Tag: phone
-
Nevada State Offices Halts Services After Cyber Incident
Nevada Grappling with Statewide IT Disruption, Forcing Suspension of Services. Nevada officials are investigating a network security breach that forced state offices to suspend services and knocked key systems offline, including websites and phone lines, though emergency services remain active and no data exposure has been confirmed. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/nevada-state-offices-halts-services-after-cyber-incident-a-29290
-
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
Exclusive: Hackers can take over the accounts of TheTruthSpy spyware customers, putting their victims’ private phone data at risk thanks to a new security flaw. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/25/a-new-security-flaw-in-thetruthspy-phone-spyware-is-putting-victims-at-risk/
-
CISA warns of Apple zero-day used in targeted cyberattacks
The Cybersecurity and Infrastructure Security Agency (CISA) gave civilian federal agencies until September 11 to implement a fix for CVE-2025-43300, a vulnerability affecting popular brands of Apple phones, iPads and Macbooks. First seen on therecord.media Jump to article: therecord.media/cisa-warns-of-apple-zero-day
-
Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures to distribute malicious archives and applications. Recent detections include ZIP files like >>Coordination of the Chief of Army Staff’s Visit to China.zip,
-
Protect Your Phone: Guard Against SIM Swap Scams and Fraud
Rrise of SIM swap fraud, its implications, and how to protect yourself. Stay informed and secure your accounts today! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/protect-your-phone-guard-against-sim-swap-scams-and-fraud-2/
-
‘Limited’ data leak at Aussie telco turns out to be 280K customer details
iiNet breach blamed on single stolen login, with emails, phone numbers, and addresses exposed First seen on theregister.com Jump to article: www.theregister.com/2025/08/20/tpg_telecom_iinet_breach/
-
Phone Searches at the US Border Hit a Record High
Tags: phoneCustoms and Border Protection agents searched nearly 15,000 devices from April through June of this year, a nearly 17 percent spike over the previous three-month high in 2022. First seen on wired.com Jump to article: www.wired.com/story/phone-searches-at-the-us-border-hit-a-record-high/
-
Phone Searches at the US Border Hit a Record High
Tags: phoneCustoms and Border Protection agents searched nearly 15,000 devices from April through June of this year, a nearly 17 percent spike over the previous three-month high in 2022. First seen on wired.com Jump to article: www.wired.com/story/phone-searches-at-the-us-border-hit-a-record-high/
-
New zero-day startup offers $20 million for tools that can hack any smartphone
Prices for hacking tools that allow governments to break into mobile phones keep going up, thanks to efforts by tech firms shoring up their cybersecurity. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/20/new-zero-day-startup-offers-20-million-for-tools-that-can-hack-any-smartphone/
-
Millions Allegedly Affected in Allianz Insurance Breach
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/millions-allianz-insurance-breach
-
Australian ISP iiNet Reports Data Breach, Customer Accounts Stolen
Australian ISP iiNet confirms data breach as hackers stole 280,000 email accounts, phone numbers and user data using… First seen on hackread.com Jump to article: hackread.com/australia-isp-iinet-data-breach-customer-accounts-stolen/
-
New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They are mainly targeting mobile payment services such as Apple Pay and Google Pay. This attack vector involves relaying stolen payment card credentials from compromised devices to mules’ burner phones, enabling…
-
McCullough Review into PSNI spying on journalists and lawyers delayed
Angus McCullough KC is to present findings of an independent review of police spying on phone data of lawyers, journalists and NGOs in Northern Ireland in October First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628835/McCullough-Review-into-PSNI-spying-on-journalists-and-lawyers-delayed
-
Ghanaian fraudsters arrested for BEC/Sakawa
In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.” In Ghana, the term for the same activity is “Sakawa.” Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or “Sakawa Chairman Busted” or “Sakawa Kingpin Bows to Extradition!” On 08AUG2025 the US Attorney’s office…
-
Air France, KLM Alert Authorities of Data Breach
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/air-france-klm-data-breach
-
Ransomware Hits Phone Repair Insurance Firm, Causing Millions in Damage
Wilhelm Einhaus, a businessman from Bockum-Hövel, Germany, pioneered cell phone insurance services, establishing a robust network that integrated innovative offerings like a 24-hour repair and replacement program. His enterprise expanded rapidly, partnering with major telecommunications providers such as Deutsche Telekom and 1&1, and distributing products through over 5,000 retail outlets nationwide. At its zenith, the…
-
German phone repair biz collapses following 2023 ransomware attack
Founder miffed over prosecutors holding onto its Bitcoin First seen on theregister.com Jump to article: www.theregister.com/2025/08/04/einhaus_group_ransomware_collapse/
-
Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits
Meta backs Pwn2Own Ireland 2025 in Cork, offering up to $1M for WhatsApp exploits; targets include phones and wearables, Oct 2124 via Zero Day Initiative. Meta is sponsoring ZDI’s Pwn2Own Ireland 2025 hacking competition, where participants can earn big prizes for smartphone, WhatsApp and wearable device exploits. Participants can earn up to $1 million for…
-
Another Telephone Phish
A person called me on the phone a few moments ago claiming to be from US Bank. He said there was some fraud detected on my account: someone created a new checking account with my identity information. “So, you have my identity information?” I asked. “Yes,” he replied. “Can you prove who you say you……
-
Senator warns of new UK surveillance risks to US citizens following Apple ‘back door’ row
US lawmarker raises concerns that UK may have ordered Google to introduce ‘backdoors’ into end-to-end encrypted back-ups impacting billions of Android phone users First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628083/Senator-warns-of-new-UK-surveillance-risks-to-US-citizens-following-Apple-back-door-row
-
New Choicejacking Attack Steals Data from Phones via Public Chargers
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds. First seen on hackread.com Jump to article: hackread.com/choicejacking-attack-steals-data-phones-public-chargers/
-
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Tags: attack, cybercrime, google, group, infrastructure, mandiant, phone, ransomware, software, tactics, vmwareThe notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America.”The group’s core tactics have remained consistent and do not rely on software exploits. Instead, they use a proven playbook centered on phone calls to an IT help desk,” Google’s Mandiant team…
-
The heartbreak of watching a parent fall for fraud: ‘Dad, this is a scam have you given her money?’ | Naima Brown
The scammers my dad encountered were not sophisticated, my father suspended his own disbelief wilfully. But many scammers <em>are</em> sophisticated and they’re getting harder to detectBomba wasn’t the first, but she exploded in our lives like a digital grenade. <em>She’s not real,</em> I told my dad then in his early seventies. I was in Australia…
-
Operation Dark Phone: Murder By Text this jaw-dropping tale of how police hacked gangs is like The Wire
This docu-drama is cleverly built around the messages intercepted by the National Crime Agency when they penetrated a chat network between criminal organisations. It’s hugely revealingPolice work rarely resembles The Shield or Line of Duty. It’s mostly paperwork, online training and referring people to driver offender courses. But sometimes life imitates art. In 2020, international…

