FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

Notepad++ Users, You May Have Been Hacked by China

By: Dan Goodin, Ars Technica — February 4th 2026 at 19:52
Suspected Chinese state-backed hackers hijacked the Notepad++ update infrastructure to deliver a backdoored version of the popular free source code editor and note-taking app for Windows.
☐ ☆ ✇ WIRED

Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims

By: Lily Hay Newman, Matt Burgess, Andy Greenberg — January 31st 2026 at 11:30
Plus: AI agent OpenClaw gives cybersecurity experts the willies, China executes 11 scam compound bosses, a $40 million crypto theft has an unexpected alleged culprit, and more.
☐ ☆ ✇ WIRED

Revealed: Leaked Chats Expose the Daily Life of a Scam Compound’s Enslaved Workforce

By: Andy Greenberg, Lily Hay Newman, Matt Burgess — January 27th 2026 at 11:00
A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials—including 4,200 pages of messages that lay out its operations in unprecedented detail.
☐ ☆ ✇ WIRED

He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive

By: Andy Greenberg — January 27th 2026 at 11:00
A source trapped inside an industrial-scale scamming operation contacted me, determined to expose his captors’ crimes—and then escape. This is his story.
☐ ☆ ✇ WIRED

DOGE May Have Misused Social Security Data, DOJ Admits

By: Maddy Varner, Andy Greenberg, Andrew Couts — January 24th 2026 at 11:30
Plus: The FAA blocks drones over DHS operations, Microsoft admits it hands over Bitlocker encryption keys to the cops, and more.
☐ ☆ ✇ WIRED

149 Million Usernames and Passwords Exposed by Unsecured Database

By: Lily Hay Newman — January 23rd 2026 at 11:00
This “dream wish list for criminals” includes millions of Gmail, Facebook, banking logins, and more. The researcher who discovered it suspects they were collected using infostealing malware.
☐ ☆ ✇ WIRED

US Hackers Reportedly Caused a Blackout in Venezuela

By: Andy Greenberg, Maddy Varner, Lily Hay Newman — January 17th 2026 at 11:30
Plus: AI reportedly caused ICE to send agents into the field without training, Palantir’s app for targeting immigrants gets exposed, and more.
☐ ☆ ✇ WIRED

Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking

By: Andy Greenberg, Lily Hay Newman — January 15th 2026 at 12:00
Flaws in how 17 models of headphones and speakers use Google’s one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.
☐ ☆ ✇ WIRED

ICE Can Now Spy on Every Phone in Your Neighborhood

By: Lily Hay Newman, Matt Burgess — January 10th 2026 at 11:30
Plus: Iran shuts down its internet amid sweeping protests, an alleged scam boss gets extradited to China, and more.
☐ ☆ ✇ WIRED

How to Protect Your iPhone or Android Device From Spyware

By: Kate O'Flaherty — January 3rd 2026 at 10:00
Being targeted by sophisticated spyware is relatively rare, but experts say that everyone needs to stay vigilant as this dangerous malware continues to proliferate worldwide.
☐ ☆ ✇ WIRED

The Worst Hacks of 2025

By: Lily Hay Newman — December 29th 2025 at 12:00
From university breaches to cyberattacks that shut down whole supply chains, these were the worst cybersecurity incidents of the year.
☐ ☆ ✇ WIRED

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

By: Andy Greenberg — December 23rd 2025 at 11:00
Online black markets once lurked in the shadows of the dark web. Today, they’ve moved onto public platforms like Telegram—and are racking up historic illicit fortunes.
☐ ☆ ✇ WIRED

Hackers Stole Millions of PornHub Users’ Data for Extortion

By: Andy Greenberg, Lily Hay Newman, Dell Cameron — December 20th 2025 at 11:30
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more.
☐ ☆ ✇ WIRED

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

By: Dan Goodin, Ars Technica — December 17th 2025 at 10:30
The weak RC4 for administrative authentication has been a hacker holy grail for decades.
☐ ☆ ✇ WIRED

