article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks.

Mobile 89
article thumbnail

How to Detect and Respond to Account Misuse

Identity IQ

How to Detect and Respond to Account Misuse IdentityIQ As digital connectivity continues to grow, safeguarding your online accounts from misuse is becoming increasingly crucial. Account misuse can result in alarming repercussions, including privacy breaches, financial losses, and identity theft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC X account hacked to hawk crypto-scams

Malwarebytes

This would suggest the compromise was the result of a SIM swapping attack, where an attacker takes control of a phone number by convincing a mobile carrier to transfer the victim’s phone number to a SIM card they own. Although apparently the SEC did not have 2FA enabled for its X account!

article thumbnail

It’s Still Easy for Anyone to Become You at Experian

Krebs on Security

I immediately suspected that Experian was still allowing anyone to recreate their credit file account using the same personal information but a different email address, a major authentication failure that was explored in last year’s story, Experian, You Have Some Explaining to Do.

article thumbnail

Nude photo theft offers lessons in selfie security

Malwarebytes

A man from New York has pleaded guilty to one count of aggravated identity theft, and one count of computer intrusion causing damage. Working with another former graduate, he accessed the school email accounts of dozens of college students and stole private nude photographs. What happened? How did they do it? Defending yourself.

article thumbnail

#Secure: Locking Down Your Social Media in Style

Approachable Cyber Threats

By securing your accounts, including making your profiles private and sharing your posts with only a limited audience such as your friends and family, you can limit the potential for identity theft and reduce the risk of unauthorized access to information that puts you and your loved ones at risk.

Media 52
article thumbnail

#Secure: Locking Down Your Social Media in Style

Approachable Cyber Threats

By securing your accounts, including making your profiles private and sharing your posts with only a limited audience such as your friends and family, you can limit the potential for identity theft and reduce the risk of unauthorized access to information that puts you and your loved ones at risk.

Media 52