article thumbnail

Cell Phone Location Privacy

Schneier on Security

It protects users from fake cell phone towers (IMSI-catchers) and surveillance by cell providers. Monthly: The user pays their bill to the MVNO (credit card or otherwise) and the phone gets anonymous authentication (using Chaum blind signatures) tokens for each time slice (e.g., It’s a clever system. All MVNO SIMs are identical.

article thumbnail

Apple released emergency updates for actively exploited flaws

Security Affairs

RPAC (CVE-2025-31201) – An attacker with read/write access could bypass Pointer Authentication on iOS. However, the limited, targeted nature of these attacks against iOS users suggests that commercial surveillance vendors or a nation-state actor likely exploited the flaws. Apple addressed the flaw by removing the vulnerable code.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Vulnerabilities in GPS Trackers

Schneier on Security

Other vulnerabilities include a flawed authentication mechanism in the mobile app that can allow attackers to access the hardcoded key for locking down the trackers and the ability to use a custom IP address that makes it possible for hackers to monitor and control all communications to and from the device.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

U.S. CISA adds Apple products and Microsoft Windows NTLM flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

RPAC (CVE-2025-31201) An attacker with read/write access could bypass Pointer Authentication on iOS. However, the limited, targeted nature of these attacks against iOS users suggests that commercial surveillance vendors or a nation-state actor likely exploited the flaws. Apple addressed the flaw by removing the vulnerable code.

article thumbnail

New LightSpy spyware variant comes with enhanced data collection features targeting social media platforms

Security Affairs

” LightSpy now targets social media platforms like Facebook and Instagram from Android, extracting messages, contacts, and metadata, enhancing surveillance and exploitation potential. “This is the first reference we are aware of Facebook and Instagram database targeting within LightSpy’s command structure. ” Hunt.io

article thumbnail

Twitter cans 2FA service provider over surveillance claims

Malwarebytes

Twitter is transitioning away from from its two-factor authentication (2FA) provider, Mitto AG, a Swiss communications company. The companies that bought the access reportedly used it to help governments conduct secret surveillance against users through their phones. So where does that leave Twitter users who use SMS 2FA?