Tag: phone
-
Cell Tower Hacking Gear Seized Ahead of UN General Assembly
The equipment could be used to disable cell phone towers and conduct denial-of-services attacks across New York City First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cell-tower-hacking-gear-seized-nyc/
-
Nearly half of businesses suffered deepfaked phone calls against staff
AI attacks on the rise First seen on theregister.com Jump to article: www.theregister.com/2025/09/23/gartner_ai_attack/
-
French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack
A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used by organised crime groups First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631442/French-court-ruling-may-lead-to-legal-challenges-over-state-Sky-ECC-and-EncroChat-phone-hack
-
ICE unit signs new $3M contract for phone-hacking tech
Homeland Security Investigations, the law enforcement arm of ICE, adds phone-unlocking tech made by Magnet Forensics to its arsenal of technology used to power the Trump administration’s deportation crackdown. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/
-
Cybercriminals Have a Weird New Way to Target You With Scam Texts
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them. First seen on wired.com Jump to article: www.wired.com/story/sms-blasters-scam-texts/
-
Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop
Tags: phoneA UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged material about his clients First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366630116/Hamas-lawyer-challenges-police-after-they-seized-legal-files-from-phone-in-Schedule-7-stop
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631224/Lufthansa-pilots-EU-Digital-Identity-Wallet-based-travel
-
Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631224/Lufthansa-pilots-EU-Digital-Identity-Wallet-based-travel
-
Samsung patches zero-day security flaw used to hack into its customers’ phones
The Galaxy phone maker said it was notified in August that hackers are actively exploiting the security flaw to target Samsung customers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/16/samsung-patches-zero-day-security-flaw-used-to-hack-into-its-customers-phones/
-
How to Set Up and Use a Burner Phone
Obtaining and using a true burner phone is hard”, but not impossible. Here are the steps you need to take to protect your mobile communications based on the risks you face. First seen on wired.com Jump to article: www.wired.com/story/how-to-set-up-use-burner-phone/
-
Uvalde school district says ransomware attack forcing closure until Thursday
Public schools will be closed for several days in Uvalde, Texas, after a ransomware attack affected access to crucial systems such as phones, camera monitoring, visitor management and more. First seen on therecord.media Jump to article: therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware
-
Hackers steal private data of Gucci, Balenciaga and McQueen customers
Cybercriminals steal details of potentially millions of people in attack on labels’ parent company KeringHackers have stolen data from customers of the luxury fashion group Kering, whose brands include Gucci, Balenciaga and Alexander McQueen.Cyber-attackers have stolen data of potentially millions of customers, including the names, phone numbers and email addresses of customers of the fashion…
-
MI5 unlawfully monitored the phone of BBC journalist Vincent Kearney
The Investigatory Powers Tribunal heard today that the security service has conceded that it unlawfully monitored the phone data of former BBC Spotlight reporter Vincent Kearney First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631277/MI5-unlawfully-monitored-the-phone-of-BBC-journalist-Vincent-Kearney
-
Attorney Generals go after Bitcoin ATMs for supporting Fraud
On 08SEP2025, the District of Columbia’s Attorney General filed a lawsuit against Athena, a “Bitcoin ATM machine” provider with 4100+ BTMs installed. Athena charges as much as a 26% fee when someone deposits cash to buy cryptocurrency. More importantly, the lawsuit claims that 93% of all deposits into Athena “BTMs” in the DC area were…
-
Here’s the tech powering ICE’s deportation crackdown
From phone spyware and facial recognition to forensic phone hacking technology to databases and more, this tech powers Trump’s deportation machine. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/13/heres-the-tech-powering-ices-deportation-crackdown/
-
Jeffrey Epstein’s Yahoo Inbox Revealed
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more. First seen on wired.com Jump to article: www.wired.com/story/jeffrey-epsteins-yahoo-inbox-revealed/
-
Chinese Guarantee Syndicates and the Fruit Machine
When I was speaking to a group of Bank Security people in New York City yesterday, I mentioned “machine rooms” — which are rooms full of Apple iPhones that are used to send iMessage phishing spam. Someone in the audience asked “Where would they get that many phones?” The kids like to use the acronym…
-
12 digital forensics certifications to accelerate your cyber career
Tags: access, apt, attack, browser, chrome, cloud, computer, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, email, endpoint, exploit, google, government, group, hacker, hacking, Hardware, incident response, international, jobs, law, malicious, malware, microsoft, mobile, network, phone, service, skills, soc, technology, threat, tool, training, windowsCellebrite Certified Mobile Examiner (CCME)Certified Computer Examiner (CCE)CyberSecurity Forensic Analyst (CSFA)EC-Council Computer Hacking Forensic Investigator (CHFI)EnCase Certified Examiner (EnCE)Exterro AccessData Certified Examiner (ACE)GIAC Advanced Smartphone Forensics Certification (GASF)GIAC Certified Forensics Analyst (GCFA)GIAC Certified Forensic Examiner (GCFE)GIAC Cloud Forensic Responder (GCFR)GIAC Network Forensic Analysis (GNFA)Magnet Certified Forensics Examiner (MCFE) Cellebrite Certified Mobile Examiner (CCME) Out of…
-
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content.To that end, support for C2PA’s Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The move,…
-
Kenyan Filmmakers Targeted with FlexiSPY Spyware Tracking Messages and Social Media
The revelation that commercially available FlexiSPY spyware was clandestinely installed on devices belonging to Kenyan filmmakers while in police custody has ignited fresh concerns over press freedom and governmental overreach. Forensic analysis conducted by the Citizen Lab at the University of Toronto confirmed that two of the filmmakers’ phones were infected with the intrusive software…
-
France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Compromised data includes personal data such as patients’ full names, ages, phone numbers and email addresses First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/france-regional-healthcare/
-
1.6 Million Voices Stolen: Your Voice Could Be Next
A cybersecurity researcher’s recent discovery from yesterday should make every gym member’s blood run cold. Jeremiah Fowler uncovered something that defies belief, 1,605,345 audio recordings sitting completely exposed online, no password, no encryption, no protection whatsoever. These were not random files. They were five years of personal phone calls and voicemails from gym members spanning…
-
Researchers find spyware on phones belonging to Kenyan filmmakers
FlexiSPY, which is commercially available, can be more easily detected than far more expensive mercenary spyware available to nation states but has similar capabilities once installed, said John Scott-Railton, a forensic researcher at The Citizen Lab who helped confirm the infection. First seen on therecord.media Jump to article: therecord.media/researchers-spyware-kenya-filmmaker-phone
-
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/09/signal-secure-backup-feature/
-
Maduro Hails Huawei Mate X6 Gift From China as ‘Unhackable’ by U.S.
Venezuelan President Nicolás Maduro made bold claims about cybersecurity during a press conference on September 1, 2025, as he showcased a Huawei smartphone gifted to him by Chinese President Xi Jinping. Holding up the device before international media in Caracas, Maduro declared it >>the best phone in the world>the Americans can’t […] The post Maduro…
-
Maduro Hails Huawei Mate X6 Gift From China as ‘Unhackable’ by U.S.
Venezuelan President Nicolás Maduro made bold claims about cybersecurity during a press conference on September 1, 2025, as he showcased a Huawei smartphone gifted to him by Chinese President Xi Jinping. Holding up the device before international media in Caracas, Maduro declared it >>the best phone in the world>the Americans can’t […] The post Maduro…