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

By: Lily Hay Newman, Matt Burgess — December 13th 2025 at 11:30
Plus: Travelers to the US may have to hand over five years of social media history, South Korean CEOs are resigning due to cyberattacks, and more.
☐ ☆ ✇ WIRED

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

By: Andy Greenberg — December 10th 2025 at 17:00
The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign.
☐ ☆ ✇ WIRED

The US Won't Sanction China for Salt Typhoon Hacking

By: Andy Greenberg — December 6th 2025 at 11:30
Plus: Officials warn of a disturbingly stealthy Chinese malware specimen, a CISA nomination stalls, and more.
☐ ☆ ✇ WIRED

Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

By: Lily Hay Newman — December 4th 2025 at 22:04
Cloudflare CEO Matthew Prince claims the internet infrastructure company’s efforts to block AI crawlers are already seeing big results.
☐ ☆ ✇ WIRED

The WIRED Guide to Digital Opsec for Teens

By: JP Aumasson, Lily Hay Newman — November 29th 2025 at 12:00
Practicing good “operations security” is essential to staying safe online. Here's a complete guide for teenagers (and anyone else) who wants to button up their digital lives.
☐ ☆ ✇ WIRED

Poems Can Trick AI Into Helping You Make a Nuclear Weapon

By: Matthew Gault — November 28th 2025 at 10:00
It turns out all the guardrails in the world won’t protect a chatbot from meter and rhyme.
☐ ☆ ✇ WIRED

The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’

By: Matt Burgess — November 26th 2025 at 16:33
Myanmar’s military has been blowing up parts of the KK Park scam compound. Experts say the actions are likely for show.
☐ ☆ ✇ WIRED

Amazon Is Using Specialized AI Agents for Deep Bug Hunting

By: Lily Hay Newman — November 24th 2025 at 14:00
Born out of an internal hackathon, Amazon’s Autonomous Threat Analysis system uses a variety of specialized AI agents to detect weaknesses and propose fixes to the company’s platforms.
☐ ☆ ✇ WIRED

US Border Patrol Is Spying on Millions of American Drivers

By: Dell Cameron, Andrew Couts — November 22nd 2025 at 11:30
Plus: The SEC lets SolarWinds off the hook, Microsoft stops a historic DDoS attack, and FBI documents reveal the agency spied on an immigration activist Signal group in New York City.
☐ ☆ ✇ WIRED

This Hacker Conference Installed a Literal Antivirus Monitoring System

By: Violet Blue — November 21st 2025 at 11:00
At New Zealand's Kawaiicon cybersecurity convention, organizers hacked together a way for attendees to track CO2 levels throughout the venue—even before they arrived.
☐ ☆ ✇ WIRED

With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech

By: Lily Hay Newman — November 20th 2025 at 10:00
Generative AI is making it even easier for attackers to exploit old and often forgotten network equipment. Replacing it takes investment, but Cisco is making the case that it’s worth it.
☐ ☆ ✇ WIRED

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

By: Lily Hay Newman — November 7th 2025 at 22:34
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems.
☐ ☆ ✇ WIRED

Hack Exposes Kansas City’s Secret Police Misconduct List

By: Dhruv Mehrotra, Peggy Lowe — November 3rd 2025 at 10:00
A major breach of the Kansas City, Kansas, Police Department reveals, for the first time, a list of alleged officer misconduct including dishonesty, sexual harassment, excessive force, and false arrest.
☐ ☆ ✇ WIRED

How to Hack a Poker Game

By: Lauren Goode, Michael Calore, Andy Greenberg — October 31st 2025 at 09:00
This week on Uncanny Valley, we break down how one of the most common card shufflers could be altered to cheat, and why that matters—even for those who don’t frequent the poker table.
☐ ☆ ✇ WIRED

Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm

By: Kim Zetter — October 29th 2025 at 17:13
Peter Williams, a former executive of Trenchant, L3Harris’ cyber division, has pleaded guilty to two counts of stealing trade secrets and selling them to an unnamed Russian software broker.
☐ ☆ ✇ WIRED

