Tag: phone
-
Your favourite phone apps might be leaking your company’s secrets
Most of the apps on your phone is talking to a server somewhere – sending and receiving data through messages sent through APIs, the underlying infrastructure that allows apps to communicate. First seen on fortra.com Jump to article: www.fortra.com/blog/favourite-phone-apps-might-leaking-companys-secrets
-
New Smish: New York Department of Revenue
As I was visiting SmishTank to report the most recent SMish that I had received (an iMessage from a +27 South African telephone number claiming to be from ParkMobile) I noticed there had been many recent submissions from the New York Department of Revenue. SmishTank is operated by Professor Muhammad Lutfor Rahman, a colleague of mine…
-
Your budget Android phone might be spying on you
Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike apps from the Google Play Store, many … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/30/low-cost-android-devices-security-risks/
-
SMS Pools and what the US Secret Service Really Found Around New York
Tags: apple, authentication, business, china, conference, control, country, credit-card, crime, crypto, data, email, exploit, finance, fraud, google, group, Hardware, infrastructure, iphone, jobs, korea, law, linux, mfa, mobile, phishing, phone, scam, service, smishing, software, theft, usa, windowsLast week the United Nations General Assembly kicked off in New York City. On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on the idea that this was some state-sponsored sleeper cell waiting to destroy telecommunication services…
-
Japanese city passes two-hours-a-day smartphone usage ordinance
Tags: phoneSymbolic gesture aims to help citizens sleep. Next: Doing something about people who walk while using their phones First seen on theregister.com Jump to article: www.theregister.com/2025/09/24/japan_toyoake_smartphone_limitation_ordinance/
-
Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts
Call recording app Neon was one of the top-ranked iPhone apps, but was pulled offline after a security bug allowed any logged-in user to access the call recordings and transcripts of any other user. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/
-
Cell Tower Hacking Gear Seized Ahead of UN General Assembly
The equipment could be used to disable cell phone towers and conduct denial-of-services attacks across New York City First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cell-tower-hacking-gear-seized-nyc/
-
Cell Tower Hacking Gear Seized Ahead of UN General Assembly
The equipment could be used to disable cell phone towers and conduct denial-of-services attacks across New York City First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cell-tower-hacking-gear-seized-nyc/
-
Nearly half of businesses suffered deepfaked phone calls against staff
AI attacks on the rise First seen on theregister.com Jump to article: www.theregister.com/2025/09/23/gartner_ai_attack/
-
French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack
A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used by organised crime groups First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631442/French-court-ruling-may-lead-to-legal-challenges-over-state-Sky-ECC-and-EncroChat-phone-hack
-
ICE unit signs new $3M contract for phone-hacking tech
Homeland Security Investigations, the law enforcement arm of ICE, adds phone-unlocking tech made by Magnet Forensics to its arsenal of technology used to power the Trump administration’s deportation crackdown. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/
-
Cybercriminals Have a Weird New Way to Target You With Scam Texts
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them. First seen on wired.com Jump to article: www.wired.com/story/sms-blasters-scam-texts/
-
Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop
Tags: phoneA UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged material about his clients First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366630116/Hamas-lawyer-challenges-police-after-they-seized-legal-files-from-phone-in-Schedule-7-stop
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631224/Lufthansa-pilots-EU-Digital-Identity-Wallet-based-travel
-
Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631224/Lufthansa-pilots-EU-Digital-Identity-Wallet-based-travel
-
Samsung patches zero-day security flaw used to hack into its customers’ phones
The Galaxy phone maker said it was notified in August that hackers are actively exploiting the security flaw to target Samsung customers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/16/samsung-patches-zero-day-security-flaw-used-to-hack-into-its-customers-phones/
-
How to Set Up and Use a Burner Phone
Obtaining and using a true burner phone is hard”, but not impossible. Here are the steps you need to take to protect your mobile communications based on the risks you face. First seen on wired.com Jump to article: www.wired.com/story/how-to-set-up-use-burner-phone/
-
Uvalde school district says ransomware attack forcing closure until Thursday
Public schools will be closed for several days in Uvalde, Texas, after a ransomware attack affected access to crucial systems such as phones, camera monitoring, visitor management and more. First seen on therecord.media Jump to article: therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware
-
Hackers steal private data of Gucci, Balenciaga and McQueen customers
Cybercriminals steal details of potentially millions of people in attack on labels’ parent company KeringHackers have stolen data from customers of the luxury fashion group Kering, whose brands include Gucci, Balenciaga and Alexander McQueen.Cyber-attackers have stolen data of potentially millions of customers, including the names, phone numbers and email addresses of customers of the fashion…
-
MI5 unlawfully monitored the phone of BBC journalist Vincent Kearney
The Investigatory Powers Tribunal heard today that the security service has conceded that it unlawfully monitored the phone data of former BBC Spotlight reporter Vincent Kearney First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631277/MI5-unlawfully-monitored-the-phone-of-BBC-journalist-Vincent-Kearney
-
Attorney Generals go after Bitcoin ATMs for supporting Fraud
On 08SEP2025, the District of Columbia’s Attorney General filed a lawsuit against Athena, a “Bitcoin ATM machine” provider with 4100+ BTMs installed. Athena charges as much as a 26% fee when someone deposits cash to buy cryptocurrency. More importantly, the lawsuit claims that 93% of all deposits into Athena “BTMs” in the DC area were…
-
Here’s the tech powering ICE’s deportation crackdown
From phone spyware and facial recognition to forensic phone hacking technology to databases and more, this tech powers Trump’s deportation machine. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/13/heres-the-tech-powering-ices-deportation-crackdown/
-
Jeffrey Epstein’s Yahoo Inbox Revealed
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more. First seen on wired.com Jump to article: www.wired.com/story/jeffrey-epsteins-yahoo-inbox-revealed/
-
Chinese Guarantee Syndicates and the Fruit Machine
When I was speaking to a group of Bank Security people in New York City yesterday, I mentioned “machine rooms” — which are rooms full of Apple iPhones that are used to send iMessage phishing spam. Someone in the audience asked “Where would they get that many phones?” The kids like to use the acronym…
-
12 digital forensics certifications to accelerate your cyber career
Tags: access, apt, attack, browser, chrome, cloud, computer, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, email, endpoint, exploit, google, government, group, hacker, hacking, Hardware, incident response, international, jobs, law, malicious, malware, microsoft, mobile, network, phone, service, skills, soc, technology, threat, tool, training, windowsCellebrite Certified Mobile Examiner (CCME)Certified Computer Examiner (CCE)CyberSecurity Forensic Analyst (CSFA)EC-Council Computer Hacking Forensic Investigator (CHFI)EnCase Certified Examiner (EnCE)Exterro AccessData Certified Examiner (ACE)GIAC Advanced Smartphone Forensics Certification (GASF)GIAC Certified Forensics Analyst (GCFA)GIAC Certified Forensic Examiner (GCFE)GIAC Cloud Forensic Responder (GCFR)GIAC Network Forensic Analysis (GNFA)Magnet Certified Forensics Examiner (MCFE) Cellebrite Certified Mobile Examiner (CCME) Out of…
-
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content.To that end, support for C2PA’s Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The move,…

