Tag: phone
-
Maine 2025 Ballot Questions Redux
QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban prepaid postage on absentee ballot return envelopes, limit the number of drop boxes, require voters to……
-
International Sting Takes Down SIM Box Criminal Network
The operation took down a massive SIM card fraud network that provided fake phone numbers from more than 80 countries to criminals. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/international-sting-sim-box-criminal-network
-
Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/car-byod-risk
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
European police bust network selling thousands of phone numbers to scammers
Authorities raided a “SIM farm” operation that used tens of thousands of cards to enable fraud in several European countries, including Latvia and Austria. First seen on therecord.media Jump to article: therecord.media/europe-sim-farms-raided-latvia-austria-estonia
-
Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
Multiple Cisco desk, IP, and video phones are at risk of remote denial-of-service (DoS) and cross-site scripting (XSS) attacks due to flaws in their Session Initiation Protocol (SIP) software. The weaknesses affect Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 models when they are registered to Cisco Unified Communications…
-
Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
Multiple Cisco desk, IP, and video phones are at risk of remote denial-of-service (DoS) and cross-site scripting (XSS) attacks due to flaws in their Session Initiation Protocol (SIP) software. The weaknesses affect Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 models when they are registered to Cisco Unified Communications…
-
German parliamentarian urges officials to investigate Hungary for spyware abuse
A German member of the European Parliament has filed a complaint urging authorities to investigate Hungarian Prime Minister Viktor Orbán for allegedly ordering the country’s secret service to break into his phone with spyware. First seen on therecord.media Jump to article: therecord.media/german-parliament-hungary-spyware
-
Locked out of your Gmail account? Google says phone a friend
Recovery feature lets trusted contacts help you get back in when other methods fail First seen on theregister.com Jump to article: www.theregister.com/2025/10/16/google_gmail_trusted_contacts/
-
Locked out of your Gmail account? Google says phone a friend
Recovery feature lets trusted contacts help you get back in when other methods fail First seen on theregister.com Jump to article: www.theregister.com/2025/10/16/google_gmail_trusted_contacts/
-
Satellites found exposing unencrypted data, including phone calls and some military comms
Researchers spent the past year alerting affected organizations, including T-Mobile and ATT, but warn that large amounts of satellite data will remain unencrypted and exposed for some years to come. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/14/satellites-found-exposing-unencrypted-data-including-phone-calls-and-some-military-comms/
-
Vodafone keels over, cutting off millions of mobile and broadband customers
Outage knocks out phones, broadband even telco’s own status page First seen on theregister.com Jump to article: www.theregister.com/2025/10/13/vodafone_outage/
-
Vodafone keels over, cutting off millions of mobile and broadband customers
Outage knocks out phones, broadband even telco’s own status page First seen on theregister.com Jump to article: www.theregister.com/2025/10/13/vodafone_outage/
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
Fenrir PoC Breaks Secure Boot on Nothing Phone (2a) and CMF Phone 1
A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF Phone 1, both of which are powered by MediaTek chipsets. The exploit, named “fenrir”, compromises the secure boot process, allowing attackers to execute arbitrary code at EL3, the most privileged level in the ARM architecture.…
-
Italian businessman’s phone reportedly targeted with Paragon spyware
The alleged targeting of prominent Italian businessman Francesco Gaetano Caltagirone now widens the Paragon spyware scandal in Italy to victims beyond journalists and activists. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/09/italian-businessmans-phone-reportedly-targeted-with-paragon-spyware/
-
ClayRat spyware turns phones into distribution hubs via SMS and Telegram
Fighting a self-spreading spyware: Experts say combating ClayRat requires both technical hardening and behavioral hygiene.”Security teams should enforce a layered mobile security posture that reduces installation paths, detects compromise, and limits blast radius,” said Jason Soroko, Senior Fellow at Sectigo. He recommends blocking sideloading through Android Enterprise policy, deploying mobile threat defense integrated with endpoint…
-
PoC Released for Nothing Phone Code-Execution Vulnerability
A proof-of-concept exploit has been published for a critical flaw in the secure boot process of the Nothing Phone (2a) and CMF Phone 1. This exploit can break the chain of trust and allow full code execution at the highest privilege level, posing a severe risk to device security. Vulnerability Overview A logic flaw in…
-
ICE bought vehicles equipped with fake cell towers to spy on phones
The federal contract shows ICE spent $825,000 on vans equipped with “cell-site simulators” which allow the real-world location tracking of nearby phones and their owners. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/07/ice-bought-vehicles-equipped-with-fake-cell-towers-to-spy-on-phones/
-
Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer
Tags: phoneA London court orders police to disclose reasons for seizing a copying the phone of a UK lawyer who represented Hamas but refused an injunction to prevent police reviewing the phone until after judicial review First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632412/Police-ordered-to-give-reasons-in-closed-court-for-seizing-phone-of-UK-Hamas-lawyer

