#caller-identity

[ follow ]
#apple
Apple
fromTechRepublic
16 hours ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Mobile UX
fromTechRepublic
2 days ago

'Stop Texting': FBI Warning Drives Apple's iPhone Messaging Update - TechRepublic

Apple is adopting a secure version of RCS to enhance messaging security between iPhones and Android devices.
Apple
fromTechRepublic
16 hours ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Mobile UX
fromTechRepublic
2 days ago

'Stop Texting': FBI Warning Drives Apple's iPhone Messaging Update - TechRepublic

Apple is adopting a secure version of RCS to enhance messaging security between iPhones and Android devices.
#data-breach
Privacy professionals
fromTheregister
22 hours ago

Capita's pension portal exposes civil servants' private data

Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Privacy professionals
fromTechCrunch
1 day ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSecurityWeek
6 days ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Privacy professionals
fromSilicon Canals
6 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromTheregister
22 hours ago

Capita's pension portal exposes civil servants' private data

Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Privacy professionals
fromTechCrunch
1 day ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSecurityWeek
6 days ago

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T-Mobile confirmed a data breach was caused by an insider incident affecting only one account with limited information exposed.
Privacy professionals
fromSilicon Canals
6 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Deliverability
fromZDNET
1 day ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Canada news
fromThe Walrus
2 days ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
Mental health
fromwww.theguardian.com
3 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
fromTelecompetitor
3 days ago

AT&T addresses the problem of copper theft for the broadband industry

"In many major metropolitan areas and small towns, copper theft has escalated to levels that can only be described as systemic," Alcutt writes.
Business
EU data protection
fromEngadget
5 days ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
#data-privacy
Privacy technologies
fromArs Technica
1 day ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromZDNET
3 weeks ago

My personal data has been leaked several times - this service helped clean it all up

Data removal services like DeleteMe help protect personal information from being sold online after data breaches.
Privacy technologies
fromArs Technica
1 day ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromZDNET
3 weeks ago

My personal data has been leaked several times - this service helped clean it all up

Data removal services like DeleteMe help protect personal information from being sold online after data breaches.
Parenting
fromSlate Magazine
6 days ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
Apple
fromTheregister
19 hours ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#identity-management
fromThe Hacker News
1 day ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
2 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 day ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
2 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#whatsapp
Privacy professionals
fromTechCrunch
1 week ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy professionals
fromTechCrunch
1 week ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
US politics
fromArs Technica
4 days ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
Apple
fromMail Online
19 hours ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
#phishing
Information security
fromTheregister
2 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromTheregister
2 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Privacy professionals
fromSecurityWeek
2 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
#cybercrime
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Information security
fromTechRepublic
1 day ago

New Scam Alert: QR Codes Replace Links in Traffic Ticket Phishing

Cybercriminals are using QR codes in traffic-violation scams to deceive victims into providing sensitive information.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromWIRED
2 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
UK politics
fromwww.independent.co.uk
2 weeks ago

Morgan McSweeney's 999 call transcript to report phone theft published

The Independent provides critical journalism on key issues without paywalls, relying on donations to support reporting.
Information security
fromThe Hacker News
2 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy technologies
fromTechRepublic
6 days ago

Android Alert: 50 Google Play Apps Linked to 'NoVoice' Malware Reached 2.3M Downloads

NoVoice malware infiltrated Google Play Store, downloaded over 2.3 million times, exposing sensitive data on millions of devices.
UK politics
fromwww.independent.co.uk
2 weeks ago

Apple asks users to verify age in new software update

The Independent emphasizes the importance of accessible journalism and the need for age verification measures in technology to protect children online.
Privacy technologies
fromTNW | Insights
4 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Privacy professionals
fromZDNET
1 week ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
#robocalls
#cybersecurity
fromNextgov.com
3 days ago
Information security

Government official impersonation scam complaints doubled in 2025, FBI report shows

Information security
fromThe Hacker News
1 week ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromNextgov.com
3 days ago

Government official impersonation scam complaints doubled in 2025, FBI report shows

Complaints of government impersonation scams nearly doubled from 2024 to 2025, resulting in approximately $800 million in losses.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy professionals
fromNextgov.com
6 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Information security
fromArs Technica
6 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Privacy technologies
fromTechCrunch
1 week ago

Caller ID app Truecaller hits 500 million monthly users | TechCrunch

Truecaller has reached 500 million monthly active users, highlighting the growing need for spam and scam protection in communication.
Information security
fromTheregister
2 weeks ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Privacy technologies
fromZDNET
2 weeks ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Privacy professionals
fromSlashGear
2 weeks ago

Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion - SlashGear

Online privacy is compromised by data collection from apps, with Meta's platforms being significant offenders.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Privacy professionals
fromTheregister
3 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy technologies
fromTechRepublic
3 weeks ago

Truecaller Gives Families a Way to Stop Scam Calls Remotely - TechRepublic

Truecaller's Family Protection feature enables designated family members to remotely manage scam call defenses for up to five people, including the ability to end suspected fraud calls in real-time on Android devices.
Privacy professionals
fromWIRED
3 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Apple
fromZDNET
1 month ago