Amazon Explains How Its AWS Outage Took Down the Web

By: Matt Burgess, Lily Hay Newman — October 25th 2025 at 10:30
Plus: The Jaguar Land Rover hack sets an expensive new record, OpenAI’s new Atlas browser raises security fears, Starlink cuts off scam compounds, and more.
☐ ☆ ✇ WIRED

How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA

By: Andy Greenberg — October 23rd 2025 at 23:51
WIRED recently demonstrated how to cheat at poker by hacking the Deckmate 2 card shufflers used in casinos. The mob was allegedly using the same trick to fleece victims for millions.
☐ ☆ ✇ WIRED

This ‘Privacy Browser’ Has Dangerous Hidden Features

By: Matt Burgess — October 23rd 2025 at 09:30
The Universe Browser is believed to have been downloaded millions of times. But researchers say it behaves like malware and has links to Asia’s booming cybercrime and illegal gambling networks.
☐ ☆ ✇ WIRED

Hackers Dox ICE, DHS, DOJ, and FBI Officials

By: Andy Greenberg, Matt Burgess — October 18th 2025 at 10:30
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIA’s Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockchain, and more.
☐ ☆ ✇ WIRED

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

By: Dan Goodin, Ars Technica — October 16th 2025 at 20:42
Networking software company F5 disclosed a long-term breach of its systems this week. The fallout could be severe.
☐ ☆ ✇ WIRED

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

By: Dan Goodin, Ars Technica — October 14th 2025 at 21:40
The malicious app required to make a “Pixnapping” attack work requires no permissions.
☐ ☆ ✇ WIRED

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

By: Andy Greenberg, Matt Burgess — October 14th 2025 at 01:00
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.
☐ ☆ ✇ WIRED

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

By: Lily Hay Newman — October 11th 2025 at 10:30
Plus: US government cybersecurity staffers get reassigned to do immigration work, a hack exposes sensitive age-verification data of Discord users, and more.
☐ ☆ ✇ WIRED

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

By: Lily Hay Newman — October 10th 2025 at 09:15
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
☐ ☆ ✇ WIRED

Vibe Coding Is the New Open Source—in the Worst Way Possible

By: Lily Hay Newman — October 6th 2025 at 10:00
As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
☐ ☆ ✇ WIRED

Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

By: Matt Burgess, Andy Greenberg, Andrew Couts — October 4th 2025 at 10:30
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
☐ ☆ ✇ WIRED

Google’s Latest AI Ransomware Defense Only Goes So Far

By: Lily Hay Newman — September 30th 2025 at 13:44
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
☐ ☆ ✇ WIRED

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

By: Andy Greenberg, Matt Burgess, Lily Hay Newman — September 27th 2025 at 14:25
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
☐ ☆ ✇ WIRED

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

By: Matt Burgess — September 22nd 2025 at 06:00
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
☐ ☆ ✇ WIRED

A Dangerous Worm Is Eating Its Way Through Software Packages

By: Lily Hay Newman, Andy Greenberg — September 20th 2025 at 10:30
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
☐ ☆ ✇ WIRED

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

By: Matt Burgess, Lily Hay Newman — September 18th 2025 at 15:09
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.
☐ ☆ ✇ WIRED

Cybercriminals Have a Weird New Way to Target You With Scam Texts

By: Matt Burgess — September 18th 2025 at 11:00
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.
☐ ☆ ✇ WIRED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

By: Andy Greenberg — September 16th 2025 at 17:07
A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Yahoo Inbox Revealed

By: Lily Hay Newman, Dell Cameron — September 13th 2025 at 10:30
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more.
☐ ☆ ✇ WIRED

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

By: Lily Hay Newman — September 11th 2025 at 13:59
Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs.
☐ ☆ ✇ WIRED

US Investment in Spyware Is Skyrocketing

By: Vas Panagiotopoulos — September 10th 2025 at 11:00
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
☐ ☆ ✇ WIRED

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

By: Dell Cameron — September 9th 2025 at 21:00
After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ WIRED

