Security News

Cisco discloses high-severity IP phone bug with exploit code
2022-12-08 19:24

We and our store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products.With your permission we and our partners may use precise geolocation data and identification through device scanning.

New Windows malware also steals data from victims’ mobile phones
2022-11-30 20:51

According to research from cybersecurity company ESET, the APT 37 threat group used the newly discovered malware against very specific entities. The researchers say that the hackers delivered their commands to Dolphin by uploading them on Google Drive.

New Windows malware scans victims’ mobile phones for data to steal
2022-11-30 20:51

Security researchers found a previously unknown backdoor they call Dophin that's been used by North Korean hackers in highly targeted operations for more than a year to steal files and send them to Google Drive storage. According to research from cybersecurity company ESET, the APT 37 threat group used the newly discovered malware against very specific entities.

U.K. Police Arrest 142 in Global Crackdown on 'iSpoof' Phone Spoofing Service
2022-11-25 06:06

A coordinated law enforcement effort has dismantled an online phone number spoofing service called iSpoof and arrested 142 individuals linked to the operation. Worldwide losses exceeded €115 million, with over 200,000 potential victims believed to have been directly targeted through iSpoof in the U.K. alone, the Metropolitan Police noted.

Android phone owner accidentally finds a way to bypass lock screen
2022-11-12 15:07

Cybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his fully patched Google Pixel 6 and Pixel 5 smartphones, enabling anyone with physical access to the device to unlock it. Exploiting the vulnerability to bypass the lock screen on Android phones is a simple five-step process that wouldn't take more than a few minutes.

Hacker Rewarded $70,000 for Finding Way to Bypass Google Pixel Phones' Lock Screens
2022-11-10 15:07

Google has resolved a high-severity security issue affecting all Pixel smartphones that could be trivially exploited to unlock the devices. "The issue allowed an attacker with physical access to bypass the lock screen protections and gain complete access to the user's device," Schütz, who was awarded $70,000 for the lock screen bypass, said in a write-up of the flaw.

Enhance your privacy with this second phone number app deal
2022-11-08 12:21

The Hushed Private Phone Line lifetime subscription gives you a second phone line for calls and texts where you don't want to share your personal number. Hushed earned 4.6 stars out of five on the Apple App Store by being both easy to use and effective at protecting privacy.

This Hidden Facebook Tool Lets Users Remove Their Email or Phone Number Shared by Others
2022-11-07 14:46

Facebook appears to have silently rolled out a tool that allows users to remove their contact information, such as phone numbers and email addresses, uploaded by others. When users sync the contact lists on their devices with Facebook, it's worth pointing out the privacy violation, which stems from the fact that those contacts didn't explicitly consent to the upload. "Someone may have uploaded their address book to Facebook, Messenger or Instagram with your contact information in it," Facebook notes in the page.

New Samsung Maintenance Mode protects your data during phone repairs
2022-10-25 15:24

After a successful pilot program in Korea, Samsung is now rolling out 'Maintenance Mode' to select Galaxy devices globally, to help users protect their sensitive data when they hand over their smartphones at service points. "With Maintenance Mode, we are giving extra reassurance that Galaxy users can keep their privacy, even if they hand their phone to someone" - Samsung.

Scanning phones to detect child abuse evidence is harmful, 'magical' thinking
2022-10-13 07:30

If adopted, these rules would - according to a top British computer security expert - authorize the reading and analysis of people's previously private communication for the sake of potentially preventing the spread of child sex abuse material and terrorism communications. In a paper titled Chat Control or Child Protection?, to be distributed via ArXiv, Anderson offers a rebuttal to arguments advanced in July by UK government cyber and intelligence experts Ian Levy, technical director of the UK National Cyber Security Centre, and Crispin Robinson, technical director of cryptanalysis at Government Communications Headquarters, the UK's equivalent to the NSA. That pro-snoop paper, penned by Levy and Robinson and titled Thoughts on Child Safety on Commodity Platforms, was referenced on Monday by EU Commissioner for Home Affairs, Ylva Johansson, before the European Parliament's Civil Liberties Committee in support of the EU Child Sexual Abuse Regulation, according to Anderson.