verizon

New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report
Tom Eston | | AI, AI Hype, AirTag, Android 6, Apple, bluetooth, Cyber Security, Cybersecurity, Data breaches, Data Privacy, Digital Privacy, Episodes, Exploits, google, Information Security, Infosec, ios, Malware, Phishing, Podcast, Podcasts, Privacy, Secret Trackers, security, social engineering, Stalking, technology, trackers, verizon, Verizon DBIR, Vulnerabilities, Weekly Edition
In episode 330 Tom, Scott, and Kevin discuss the new features for iPhones and Android phones designed to warn users about secret trackers, possibly aiding in identifying stalkers. The hosts discuss Apple ...

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps
Tom Eston | | apps, ATT, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, fines, google, Google Play Store, Information Security, Infosec, location data, malicious apps, Mobile, Play Store, Podcast, Podcasts, Privacy, security, T-Mobile, technology, User Location Data, verizon, Weekly Edition, wireless
In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...

Cybersecurity Insights with Contrast CISO David Lindner | 5/3/24
Insight #1 Here we go again: Verizon’s new Data Breach Investigations Report (DBIR) is out, and once again, unauthorized uses of web application credentials and exploits of vulnerabilities in web applications are ...

Cybersecurity Insights with Contrast CISO David Lindner | 5/3/24
Insight #1 Here we go again: Verizon’s new Data Breach Investigations Report (DBIR) is out, and once again, unauthorized uses of web application credentials and exploits of vulnerabilities in web applications are ...

SIM Swappers Try Bribing T-Mobile and Verizon Staff $300
Richi Jennings | | 2fa, 2FA bypass, 2FA Flaws, 2FA policies, 2FA/MFA, bypass 2FA, Industry Insider, Insider, Insider attack, Insider Attacks, insider breach, Insider Fraud, insider risk, malicious social engineering, MFA, MFA hacks, mfa login, MFA Methods, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, SB Blogwatch, SIM swap, sim swap fraud, SIM swap scams, SIM swapping, sms scam, SMS scams, SMS Spam, SMS Spamming, social engineeering, T-Mobile, t-mobile breach, t-mobile data breach, T-Mobile hack, two factor authentication, two-factor-authentication.2fa, verizon, verizon data breach, Verizon Wireless
Not OK: SMS 2FA — Widespread spam targets carrier employees, as scrotes try harder to evade two-factor authentication ...
Security Boulevard
The Importance of Opting Out of CPNI Data Sharing
Tom | | ATT, CPNI, CPNI Data Sharing, CPNI Opt Out, Cybersecurity, Data Privacy, Digital Privacy, fcc, Federal Communications Commission, government, Information Security, Infosec, Internet, Internet Provider, Mobile, mobile phone, Mobile Provider, Phone Call, Phone Calls, Podcast, Privacy, Privacy on the Internetz, regulation, security, smartphone, T-Mobile, technology, telecommunications, telephone, verizon
Let’s talk about a topic that’s incredibly important for your privacy and data security. In this blog I’m going to talk about why you should opt out of the sharing of CPNI ...

How to Opt Out of CPNI Data Sharing
Tom Eston | | ATT, CPNI, CPNI Data Sharing, CPNI Opt Out, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, Federal Communications Commission, government, Information Security, Infosec, Internet, Internet Provider, Mobile, mobile phone, Mobile Provider, Phone Call, Phone Calls, Podcast, Privacy, regulation, security, smartphone, T-Mobile, technology, telecommunications, telephone, verizon, Weekly Edition
Did you know that your mobile phone provider can give data like phone numbers you’ve called and received, the time and date of those calls, and even your location data to their ...

2023 Palo Alto Report: Top 3 Cybersecurity Threats to Look Out For
Palo Alto Networks’ Unit 42 Network Threat Trends Research Report has been released! Let’s dive into some key findings and see how Votiro Cloud can address and mitigate some of the highlighted threats ...

Takeaways from the 2023 Verizon DBIR: 9 Ways Hackers Can Use Files to Attack Your Organization
The annual Verizon Data Breach Investigations Report (DBIR) is an essential resource used by enterprise security leaders to understand the latest trends in cybersecurity and learn lessons on improving organizational defenses. Let’s ...
Latest Verizon Data Breach Report: Retail is an Easy Target for Web Application Attacks
The theft of payment card data from retail organizations is on the rise, with 18 percent of breaches attributable to Magecart attacks, according to Verizon's 2023 Data Breach Investigations Report (DBIR) released ...