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

By: Andy Greenberg — September 3rd 2025 at 21:04
A new specimen of “infostealer” malware offers a disturbing feature: It monitors a target's browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim.
☐ ☆ ✇ Krebs on Security

The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft

By: BrianKrebs — September 1st 2025 at 21:55

The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate the stolen credentials before hackers can exploit them. Now Google warns the breach goes far beyond access to Salesforce data, noting the hackers responsible also stole valid authentication tokens for hundreds of online services that customers can integrate with Salesloft, including Slack, Google Workspace, Amazon S3, Microsoft Azure, and OpenAI.

Salesloft says its products are trusted by 5,000+ customers. Some of the bigger names are visible on the company’s homepage.

Salesloft disclosed on August 20 that, “Today, we detected a security issue in the Drift application,” referring to the technology that powers an AI chatbot used by so many corporate websites. The alert urged customers to re-authenticate the connection between the Drift and Salesforce apps to invalidate their existing authentication tokens, but it said nothing then to indicate those tokens had already been stolen.

On August 26, the Google Threat Intelligence Group (GTIG) warned that unidentified hackers tracked as UNC6395 used the access tokens stolen from Salesloft to siphon large amounts of data from numerous corporate Salesforce instances. Google said the data theft began as early as Aug. 8, 2025 and lasted through at least Aug. 18, 2025, and that the incident did not involve any vulnerability in the Salesforce platform.

Google said the attackers have been sifting through the massive data haul for credential materials such as AWS keys, VPN credentials, and credentials to the cloud storage provider Snowflake.

“If successful, the right credentials could allow them to further compromise victim and client environments, as well as pivot to the victim’s clients or partner environments,” the GTIG report stated.

The GTIG updated its advisory on August 28 to acknowledge the attackers used the stolen tokens to access email from “a very small number of Google Workspace accounts” that were specially configured to integrate with Salesloft. More importantly, it warned organizations to immediately invalidate all tokens stored in or connected to their Salesloft integrations — regardless of the third-party service in question.

“Given GTIG’s observations of data exfiltration associated with the campaign, organizations using Salesloft Drift to integrate with third-party platforms (including but not limited to Salesforce) should consider their data compromised and are urged to take immediate remediation steps,” Google advised.

On August 28, Salesforce blocked Drift from integrating with its platform, and with its productivity platforms Slack and Pardot.

The Salesloft incident comes on the heels of a broad social engineering campaign that used voice phishing to trick targets into connecting a malicious app to their organization’s Salesforce portal. That campaign led to data breaches and extortion attacks affecting a number of companies including Adidas, Allianz Life and Qantas.

On August 5, Google disclosed that one of its corporate Salesforce instances was compromised by the attackers, which the GTIG has dubbed UNC6040 (“UNC” stands for “uncategorized threat group”). Google said the extortionists consistently claimed to be the threat group ShinyHunters, and that the group appeared to be preparing to escalate its extortion attacks by launching a data leak site.

ShinyHunters is an amorphous threat group known for using social engineering to break into cloud platforms and third-party IT providers, and for posting dozens of stolen databases to cybercrime communities like the now-defunct Breachforums.

The ShinyHunters brand dates back to 2020, and the group has been credited with or taken responsibility for dozens of data leaks that exposed hundreds of millions of breached records. The group’s member roster is thought to be somewhat fluid, drawing mainly from active denizens of the Com, a mostly English-language cybercrime community scattered across an ocean of Telegram and Discord servers.

Recorded Future’s Alan Liska told Bleeping Computer that the overlap in the “tools, techniques and procedures” used by ShinyHunters and the Scattered Spider extortion group likely indicate some crossover between the two groups.

To muddy the waters even further, on August 28 a Telegram channel that now has nearly 40,000 subscribers was launched under the intentionally confusing banner “Scattered LAPSUS$ Hunters 4.0,” wherein participants have repeatedly claimed responsibility for the Salesloft hack without actually sharing any details to prove their claims.

