Mobile

tripwire.com

SIM swap! Man charged after million dollar cryptocurrency theft

Prosecutors believe 21-year-old Manhattan resident Nicholas Truglia targeted the cellphones of Silicon Valley executives in “SIM-swapping” attacks.

Read more in my article on the Tripwire State of Security blog.


0 sec read

Telegram lets scammers connect directly with potential victims by way of stored contacts

Scammers can use the Telegram mobile messaging app to connect with a potential victim if they already have their phone number in their contact list.

David Bisson reports.


1 min read

WhatsApp vulnerability could allow Facebook and others to read messages

A security issue could allow Facebook and other parties to intercept and read the messages you send via WhatsApp.

David Bisson reports.


1 min read

Instant Verification lets mobile users authenticate themselves without an SMS

Facebook has created a new feature called Instant Verification that is designed to help Android users login to online accounts and services without all the fuss of confirming their email address or dealing with a verification code sent by SMS.

David Bisson reports.


1 min read

Insecure IoT gear can help hackers turn your phone into a GPS tracker

A hacker could exploit a series of vulnerabilities in Belkin home automation gear to turn your Android phone into a secret GPS tracker.

David Bisson reports.


1 min read

This modded phone helps you secretly cheat at Poker

You can purchase a specially-modified smartphone online that uses infrared light to spot cards and helps you cheat at gambling.

David Bisson reports.


1 min read

How one teen gained access to T-Mobile’s network for free – without any data plan or contract

A teenager recently found a way to gain access to T-Mobile’s mobile network for free – that is, without any data plan or contracts.

David Bisson reports.


1 min read

A new low! SMS scammers prey on parents’ fears to make a few bucks

Fraudsters are sending fake SMS messages to parents, purporting to be about a terrible car accident involving their children.

David Bisson reports.


1 min read

How to protect yourself from mobile ID theft

An emerging form of ID theft has recently surfaced over in the United States – involving your mobile phones.

Yasin Soliman reports.


2 min read

Three men charged for international cell phone fraud scheme

A federal judge has charged three men for their alleged participation in a sophisticated international cell phone fraud scheme.

David Bisson reports.


1 min read

Telegram bug allows attackers to crash devices, jack up phone bills

Two Iranian security researchers have found a way to exploit a vulnerability in the popular Telegram instant messaging app.

David Bisson reports.


1 min read

Dozens of mobile health apps found vulnerable to security risks

Researchers have found that dozens of mobile health apps are vulnerable to at least some of the top ten mobile risks identified by the Open Web Application Security Project (OWASP) project.

David Bisson reports.


1 min read

Talking about smartphone security on The Phones Show

I made a guest appearance on “The Phones Show”, a podcast all about the world of mobile.

Take a listen, and find out what mobile phone I use and why…


23 sec read

How to hack into an email account, just by knowing your victim’s mobile number

Symantec has issued a warning about a successful scam being perpetrated against users of webmail services such as Gmail, Outlook and Yahoo.


2 min read

welivesecurity.com

How George Clooney made sure phone hackers didn’t ruin his wedding

Newly weds George Clooney and Amal Alamuddin supplied guests with “burner phones” to prevent photographs from falling into the hands of hackers and the tabloid press.

Learn more in my article on the We Live Security website.


0 sec read

tripwire.com

Are rogue cell towers snooping on your calls?

There are bogus cellphone towers operating across the United States that could be used to snoop on, and even hijack, passing calls, texts and other communications.

Learn more in my article on the Tripwire State of Security blog.


0 sec read