twitter), confirming the leak’s severity as stolen data, including usernames, emails, phone numbers, and partial locations, circulates for sale. Affected…
-
ICE Can Now Spy on Every Phone in Your Neighborhood
Plus: Iran shuts down its internet amid sweeping protests, an alleged scam boss gets extradited to China, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-ice-can-now-spy-on-every-phone-in-your-neighborhood/
-
Security News This Week: ICE Can Now Spy on Every Phone in Your Neighborhood
Plus: Iran shuts down its internet amid sweeping protests, an alleged scam boss gets extradited to China, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-ice-can-now-spy-on-every-phone-in-your-neighborhood/
-
Ghost Tapped Turns Android Phones Into Fraud Payment Relays
Ghost Tapped is Android malware that abuses NFC to enable remote payment fraud without physical card access. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ghost-tapped-turns-android-phones-into-fraud-payment-relays/
-
CPPA fines data broker selling lists of Alzheimer’s patients
Datamasters bought and resold the names, addresses, phone numbers and email addresses of millions of people with Alzheimer’s disease, drug addiction, bladder incontinence and other medical conditions for targeted advertising, according to the CPPA. First seen on therecord.media Jump to article: therecord.media/ccpa-fines-data-broker-selling-lists-alzheimers
-
US Man Jailed After FBI Traced 1,100 IP Addresses in Cyberstalking Case
A 25-year-old Bigfork, Montana man, Jeremiah Daniel Starr, used over 50 phone numbers and a VPN to harass a victim he called his “best friend,” even staging a fake shooting. Learn more about the FBI investigation that traced 1,100 IP addresses to bring him to justice. First seen on hackread.com Jump to article: hackread.com/us-man-jailed-fbi-ip-addresses-cyberstalking-case/
-
Google fixes critical Dolby Decoder bug in Android January update
Android’s January 2026 update fixes CVE-2025-54957, a critical Dolby audio decoder flaw discovered by Google researchers in October 2025. A critical Dolby audio decoder vulnerability, tracked as CVE-2025-54957, was addressed in the January 2026 Android security update. Google fixed the flaw in December 2025 for Pixel phones and has now rolled out the fix to…
-
Students bag extended Christmas break after cyber hit on school IT
Phones, email, and core systems knocked out at Higham Lane in Nuneaton First seen on theregister.com Jump to article: www.theregister.com/2026/01/06/nuneaton_school_cyberattack/
-
What if your face could say >>don’t record me<<? Researchers think it's possible
Phones, smart glasses, and other camera-equipped devices capture scenes that include people who never agreed to be recorded. A newly published study examines what it would … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/24/blindspot-camera-devices-privacy-control/
-
2025 Year in Review at Cloud Security Podcast by Google
Tags: 2fa, ai, automation, breach, cloud, compliance, computing, control, cybersecurity, data, defense, detection, edr, finance, google, hacking, incident response, infrastructure, linux, mandiant, metric, mitigation, offense, phone, privacy, risk, security-incident, siem, soc, technology, threat, vulnerability, vulnerability-management, zero-trust(written jointly with Tim Peacock) Five years. It’s enough time to fully launch a cloud migration, deploy a new SIEM, or”Š”, “Šif you’re a very large enterprise”Š”, “Šjust start thinking about doing the first two. It’s also how long Tim and I have been subjecting the world to our thoughts on Cloud Security Podcast by Google. We…
-
South Korea to require facial recognition for new mobile numbers
South Korea will begin requiring facial recognition when signing up for a new mobile phone number in a bid to fight scams, the Ministry of Science and ICT announced. First seen on therecord.media Jump to article: therecord.media/south-korea-facial-recognition-phones
-
Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security
President Donald Trump signed a $901 billion Pentagon policy bill that features a slew of cyber provisions, including a requirement that senior Defense Department officials use phones with “enhanced cybersecurity protections.” First seen on therecord.media Jump to article: therecord.media/trump-signs-ndaa-cyber-command
-
Raspberry Pi used in attempt to take over ferry
Tags: ceo, control, dns, Hardware, infrastructure, intelligence, malware, monitoring, network, phoneProceed with caution: Villanustre encouraged anyone discovering such a device to proceed cautiously. “Disconnecting the device could result in losing important forensic information if not careful. It’s not too hard to equip the device with a tiny battery or supercapacitor that would give it enough time to wipe itself out if disconnected from the network or…

