Remove Internet Remove Mobile Remove Surveillance
article thumbnail

T-Mobile detected network intrusion attempts and blocked them

Security Affairs

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. This is not the case at T-Mobile.”

Mobile 117
article thumbnail

Collecting and Selling Mobile Phone Location Data

Schneier on Security

The Wall Street Journal has an article about a company called Anomaly Six LLC that has an SDK that's used by "more than 500 mobile applications." mobile phone movement data only to nongovernmental, private-sector clients. [.]. Just one of the many Internet companies spying on our every move for profit.

Mobile 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cell Phone Location Privacy

Schneier on Security

We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. It protects users from fake cell phone towers (IMSI-catchers) and surveillance by cell providers. The user’s traffic is sent to the MVNO gateway and then out onto the Internet, potentially even using a VPN.

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Easily the longest story this year was an investigation into Stark Industries Solutions , a large, mysterious new Internet hosting firm that materialized when Russia invaded Ukraine. A surveillance photo of Connor Riley Moucka, a.k.a.

Scams 226
article thumbnail

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. In the last years, we have reported several cases of companies selling commercial surveillance tools to governments and other entities that have used them for malicious purposes. Pierluigi Paganini.

article thumbnail

Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users

Security Affairs

Researchers from Google’s Threat Analysis Group (TAG) revealed that the Italian surveillance firm RCS Labs was helped by some Internet service providers (ISPs) in Italy and Kazakhstan to infect Android and iOS users with their spyware. ” reads the report published by Google. Pierluigi Paganini.

article thumbnail

Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploit?

Security Affairs

Leaked documents show the surveillance firm Intellexa offering exploits for iOS and Android devices for $8 Million. Intellexa is an Israeli surveillance firm founded by Israeli entrepreneur Tal Dilian, it offers surveillance and hacking solution to law enforcement and intelligence agencies. Pierluigi Paganini.