The Telegram group has been trying to attract media attention by threatening security researchers at Google and other firms. It also is using the channel’s sudden popularity to promote a new cybercrime forum called “Breachstars,” which they claim will soon host data stolen from victim companies who refuse to negotiate a ransom payment.

The “Scattered Lapsus$ Hunters 4.0” channel on Telegram now has roughly 40,000 subscribers.

But Austin Larsen, a principal threat analyst at Google’s threat intelligence group, said there is no compelling evidence to attribute the Salesloft activity to ShinyHunters or to other known groups at this time.

“Their understanding of the incident seems to come from public reporting alone,” Larsen told KrebsOnSecurity, referring to the most active participants in the Scattered LAPSUS$ Hunters 4.0 Telegram channel.

Joshua Wright, a senior technical director at Counter Hack, is credited with coining the term “authorization sprawl” to describe one key reason that social engineering attacks from groups like Scattered Spider and ShinyHunters so often succeed: They abuse legitimate user access tokens to move seamlessly between on-premises and cloud systems.

Wright said this type of attack chain often goes undetected because the attacker sticks to the resources and access already allocated to the user.

“Instead of the conventional chain of initial access, privilege escalation and endpoint bypass, these threat actors are using centralized identity platforms that offer single sign-on (SSO) and integrated authentication and authorization schemes,” Wright wrote in a June 2025 column. “Rather than creating custom malware, attackers use the resources already available to them as authorized users.”

It remains unclear exactly how the attackers gained access to all Salesloft Drift authentication tokens. Salesloft announced on August 27 that it hired Mandiant, Google Cloud’s incident response division, to investigate the root cause(s).

“We are working with Salesloft Drift to investigate the root cause of what occurred and then it’ll be up to them to publish that,” Mandiant Consulting CTO Charles Carmakal told Cyberscoop. “There will be a lot more tomorrow, and the next day, and the next day.”

☐ ☆ ✇ WIRED

DOGE Put Everyone’s Social Security Data at Risk, Whistleblower Claims

By: Andy Greenberg, Lily Hay Newman, Dell Cameron — August 30th 2025 at 10:30
Plus: China’s Salt Typhoon hackers target 600 companies in 80 countries, Tulsi Gabbard purges CIA agents, hackers knock out Iranian ship communications, and more.
☐ ☆ ✇ WIRED

The Era of AI-Generated Ransomware Has Arrived

By: Lily Hay Newman, Matt Burgess — August 27th 2025 at 12:36
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI being used to develop ransomware.
☐ ☆ ✇ WIRED

493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds

By: Matt Burgess, Lily Hay Newman — August 19th 2025 at 14:11
Scam compounds in Cambodia, Myanmar, and Laos have conned people out of billions. New research shows they may be linked to child sextortion crimes too.
☐ ☆ ✇ McAfee Blogs

How Do Hackers Hack Phones and How Can I Prevent It?

By: Jasdev Dhaliwal — July 10th 2025 at 12:00

How do hackers hack phones? In several ways. But also, there are several ways you can prevent it from happening to you. The thing is that our phones are like little treasure chests. They’re loaded with plenty of personal data, and we use them to shop, bank, and take care of other personal and financial matters—all of which are of high value to identity thieves. However, you can protect yourself and your phone by knowing what to look out for and by taking a few simple steps. Let’s break it down by first understanding what phone hacking is, taking a look at some common attacks, and learning how you can prevent it.

What is phone hacking?

Phone hacking refers to any method where an unauthorized third party gains access to your smartphone and its data. This isn’t just one single technique; it covers a wide range of cybercrimes. A phone hack can happen through software vulnerabilities, like the spyware campaigns throughout the years that could monitor calls and messages. It can also occur over unsecured networks, such as a hacker intercepting your data on public Wi-Fi. Sometimes, it’s as simple as physical access, where someone installs tracking software on an unattended device. 

