Port Out Scam
Verizon Makes SIM Swapping Hard. Why Doesn’t AT&T, Sprint, and T-Mobile?
Verizon employs different security procedures when porting a phone number to a different SIM card than the other carriers. This is making SIM swapping attacks harder to perform against Verizon customers.
a day ago
Thieves Used Audio Deepfake of a CEO to Steal $243,000
The heist is just a preview of how unprepared we are for AI-powered cybercrime.
Edward Ongweso Jr
Cops Hijack Botnet, Remotely Wipe Malware From 850,000 Computers
Police in France took down a large cryptocurrency-mining malware operation with the help of a cybersecurity firm.
Infamous Forum For Instagram Hackers Gets Hacked by Other Hackers
Hackers hacked the OGUSERS forum and published its database in another hacker forum.
AT&T Contractors and a Verizon Employee Charged With Helping SIM Swapping Criminal Ring
The indictments show that sometimes stealing phone numbers to hack accounts is an inside job.
Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support
Hackers abused a Microsoft customer support portal that allowed them to read the emails of any non-corporate account.
Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years
For years, the arrest and case has been kept under-wraps. Friday, a court sentenced Thomas White to 5 years and 4 months for his role in running a huge dark web drug marketplace.
Julian Assange’s Charges Are Centered on Hacking, Not Publishing Classified Information
For years, it has been publicly reported that Julian Assange offered to help Chelsea Manning break into a classified computer system. Now the Department of Justice has charged Assange for that.
A Decryption Key for Law Firm Emails in Hacked 9/11 Files Has Been Released
Someone has published the decryption key for the third layer of allegedly 9/11-linked documents from The Dark Overlord hacking group.
Scammers Are Filing Fake Trademarks to Steal High-Value Instagram Accounts
Scammers don't only hack Instagram accounts. Sometimes they just provide Instagram with some paperwork.
How Google Tracks Hackers
This week, CYBER speaks to Shane Huntley, the Director of Google's Threat Analysis Group (TAG), essentially Google's hacker hunting team.
How Hackers and Scammers Break into iCloud-Locked iPhones
In a novel melding of physical and cybercrime, hackers, thieves, and even independent repair companies are finding ways to "unlock iCloud" from iPhones.