article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

The new $30 AirTag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons to scan it with a mobile phone and discover its owner’s phone number if the AirTag has been set to lost mode. In 2008, a cyber attack described at the time as “the worst breach of U.S.

Mobile 348
article thumbnail

Who Is the Network Access Broker ‘Babam’?

Krebs on Security

A search on the username “bo3dom” using Constella’s service reveals an account at ipmart-forum.com , a now-defunct forum concerned with IT products, such as mobile devices, computers and online gaming. back in 2008 (notice again the suspect “www” as part of the domain name).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Safer with Google: Advancing Memory Safety

Google Security

For example, we are investing to expand Rust usage at Google beyond Android and other mobile use cases and into our server, application, and embedded ecosystems. Stanford University, 2008. This will unlock the use of MSLs in low-level code environments where C and C++ have typically been the language of choice. Technical report.

article thumbnail

The Olympics: a timeline of scams, hacks, and malware

Malwarebytes

And while actual, measurable cyberrattacks and hacks surrounding The Olympics did not truly get rolling until 2008 in Beijing, The Olympic games have traditionally been quite the target for malicious acts of all kinds, dating back years. 2008 Beijing. Yes, games thrown into the mix alongside mobile. Shall we take a look?

Scams 143
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

The Insurance firm that was founded in 2008 has a background of selling over 19 million policies and is planning to expand its business reach after obtaining an insurance broker’s license from India’s IRDAI.

article thumbnail

New Zealand Security Bureau halts Spark from using Huawei 5G equipment

Security Affairs

New Zealand intelligence agency asked mobile company Spark to avoid using Huawei equipment for 5G infrastructure. Huawei was already helping Spark to build 5G mobile networks. “In New Zealand, Huawei has previously helped build mobile networks. In 2008, New Zealand signed a free-trade deal with China.

Mobile 98
article thumbnail

Security Affairs newsletter Round 254

Security Affairs

A bug in the Walgreens mobile app leaked customers messages. CIA Hacking unit APT-C-39 hit China since 2008. Hackers gained access to T-Mobile customers and employee personal info. Nemty ransomware LOVE_YOU malspam campaign. SurfingAttack – hacking phones via ultrasonic waves. Hundreds of Microsoft sub-domains open to hijacking.