article thumbnail

Why You Should Opt Out of Sharing Data With Your Mobile Provider

Krebs on Security

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device — unless and until you affirmatively opt out of this data collection.

Mobile 291
article thumbnail

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Many security experts are warning of the risks of using the popular app, threat actors could be potentially interested in data collected by FaceApp. FaceApp was developed in 2017 by Wireless Lab, when it was downloaded 80 million times, but now thanks to the challenge it is becoming viral. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Your Wi-Fi Router Doubles as an Apple AirTag

Krebs on Security

Apple collects this location data to give Apple devices a crowdsourced, low-power alternative to constantly requesting global positioning system (GPS) coordinates. Rye said Apple’s response addressed the most depressing aspect of their research: That there was previously no way for anyone to opt out of this data collection.

article thumbnail

Mobile virtual network operator Mint Mobile discloses a data breach

Security Affairs

Mint Mobile experienced a recent data breach, exposing customers’ personal information to unauthorized access by threat actors. As an MVNO, Mint Mobile doesn’t own its own wireless infrastructure. ” reads the data breach notification email sent to the impacted customers.

Mobile 106
article thumbnail

Best Wi-Fi Security & Performance Testing Tools for 2022

eSecurity Planet

It is also useful in assessing the security of wireless networks, as it can capture live, over-the-air wireless traffic. wireless LANs, with tools available to sniff wireless packets, intercept them and log traffic passing through, manage wireless drivers, recover lost keys, detect issues, and crack WPA and WEP.

article thumbnail

Cognitive and Reasoning about Things and Smart Objects

Security Boulevard

In early IoT installations, networks of sensors, wireless sensor networks, and RFID (Radio Frequency Identification) devices were deployed in small to medium-size deployments within an enterprise. Furthermore, they were primarily concerned with data collecting and processing, with little intelligence. In this article, [.].

IoT 59
article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

News article : It’s not clear whether the security flaws were intentional or not, but the report speculated that proper encryption might interfere with some of China’s ubiquitous online surveillance tools, especially systems that allow local authorities to snoop on phones using public wireless networks or internet cafes.