Tag: phone
-
Met Police to ‘trial’ handheld facial-recognition tech
Tags: phoneLondon Mayor Sadiq Khan reveals in a scrutiny session with London Assembly members that the Met is set to trial a facial-recognition phone app for officers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639898/Met-police-to-trial-handheld-facial-recognition-tech
-
Ericsson blames vendor vishing slip-up for breach exposing thousands of records
Crooks used simple phone scam to compromise vendor account, spilling personal and financial data belonging to more than 15,000 people First seen on theregister.com Jump to article: www.theregister.com/2026/03/10/ericsson_blames_vendor_vishing_slipup/
-
Salt Typhoon is hacking the world’s phone and internet giants, here’s everywhere that’s been hit
Salt Typhoon is by far one of the most prolific hacking groups in recent years, breaching some of the top American phone companies. Here are all the countries that have been targeted. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/salt-typhoon-china-who-has-been-hacked-global-telecom-giants/
-
Salt Typhoon is hacking the world’s phone and internet giants. Here’s everywhere that’s been hit.
Salt Typhoon is by far one of the most prolific hacking groups in recent years, breaching some of the top American phone companies. Here are all the countries that have been targeted. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/salt-typhoon-china-who-has-been-hacked-global-telecom-giants/
-
Product Showcase: Fing Desktop puts network visibility on your screen
Phones, laptops, smart TVs, cameras, and smart home equipment all use the same network. Knowing what’s connected helps users manage performance and security. Fing Desktop … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/product-showcase-fing-desktop-network-monitoring/
-
CBP Used Online Ad Data to Track Phone Locations
Plus: Proton helped the FBI identify a protester, the Leakbase cybercrime forum was busted in an international operation, and more. First seen on wired.com Jump to article: www.wired.com/story/cbp-used-online-ad-data-to-track-phone-locations/
-
New Jersey county says malware attack took down phone lines, IT systems
Passaic County, home to nearly 600,000 people in Northern New Jersey, published a statement on Wednesday evening warning residents that it is aware of a “malware attack” affecting county IT systems and phone lines. First seen on therecord.media Jump to article: therecord.media/new-jersey-county-says-malware-attack-took-down-phones
-
Police do not have to explain to lawyer Fahad Ansari why they seized his phone data, says court
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639704/Police-do-not-have-to-explain-to-lawyer-Fahad-Ansari-why-they-seized-his-phone-data-says-court
-
Zero-day in Android phone chips under active attack
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639578/Zero-day-in-Android-phone-chips-under-active-attack
-
Shadow AI vs Managed AI: What’s the Difference? FireTail Blog
Tags: access, ai, api, attack, breach, chatgpt, ciso, cloud, computer, control, credentials, credit-card, data, data-breach, framework, google, injection, intelligence, Internet, law, LLM, malicious, mitre, monitoring, network, password, phishing, phone, risk, software, switch, threat, tool, training, vulnerabilityMar 04, 2026 – – Quick Facts: Shadow AI vs. Managed AIShadow AI is a visibility gap: It refers to any AI tool used by employees that the IT department doesn’t know about. Most companies have 10x more AI tools in use than they realize.Managed AI is a “Paved Path”: It uses approved, secure versions…
-
Motorola partners with GrapheneOS for future phones
Don’t expect to see compatible hardware before 2027 First seen on theregister.com Jump to article: www.theregister.com/2026/03/02/motorola_grapheneos/
-
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government. First seen on wired.com Jump to article: www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/
-
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures,…
-
Hackers and internet outages hit Iran amid US air strikes
Users of a popular Iranian prayer app were flooded with phone notifications as U.S. air strikes hit Iran’s biggest cities, killing the country’s leader. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/02/hackers-and-internet-outages-hit-iran-amid-u-s-air-strikes/
-
Hackers and internet outages hit Iran amid U.S. air strikes
Users of a popular Iranian prayer app were flooded with phone notifications as U.S. air strikes hit Iran’s biggest cities, killing the country’s leader. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/02/hackers-and-internet-outages-hit-iran-amid-u-s-air-strikes/
-
AI Overviews Rife With Scam Phone Numbers
In a new take on an old scam, AI Overviews are inadvertently coughing up fraudulent phone numbers for companies that appear in search queries leading callers to miscreants who elicit sensitive data and payment information. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-overviews-rife-with-scam-phone-numbers/
-
CVE-2025-64328 exploitation impacts 900 Sangoma FreePBX instances
