Tag: phone
-
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
by
in SecurityNewsSeveral malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have be… First seen on thehackernews.com Jump to article: thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
-
NI Policing Board pressed to open inquiry into PSNI spying on journalists’ phones
by
in SecurityNewsAmnesty International and the Committee on the Administration of Justice have asked Northern Ireland’s policing watchdog to open an inquiry into the P… First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366572652/NI-Policing-Board-pressed-to-open-inquiry-into-PSNI-spying-on-journalists-phones
-
FCC: Phone Network Bugs Must Be Fixed ” But are SS7/Diameter Beyond Repair?
by
in SecurityNewsFast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities. The post u… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/fcc-ss7-diameter-richixbw-2/
-
Feds Patching Years-Old SS7 Vulnerability in Phone Networks
by
in SecurityNewsThe FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and Diameter protocols t… First seen on gbhackers.com Jump to article: gbhackers.com/feds-patching-years-old-ss7-vulnerability-in-phone-networks/
-
Google Fixes Two Pixel Zero-Days Exploited by Forensic Firms
by
in SecurityNewsBugs Allowed Device Unlocking and Memory Access. Google addressed two zero-day vulnerabilities in Pixel mobile phones that forensic firms exploited to… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/google-fixes-two-pixel-zero-days-exploited-by-forensic-firms-a-24785
-
Google fixes two Pixel zero-day flaws exploited by forensics firms
Google has fixed two Google Pixel zero-days exploited by forensic firms to unlock phones without a PIN and gain access to the data stored within them…. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-fixes-two-pixel-zero-day-flaws-exploited-by-forensics-firms/
-
Don’t Answer the Phone: Inside a Real-Life Vishing Attack
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/dont-answer-phone-inside-real-life-vishing-attack
-
Free VPN apps on Google Play turned Android phones into proxies
by
in SecurityNewsOver 15 free VPN apps on Google Play were found using a malicious software development kit that turned Android devices into unwitting residential prox… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/free-vpn-apps-on-google-play-turned-android-phones-into-proxies/
-
UK council yanks IT systems and phone lines offline following cyber ambush
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/03/12/leicester_city_council_stays_shtum/
-
NI Policing Board pressed to open inquiry into PSNI spying on journalists phones
by
in SecurityNewsAmnesty International and the Committee on the Administration of Justice have asked Northern Irelands policing watchdog to open an inquiry into the Po… First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366572652/NI-Policing-Board-pressed-to-open-inquiry-into-PSNI-spying-on-journalists-phones
-
Misconfigured Firebase Instances Expose 125 Million User Records
by
in SecurityNewsA weakness in a Firebase implementation allowed researchers to gain access to names, phone numbers, email addresses, plaintext passwords, confidential… First seen on securityweek.com Jump to article: www.securityweek.com/misconfigured-firebase-instances-expose-125-million-user-records/
-
SIM swappers hijacking phone numbers in eSIM attacks
by
in SecurityNewsSIM swappers have adapted their attacks to steal a target’s phone number by porting it into a new eSIM card, a digital SIM stored in a rewritable chip… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sim-swappers-hijacking-phone-numbers-in-esim-attacks/
-
SIM swappers now stealing phone numbers from eSIMs
by
in SecurityNewsSIM swappers have adapted their attacks to steal a target’s phone number from an eSIM card, a rewritable SIM chip present on many recent smartphone mo… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sim-swappers-now-stealing-phone-numbers-from-esims/
-
PixPirate Android malware uses new tactic to hide on phones
by
in SecurityNewsThe latest version of the PixPirate banking trojan for Android employs a previously unseen method to hide from the victim while remaining active on th… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/
