#telecom-security

[ follow ]
Information security
fromSecurityWeek
11 hours ago

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million

Odido data breach exposed names, contact details, dates of birth, customer and bank account numbers, and passport/driver's license information for about 6.2 million customers.
Information security
fromTheregister
3 days ago

Singapore spent 11 months evicting suspected telco spies

Singapore executed an 11-month operation to remove UNC3886 intrusions from all four major telecom providers, preserving network integrity and long-term intelligence security.
Information security
fromTheregister
1 month ago

Korean telco failed at femtocell security, exposed customers

Thousands of KT femtocells used a shared certificate and weak device security, enabling cloning that allowed micropayments fraud and interception of customer communications.
fromTechCrunch
3 months ago

Australian spy chief warns Chinese hackers are 'probing' critical networks for espionage and sabotage | TechCrunch

According to Burgess, a hacker group known as Volt Typhoon is trying to break into critical infrastructure networks such as power, water, and transportation systems. Burgess warned that successful hacks could affect energy and water supplies, and cause widespread outages. The U.S. has previously said that the Chinese hackers have spent years planting malware on critical infrastructure systems that are capable of causing disruptive cyberattacks when activated.
Information security
fromAbove the Law
3 months ago

Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack - Above the Law

Last year almost a dozen major U.S. ISPs were the victim of a massive, historic intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The "Salt Typhoon" hack was so severe, the intruders spent much of the last year rooting around the ISP networks even after discovery. AT&T and Verizon, two of the compromised companies, apparently didn't think it was worth informing subscribers any of this happened.
Information security
World news
fromTheregister
3 months ago

Xi Jinping jokes about backdoors in Xiaomi smartphones

Xi Jinping joked that Xiaomi smartphones might contain backdoors, underscoring security concerns about Chinese telecom devices and potential export implications.
fromTheregister
3 months ago

Network operator ponders building submarine cable - on land

Senior Transmission Architect Nic Breytenbach explained that apparent contradiction to The Register by pointing out that submarine cables run up and down Africa's east and west coasts, but that no single connection crosses the continent. When submarine cables on the east coast - which mostly carry traffic to Europe or Asia - experience trouble, carriers must route traffic south around the Cape of Good Hope, then all the way up Africa's west coast. Capacity on submarine cables is hard to find, and expensive when available.
Tech industry
Information security
fromIT Pro
4 months ago

Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense

DDoS attacks on critical networks have surged to terabit-scale, exploiting compromised home connections and causing rapid, intense outages and data breaches.
US news
fromDataBreaches.Net
4 months ago

U.S. Secret Service disrupts telecom network that threatened NYC during U.N. General Assembly - DataBreaches.Net

Secret Service dismantled SIM farms in the New York tri-state area containing 300 servers and over 100,000 SIM cards capable of massive, disruptive text messaging attacks.
fromInsideHook
4 months ago

Scammers' New Methods Involve Fake Cell Phone Towers

Does anyone enjoy getting text messages from scanners on their phones? The answer, presumably, is "No," with the possible exception of a very specific variety of masochist. And with that in mind, wireless carriers have taken steps to make it harder for scammers to use their services, with the FCC issuing guidance to that effect in 2023. What happens when a scammer can't use wireless infrastructure? As an alarming new report reveals, they make their own.
Information security
[ Load more ]