Tag: mobile
-
T-Mobile says telco hackers had ‘no access’ to customer call and text message logs
The phone giant said hackers did not access the contents or logs of customer phone calls or text messages, during an industry-wide attack on phone and internet companies. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/27/t-mobile-says-telco-hackers-had-no-access-to-customer-call-and-text-message-logs/
-
Mobile Threat Defense: Safeguarding Your Data on the Go
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/native/mobile-threat-defense-safeguarding-your-data-on-the-go
-
T-Mobile Says Sensitive Customer Data Wasn’t Impacted In China-Linked Attack
by
in SecurityNewsT-Mobile CISO Jeff Simon said a post Wednesday that ‘our defenses protected our sensitive customer information,’ in the wake of reports about a major hacking operation by a China-linked threat actor targeting internet service providers. First seen on crn.com Jump to article: www.crn.com/news/security/2024/t-mobile-says-sensitive-customer-data-wasn-t-impacted-in-china-linked-attack
-
Chinese hackers breached T-Mobile’s routers to scope out network
T-Mobile says the Chinese “Salt Typhoon” hackers who recently compromised its systems as part of a series of telecom breaches first hacked into some of its routers to explore ways to navigate laterally through the network. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-breached-t-mobiles-routers-to-scope-out-network/
-
Mobile security policy missing at most SMEs, CyberSmart survey finds
by
in SecurityNewsNew research conducted by CyberSmart, provider of SME security solutions indicates that organisations not only allow employees to use their personal mobile phones to compete work tasks but actively expect them to. The research, conducted by OnePoll in Autumn 2024, polled 250 small-medium enterprise (SME) business owners or leaders in the UK, found that 60%…
-
Zscaler beleuchtet Trends, Risiken und Zero-Trust-Defense-Strategien für Mobile, IoT- und OT-Cybersecurity
by
in SecurityNewsZscaler veröffentlicht seinen jährlichen mit dem Überblick über die mobile und IoT-/OT-Cyberbedrohungslandschaft von Juni 2023 bis Mai 2024. Die Ergebnisse des Reports unterstreichen die Dringlichkeit für Organisationen, die Sicherheit von mobilen Geräten, IoT- und OT-Systemen neu zu bewerten. ThreatLabz identifizierte mehr als 200 bösartige Apps im […] First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/11/26/zscaler-beleuchtet-trends-risiken-und-zero-trust-defense-strategien-fuer-mobile-iot-und-ot-cybersecurity/
-
Why New York is a Prime Location for Leading Mobile Development Agencies
by
in SecurityNews
Tags: mobileNew York, the city that never sleeps, is renowned as a global epicentre for innovation, creativity, and business… First seen on hackread.com Jump to article: hackread.com/new-york-prime-location-mobile-development-agencies/
-
Privacy-focused mobile phone launches for high-risk individuals
The mobile company Cape’s Android-based phone complies with U.S. law but claims to offer a higher degree of privacy for users. First seen on cyberscoop.com Jump to article: cyberscoop.com/cape-phone-privacy-calea-tracking/
-
>>Ghost Tap<< Emerges: Cybercriminals Exploit NFC Relay for Contactless Cash-Outs
by
in SecurityNewsThreatFabric reveals a new tactic allowing fraudsters to anonymously drain stolen credit cards linked to mobile wallets. A new and concerning trend in financial cybercrime has surfaced, dubbed >>Ghost Tap
-
Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025
This blog shares Zimperium’s 2025 mobile security trends and threat predictions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/zimperium-predicts-data-privacy-emphasis-more-evasive-phishing-attacks-and-rise-of-sideloading-in-2025/
-
New Ghost Tap attack abuses NFC mobile payments to steal money
by
in SecurityNewsCybercriminals have devised a novel method to cash out from stolen credit card details linked to mobile payment systems such as Apple Pay and Google Pay, dubbed ‘Ghost Tap,’ which relays NFC card data to money mules worldwide. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/
-
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
by
in SecurityNewsThreat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale.The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.”Criminals can now misuse…
-
Salt Typhoon Hits T-Mobile as Part of Telecom Attack Spree
by
in SecurityNewsThe company says no sensitive data was stolen, but federal agencies claim otherwise. CISA and FBI sources said attackers accessed all records of specific customers and the private communications of targeted individuals. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/salt-typhoon-tmobile-telecom-attack-spree
-
T-Mobile Breached in Major Chinese Cyber-Attack on Telecoms