How to record an iPhone call (and where and when it's legal to do so)

iPhone calls can be recorded using a second device with a recording app, third-party apps like TapeACall or Google Voice, but recording is only legal with proper consent from all parties in many US states and varies by jurisdiction.
UK news
fromwww.independent.co.uk
2 months ago

How criminals are using AI to clone victims' voices and set up direct debits

Criminals use AI voice cloning to create fraudulent direct-debit authorizations via phone, targeting older people.
France news
fromThe Local France
2 months ago

Scammers target France's new digital health card

Phishing emails falsely claim France's digital carte vitale must be updated or health coverage will be suspended; the e-card is optional and not required.
Privacy professionals
fromWIRED
3 weeks ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
Privacy technologies
fromTechCrunch
4 weeks ago

Truecaller now lets you hang up on scammers -- on behalf of your family | TechCrunch

Truecaller launched a family group admin feature enabling fraud call alerts and remote call termination to protect members from scams, now available globally including India.
fromABC11 Raleigh-Durham
4 weeks ago

Do you tap to pay? 'Ghost tapping' scams could target your money

The ease of use means the ease of stealing. There are pieces of software and devices that are doing exactly the same thing that a point of sale does and it's transacting on your phone or on your credit card and if you don't have a thumbprint or a biometric on your phone, they can walk up and if you're not paying attention in a crowded area, they get close enough and they touch your phone they can do a transaction.
Information security
Privacy technologies
fromTech Times
3 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromGSMArena.com
1 month ago

NordVPN call protection is now available on Android to flag potential scams

NordVPN launches call protection for Android users across multiple countries, warning about potential scam calls before answering by analyzing phone number reputation data.
Information security
fromTechRepublic
1 month ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
fromZDNET
1 month ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Privacy professionals
fromSlate Magazine
2 months ago

Help! We Just Dodged an Obvious Scam Call. But One Thing the Scammer Said Has Us Extremely Worried.

A man is falsely credited as the named creator of an Islamophobic book under his name, risking career and reputation; he seeks removal.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
fromTelecompetitor
2 months ago

Robocall volume shows little sign of decreasing: Report

Over the past five years, annual robocall volume has consistently remained between approximately 50 billion and 55 billion, according to the YouMail Robocall Index. Robocall volume for 2025 totaled 52.5 billion, down a little over 1% from the 2024 total of 52.8 billion. December's 4.1 billion robocalls were up 6.4% from November but down 5.7% from December 2024. YouMail noted that robocalls increased in November and December 2025 after reaching a multi-year low in October.
Privacy technologies
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
fromMarTech
2 months ago

TransUnion looks to bring trust back to mobile communications channels | MarTech

To understand the strategy at work here, you likely need only look at your recent phone calls and text messages. Mobile channels are a mess. As a result, many consumers refuse to answer calls from numbers not listed in their contact list. This poses a significant problem for organizations across industries, including financial services, healthcare and the public sector, which often need to use the phone to reach people and relay critical information.
Information security
fromSilicon Canals
2 months ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
#smartphone-privacy
Privacy technologies
fromFast Company
1 month ago

Why using facial recognition on your phone could leave you vulnerable

Biometric phone unlocking is convenient but can be compelled by authorities or exploited by others, making passcodes a safer option.
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
fromArs Technica
2 months ago

Millions of people imperiled through sign-in links sent by SMS

The links are sent to people seeking a range of services, including those offering insurance quotes, job listings, and referrals for pet sitters and tutors. To eliminate the hassle of collecting usernames and passwords-and for users to create and enter them-many such services instead require users to provide a cell phone number when signing up for an account. The services then send authentication links or passcodes by SMS when the users want to log in.
Privacy technologies
fromTechRepublic
3 months ago

Ring's Facial-Recognition Feature Sparks Privacy Debate

According to TechCrunch's previous coverage, the feature enables Ring users to recognize visitors' faces and locate lost pets by connecting with neighbors who also use Ring devices. Amazon also rolled out an Alexa+ feature that acts as a smart doorbell assistant, alerting users to a visitor before they open the door. As reported by TechCrunch, Amazon stated that the Familiar Faces feature allows you to create a catalog of up to 50 people by tagging them in the Ring app.
Privacy technologies
#mobile-privacy
fromSlashGear
1 month ago
Privacy technologies

Changing 5 Phone Settings Can Limit The Amount Of Data Apps Collect About You - SlashGear

fromZDNET
2 months ago
Privacy technologies

Your phone is sharing data without your knowledge - how to stop it ASAP

fromSlashGear
1 month ago
Privacy technologies

Changing 5 Phone Settings Can Limit The Amount Of Data Apps Collect About You - SlashGear

fromZDNET
2 months ago
Privacy technologies

Your phone is sharing data without your knowledge - how to stop it ASAP

fromArs Technica
1 month ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
[ Load more ]