Tag: Phones
-
Thousands of phones and routers swept into proxy service, unbeknownst to users
Crooks are working overtime to anonymize their illicit online activities using thousands of devices of unsuspecting users, as evidenced by …
-
Ambient light sensors can reveal your device activity. How big a threat is it?
An overwhelming majority of handheld devices these days have ambient light sensors built into them. A large percentage of TVs and monitors …
-
Smashing Security podcast #353: Phone hacking, Piers Morgan, and Carole’s Christmas cockup
Piers Morgan is less than happy after a judgement that there is “no doubt” he knew phone hacking was going on at the Daily Mirror, and …
-
Ukraine’s Largest Phone Operator Hack Tied War With Russia
Kyivstar, Ukraine’s leading mobile network operator, is experiencing a significant shutdown allegedly due to a cyber-attack. The company, …
-
Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records
A WIRED analysis of leaked police documents verifies that a secretive government program is allowing federal, state, and local law …
-
US House Republicans Had Their Phones Confiscated to Stop Leaks
In an attempt to wrest control from raucous far-right hardliners amid the fight for a new House speaker, Republican Party leaders are …
-
System Admin Pleads Guilty for Selling Pirated Business Phone Software Licenses
For taking part in a large international scheme to earn millions of dollars by selling pirated business telephone system software …
-
GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military Phones
The UK and its Five Eyes partners (Australia, Canada, New Zealand and the US) officially support Ukraine’s attribution of Infamous …
-
Xiaomi Mi Phones Flags Telegram as Malicious App
Xiaomi, the Asian smartphone giant, has implemented measures within its MIUI operating system that flag Telegram as a malicious app. This …
-
Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping
AudioCodes desk phones and Zoom’s Zero Touch Provisioning (ZTP) that could be potentially exploited by a malicious attacker to conduct …
-
Cisco Small Business IP Phones Flaw Allows XSS & Injection Attacks
Cisco has published a security advisory that states that they have discovered two vulnerabilities, an XSS and an HTML injection …
●●●