Motherboard was able to buy real time location data from a broker for a T-Mobile phone for $300. This is not illegal. The food chain for location data is very complicated. In this case, T-Mobile sold the data to data aggregator Zumigo. Zumigo sold it to Microbilt. Microbilt sold it to a bounty hunter. Who […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hamas Creates Fake Missile Warning App to Hack Israelis The Times of Israel is reporting that Hamas has created and was distributing a fake Code Red rocket warning app. The app, according to Clearsky Cyber Security, takes over the phone and is impossible to remove, even if the app is deleted. Once infected, the app […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We often tell you about web sites that use your data and sometimes in ways that you don’t expect, but usually it is to sell it to advertisers. However, apparently, AT&T has created a new revenue stream. AT&T calls the program Project Hemisphere. Hemisphere is a program which allows law enforcement to search AT&T call […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AT&T released it’s first public cybersecurity incident analysis report last week. As a network security services provider, they get to see the attacks in real time. One service that AT&T offers is to mitigate security threats in the network before they ever reach you. They also offer cyber security consulting services. AT&T’s competitor Verizon also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI is warning people to be wary of fake federal web sites which both take their PII and also steal money from them. The web sites rank high on the search engine page, ask for PII and collect a fee. Sometimes they ask people to send their birth certificate or other information. People are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There was an interesting article in Wired that “outed” Verizon’s use of perma-cookies. Simply explained, perma-cookies are cookies that identify the user that are added by the carrier between the user’s browser and the receiving web site. The effect of this is an ID that will follow the user, potentially across devices, silently, with no […]
Continue reading →
[DISPLAY_ACURAX_ICONS]