-
Predator Spyware Targeted Mobile Phones in New Countries
by
in SecurityNewsFirst seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/predator-spyware-targeted-new/
-
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones
by
in SecurityNewsA team of academic researchers show that a new set of attacks called ‘VoltSchemer’ can inject voice commands to manipulate a smartphone’s voice assist… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/voltschemer-attacks-use-wireless-chargers-to-inject-voice-commands-fry-phones/
-
Signal rolls out usernames that let you hide your phone number
by
in SecurityNews
Tags: phoneEnd-to-end encrypted messaging app Signal finally allows users to pick custom usernames to connect with others while hiding their phone numbers and pr… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/signal-rolls-out-usernames-that-let-you-hide-your-phone-number/
-
Signal Finally Rolls Out Usernames, So You Can Keep Your Phone Number Private
by
in SecurityNews
Tags: phoneFirst seen on wired.com Jump to article: www.wired.com/story/signal-launches-usersnames-phone-number-privacy/
-
200,000 Facebook Marketplace user records leaked on hacking forum
by
in SecurityNewsA threat actor leaked 200,000 records on a hacker forum, claiming they contained the mobile phone numbers, email addresses, and other personal informa… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/200-000-facebook-marketplace-user-records-leaked-on-hacking-forum/
-
SEC bitcoin hack was result of SIM-swapping
A cyber attack on the US financial regulator earlier in January 2024 occurred after hackers took over one of its mobile phone accounts in a so-called … First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366567197/SEC-Bitcoin-hack-was-result-of-SIM-swapping
-
Executive alleged to be behind EncroChat encrypted phone network arrested
by
in SecurityNewsA businessman allegedly behind EncroChat, an encrypted phone network that was used by organised crime groups, has been extradited from the Dominican R… First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366569393/Executive-alleged-to-be-behind-EncroChat-encrypted-phone-network-arrested
-
23andMe Failed to Detect Account Intrusions for Months
by
in SecurityNewsPlus: North Korean hackers get into generative AI, a phone surveillance tool that can monitor billions of devices gets exposed, and ambient light sens… First seen on wired.com Jump to article: www.wired.com/story/23andme-failed-to-detect-account-intrusions-for-months/
-
Aviva Revenge Phone Hacker Jailed For 18 Months
by
in SecurityNewsFirst seen on http: Jump to article: packetstormsecurity.org/news/view/25721/Aviva-Revenge-Phone-Hacker-Jailed-For-18-Months.html
-
PhoneFactor Launches Authentication Solution for Windows Phone
by
in SecurityNewsFirst seen on http: Jump to article: t.co/oLTJXDLe
-
Phone users worry about security, but won’t pay for it
by
in SecurityNewsA survey of more than 1000 UK mobile phone users shows that while they are concerned about the security of their phones, they believe that they alread… First seen on http: Jump to article: www.infosecurity-magazine.com//view/29624/phone-users-worry-about-security-but-wont-pay-for-it/
-
[Video] ghz or bust: DEF CON
by
in SecurityNewsWifi is cool and so is cellular, but the real fun stuff happens below the GHz line. Medical systems, mfg plant/industrial systems, cell phones, power … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ghCy11kmwfM/6224
-
Several times a year…
First seen on http: Jump to article: bit.ly/SPSuSg
-
Windows Phone 8 review: Microsoft lays a foundation for success: Im an unapologetic fan of Windows Phone 7. I l…
by
in SecurityNewsFirst seen on http: Jump to article: bit.ly/ZGZyqb
-
Even A Child Can Make A Trojan To Pillage Windows Phone 8
by
in SecurityNewsFirst seen on http: Jump to article: packetstormsecurity.org/news/view/21748/Even-A-Child-Can-Make-A-Trojan-To-Pillage-Windows-Phone-8.html
-
Windows Phone 8 malware? This teen hacker claims to have created a prototype
A teenage hacker prodigy in India claims to have developed a prototype of malware that will run on smartphones running Microsoft’s new Windows Phone 8… First seen on http: Jump to article: feedproxy.google.com/~r/nakedsecurity/~3/liFWojYRH3E/