T-Mobile was hit by Salt Typhoon, a Chinese cyber-espionage group targeting US and global telecom firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/tmobile-breached-chinese/
-
The Urgent And Critical Need To Prioritize Mobile Security
by
in SecurityNewsOrganizations that get serious about mobile risks will reduce business risk and boost trust and confidence in their employees, customers, business partners and investors. The post The Urgent And Critical Need To Prioritize Mobile Security appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/the-urgent-and-critical-need-to-prioritize-mobile-security/
-
Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters
by
in SecurityNews
Tags: access, ai, api, attack, authentication, awareness, business, cloud, communications, compliance, control, credentials, crime, data, defense, detection, encryption, exploit, finance, fraud, Hardware, iam, international, mfa, mobile, office, PCI, privacy, regulation, risk, service, software, strategy, technology, threat, vulnerabilityFraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters madhav Tue, 11/19/2024 – 05:28 International Fraud Awareness Week (November 17-23) is a critical time to consider the significant risks that fraud poses to individuals and organizations. Thanks to AI, fraud attempts and successful attacks are alarmingly common and more advanced, with many…
-
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
by
in SecurityNewsU.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.The adversaries, tracked as Salt Typhoon, breached the company as part of a “monthslong campaign” designed to harvest cellphone communications of “high-value intelligence targets.” It’s not clear what information was…
-
Brave on iOS adds new “Shred” button to wipe site-specific data
by
in SecurityNewsBrave Browser 1.71 for iOS introduces a new privacy-focused feature called “Shred,” which allows users to easily delete site-specific mobile browsing data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/brave-on-ios-adds-new-shred-button-to-wipe-site-specific-data/
-
T-Mobile reportedly compromised in sweeping Chinese attack against telcos
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/t-mobile-reportedly-compromised-in-sweeping-chinese-attack-against-telcos
-
T-Mobile US ‘monitoring’ China’s ‘industry-wide attack’ amid fresh security breach fears
by
in SecurityNewsUn-carrier said to be among those hit by Salt Typhoon, including AT&T, Verizon First seen on theregister.com Jump to article: www.theregister.com/2024/11/18/tmobile_us_attack_salt_typhoon/
-
T-Mobile Hit by Chinese Cyber Spies; Sees Minimal Impact
by
in SecurityNewsTelco Giant’s Probe Finds ‘No Evidence’ of Customer or Sensitive Data Breach. The world’s largest telecommunications carrier, T-Mobile U.S., said it was targeted as part of a wide-ranging cyberespionage operation the U.S. government attributes to China but has found no sign of data access or theft. Other known victims of the campaign include AT&T, Verizon…
-
Chinese Salt Typhoon Hacked T-Mobile in US Telecom Breach Spree
by
in SecurityNewsAnother day, another hack at T-Mobile! This time, Chinese state-sponsored group Salt Typhoon hacked T-Mobile, targeting US telecoms… First seen on hackread.com Jump to article: hackread.com/chinese-salt-typhoon-hacked-t-mobile-telecom-breach/
-
T-Mobile is one of the victims of the massive Chinese breach of telecom firms
T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it was hacked as part of a long-running cyber espionage campaign targeting Telco companies. Recently, the FBI and CISA announced they are continuing to investigate a large-scale cyber-espionage campaign by China-linked threat actors targeting U.S. telecoms,…
-
T-Mobile Also Targeted in Chinese Telecom Hacking Campaign
T-Mobile has also been targeted by the Chinese group Salt Typhoon in a major espionage campaign targeting US telecom companies. The post T-Mobile Also Targeted in Chinese Telecom Hacking Campaign appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-also-targeted-in-chinese-telecom-hacking-campaign/
-
T-Mobile confirms it was hacked in recent wave of telecom breaches
by
in SecurityNewsT-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/t-mobile-confirms-it-was-hacked-in-recent-wave-of-telecom-breaches/
-
T-Mobile hack linked to Chinese breaches of telecom networks
by
in SecurityNewsThis is the ninth known cyberattack to target T-Mobile in recent years, according to an ongoing count by TechCrunch. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/16/t-mobile-says-it-was-hacked-linked-to-chinese-breaches-of-telecom-networks/
-
T-Mobile says it was hacked, linked to Chinese breaches of telecom networks
by
in SecurityNewsThis is the ninth known cyberattack to target T-Mobile in recent years, according to an ongoing count by TechCrunch. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/16/t-mobile-says-it-was-hacked-linked-to-chinese-breaches-of-telecom-networks/