Tag: phone
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/
-
MPs urge government to stop Britain’s phone theft wave through tech
Committee says Apple, Google, and Samsung could render stolen handsets worthless if compelled to act First seen on theregister.com Jump to article: www.theregister.com/2025/10/25/uk_committee_phone_theft/
-
Tired of Unpaid Toll Texts? Blame the ‘Smishing Triad’
Chinese smishers, the bane of every American with a phone, have been shifting to lower-frequency, possibly higher-impact government impersonation attacks. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/unpaid-toll-texts-smishing-triad
-
DTTS – Zero Trust DNS Enforcement: Policy Violation Management
In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, including being able to enforce “My network, my rules” approach to egress control. However, in this world where existing applications need to…
-
Mobian makes Debian’s latest ‘Trixie’ release pocket-sized
Another phone Linux? The Reg attempts to disentangle the options First seen on theregister.com Jump to article: www.theregister.com/2025/10/21/mobian_trixie/
-
Mobian makes Debian’s latest ‘Trixie’ release pocket-sized
Another phone Linux? The Reg attempts to disentangle the options First seen on theregister.com Jump to article: www.theregister.com/2025/10/21/mobian_trixie/
-
MIND upgrades endpoint DLP (and more!)
Tags: ai, automation, business, cloud, compliance, control, credentials, data, endpoint, google, healthcare, identity, leak, microsoft, okta, phone, risk, service, threatMIND Flight 1021 with service to Stress-Free DLP is now boarding. All ticketed and confirmed passengers should make their way to the boarding gate at this time. The airport hums with noise. Rolling suitcases bump over tile floors, boarding announcements echo through speakers and the line at TSA snakes endlessly ahead. You shift your weight…
-
Maine 2025 Ballot Questions Redux
QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban prepaid postage on absentee ballot return envelopes, limit the number of drop boxes, require voters to……
-
International Sting Takes Down SIM Box Criminal Network
The operation took down a massive SIM card fraud network that provided fake phone numbers from more than 80 countries to criminals. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/international-sting-sim-box-criminal-network
-
Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/car-byod-risk
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
China finds “irrefutable evidence” of US NSA cyberattacks on time Authority
China claims the US NSA hacked its National Time Service Center by exploiting staff phone flaws since March 2022, stealing sensitive data. China’s Ministry of State Security announced it has found “irrefutable evidence” that the US National Security Agency (NSA) conducted cyberattacks on its National Time Service Center, reports Bloomberg. The China National Time Service…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and Euro4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and Euro4.5M in losses. The service used 1,200 SIM-boxes with 40,000 SIM cards to supply phone numbers for phishing, investment…
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
European police bust network selling thousands of phone numbers to scammers
Authorities raided a “SIM farm” operation that used tens of thousands of cards to enable fraud in several European countries, including Latvia and Austria. First seen on therecord.media Jump to article: therecord.media/europe-sim-farms-raided-latvia-austria-estonia
-
Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
Multiple Cisco desk, IP, and video phones are at risk of remote denial-of-service (DoS) and cross-site scripting (XSS) attacks due to flaws in their Session Initiation Protocol (SIP) software. The weaknesses affect Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 models when they are registered to Cisco Unified Communications…
-
Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
Multiple Cisco desk, IP, and video phones are at risk of remote denial-of-service (DoS) and cross-site scripting (XSS) attacks due to flaws in their Session Initiation Protocol (SIP) software. The weaknesses affect Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 models when they are registered to Cisco Unified Communications…
-
German parliamentarian urges officials to investigate Hungary for spyware abuse
A German member of the European Parliament has filed a complaint urging authorities to investigate Hungarian Prime Minister Viktor Orbán for allegedly ordering the country’s secret service to break into his phone with spyware. First seen on therecord.media Jump to article: therecord.media/german-parliament-hungary-spyware
-
Locked out of your Gmail account? Google says phone a friend
Recovery feature lets trusted contacts help you get back in when other methods fail First seen on theregister.com Jump to article: www.theregister.com/2025/10/16/google_gmail_trusted_contacts/
-
Locked out of your Gmail account? Google says phone a friend
Recovery feature lets trusted contacts help you get back in when other methods fail First seen on theregister.com Jump to article: www.theregister.com/2025/10/16/google_gmail_trusted_contacts/
-
Satellites found exposing unencrypted data, including phone calls and some military comms
Researchers spent the past year alerting affected organizations, including T-Mobile and ATT, but warn that large amounts of satellite data will remain unencrypted and exposed for some years to come. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/14/satellites-found-exposing-unencrypted-data-including-phone-calls-and-some-military-comms/
-
Vodafone keels over, cutting off millions of mobile and broadband customers
Outage knocks out phones, broadband even telco’s own status page First seen on theregister.com Jump to article: www.theregister.com/2025/10/13/vodafone_outage/
-
Vodafone keels over, cutting off millions of mobile and broadband customers
Outage knocks out phones, broadband even telco’s own status page First seen on theregister.com Jump to article: www.theregister.com/2025/10/13/vodafone_outage/
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/