About 900 Sangoma FreePBX systems were infected with web shells after attackers exploited a command injection flaw. Hundreds of Sangoma FreePBX instances are still infected with web shells following attacks that began in December 2025. Sangoma FreePBX is an open-source, web-based platform for managing Asterisk-powered VoIP phone systems. Maintained by Sangoma Technologies, it allows businesses…
-
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
Tags: access, api, apt, china, cloud, communications, cyber, cyberespionage, data, defense, endpoint, espionage, google, government, group, hacker, infrastructure, intelligence, linux, mandiant, monitoring, network, phone, radius, service, spy, theft, threat, vpnHow Mandiant found it: The campaign came to light during a Mandiant Threat Defense investigation, when analysts flagged unusual activity on a CentOS server. A binary named xapt, designed to masquerade as the apt package manager on Debian-based Linux systems, had already escalated to root and was running shell commands to confirm its access level,…
-
Claude Code Lets Users Control Terminal Sessions Remotely from Their Phones
Anthropic has unveiled a significant update to its Claude Code platform, introducing a new >>Remote Control<< feature. This capability allows developers to manage terminal sessions directly from their smartphones or remote web browsers, bridging the gap between desktop development and mobile accessibility. The feature is currently available in a Research Preview phase for Claude Max…
-
Police created ‘intelligence profile’ of BBC journalist subject to phone surveillance
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639366/Police-created-intelligence-profile-of-BBC-journalist-subject-to-phone-surveillance
-
Why ‘Call This Number’ TOAD Emails Beat Gateways
Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/why-call-this-number-toad-emails-beat-gateways
-
Anthropic’s Remote Control feature brings Claude Code to mobile devices
Anthropic has introduced a new Claude Code feature called Remote Control, allowing developers to continue a local coding session from a phone, tablet, or any web browser. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/25/anthropic-remote-control-claude-code-feature/
-
$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
Cybersecurity researchers at Certo reveal Oblivion, a new Android Trojan targeting major brands like Samsung and Xiaomi. It bypasses security to steal passwords and bank codes. First seen on hackread.com Jump to article: hackread.com/android-malware-oblivion-fake-updates-hijack-phones/
-
PayPal discloses extended data leak linked to Loan App glitch
PayPal disclosed a six-month data breach that exposed sensitive user data, including Social Security numbers, due to a software error. PayPal has disclosed a data breach caused by a software bug in its PayPal Working Capital loan app. The flaw exposed sensitive customer information, including customers’ business contact details (name, email, phone number, address), along…
-
Grandstream VoIP Phones Vulnerability Grants Attackers Root Privileges
A critical unauthenticated stack-based buffer overflow vulnerability, tracked as CVE-2026-2329, affecting Grandstream GXP1600 series VoIP phones. The vulnerability, rated as critical with a CVSS score of 9.8, allows remote attackers to gain root privileges on the affected devices without authentication. At its core, this is a classic memory corruption vulnerability. By sending specially crafted network packets to the target VoIP phone, an attacker…
-
Hackers breach contractor linked to Ukraine’s central bank collectible coin store
The National Bank of Ukraine announced that attackers may have gained access to users’ personal data, including names, phone numbers, email addresses and delivery addresses, in a recent cyberattack. First seen on therecord.media Jump to article: therecord.media/hackers-breach-ukraine-national-bank-contractor
-
Cellebrite cut off Serbia citing abuse of its phone unlocking tools. Why not others?
Cellebrite, which makes phone unlocking and hacking tools, stopped sales to countries that allegedly abused its tools. But after new allegations in Jordan and Kenya, the company has changed its approach. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/19/cellebrite-cut-off-serbia-citing-abuse-of-its-phone-unlocking-tools-why-not-others/
-
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping/
-
Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)
A critical security vulnerability (CVE-2026-2329) in Grandstream VoIP phones could let hackers remotely take full control of the devices and even intercept calls, Rapid7 … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/19/grandstream-voip-phones-vulnerability-cve-2026-2329/
-
Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist
Citizen Lab says it found forensic evidence that Cellebrite’s mobile extraction technology was used on a Samsung Android phone belonging to detained Kenyan activist and politician Boniface Mwangi while the device was in police custody in July 2025. The group warns the case highlights how high-powered forensic tools can be used to access sensitive personal…

