How Bad Was the New T-Mobile API Data Breach?
Another major telco admits personal data was obtained by hackers who exploited a leaky API. 11% of all Americans are affected.
Another major telco admits personal data was obtained by hackers who exploited a leaky API. 11% of all Americans are affected.
Agencies tasked with upholding the law have a hypocritical habit of wasting public money on trying to intimidate ordinary people.
The comms platform cited repression in Iran as an example of why they are helping users to remain connected.
Police jumped to the wrong conclusion after noticing a suspicious device in the back seat of a car they stopped at a road check.
Bader Al-Asaker, confidante of the ruler of Saudi Arabia, recruited US-Lebanese Twitter employee Ahmad Abouammo to feed information about Saudi dissidents.
The details of customers who should have remained unlisted were made available via Telstra’s directory services. CFO Michael Ackland blamed the breach on a ‘misalignment of databases’.
Singtel CEO Yuen Kuan Moon said “there is much work to be done” to restore confidence in Australia’s second-largest mobile operator.
The creators of PGPP want to protect users from IMSI-catchers and location monitoring by rotating IMSIs and obfuscating geography but their methods are unlikely to scale and have important drawbacks.
The hacker acted in response to the brutal crackdown following the suspected murder of Mahsa Amini by Iran’s morality police.
A new pseudo-network offers privacy-conscious mobile phone users the ability to change their IMSI at the press of a button.