Types of smartphone hacks and attacks

Hackers have multiple avenues of attacking your phone. Among these common methods are using malicious apps disguised as legitimate software, exploiting the vulnerabilities of unsecure public Wi-Fi networks, or deploying sophisticated zero-click exploits that require no interaction from you at all. The most common method, however, remains social engineering, where they trick you into giving them access. Let’s further explore these common hacking techniques below.

Hacking software

Whether hackers sneak it onto your phone by physically accessing your phone or by tricking you into installing it via a phony app, a sketchy website, or a phishing attack, hacking software can create problems for you in a couple of ways:

  • Keylogging: In the hands of a hacker, keylogging works like a stalker by snooping information as you type, tap, and even talk on your phone.
  • Trojans: Trojans are malware disguised in your phone to extract important data, such as credit card account details or personal information.

Some possible signs of hacking software on your phone include:

  • A battery that drains way too quickly.
  • Your phone runs a little sluggish or gets hot.
  • Apps quit suddenly or your phone shuts off and turns back on.
  • You see unrecognized data, text, or other charges on your bill.

In all, hacking software can eat up system resources, create conflicts with other apps, and use your data or internet connection to pass your personal information into the hands of hackers.

Phishing attacks

This classic form of attack has been leveled at our computers for years. Phishing is where hackers impersonate a company or trusted individual to get access to your accounts or personal info or both. These attacks take many forms such as emails, texts, instant messages, and so forth, some of which can look really legitimate. Common to them are links to bogus sites that attempt to trick you into handing over personal info or that install malware to wreak havoc on your device or likewise steal information. Learning to spot a phishing attack is one way to keep yourself from falling victim to one.

Bluetooth hacking

Professional hackers can use dedicated technologies that search for vulnerable mobile devices with an open Bluetooth connection. Hackers can pull off these attacks when they are within range of your phone, up to 30 feet away, usually in a populated area. When hackers make a Bluetooth connection to your phone, they might access your data and info, yet that data and info must be downloaded while the phone is within range. This is a more sophisticated attack given the effort and technology involved.

SIM card swapping

In August of 2019, then CEO of Twitter had his phone hacked by SIM card swapping scam. In this type of scam, a hacker contacts your phone provider, pretends to be you, then asks for a replacement SIM card. Once the provider sends the new SIM to the hacker, the old SIM card is deactivated, and your phone number will be effectively stolen. This enables the hacker to take control of your phone calls, messages, among others. The task of impersonating someone else seems difficult, yet it happened to the CEO of a major tech company, underscoring the importance of protecting your personal info and identity online to prevent hackers from pulling off this and other crimes.

Vishing or voice phishing

While a phone call itself cannot typically install malware on your device, it is a primary tool for social engineering, known as vishing or voice phishing. A hacker might call, impersonating your bank or tech support company, and trick you into revealing sensitive information like passwords or financial details. They might also try to convince you to install a malicious app. Another common tactic is the “one-ring” scam, where they hang up hoping you’ll call back a premium-rate number. To stay safe, be wary of unsolicited calls, never provide personal data, block suspicious numbers, and check that your call forwarding isn’t enabled.

Low-power mode hacks

Generally, a phone that is powered off is a difficult target for remote hackers. However, modern smartphones aren’t always truly off. Features like Apple’s Find My network can operate in a low-power mode, keeping certain radios active. Furthermore, if a device has been previously compromised with sophisticated firmware-level malware, it could activate upon startup. The more common risk involves data that was already stolen before the phone was turned off or if the device is physically stolen. While it’s an uncommon scenario, the only sure way to take a device offline and completely sever all power is by removing the battery, where possible.

Camera hacks

Hacking a phone’s camera is referred to as camfecting, usually done through malware or spyware hidden within a rogue application. Once installed, these apps can gain unauthorized permission to access your camera and record video or capture images without your knowledge. Occasionally, vulnerabilities in a phone’s operating system (OS) have been discovered that could allow for this, though these are rare and usually patched quickly. Protect yourself by regularly reviewing app permissions in your phone’s settings—for both iOS and Android—and revoking camera access for any app that doesn’t absolutely need it. Always keep your OS and apps updated to the latest versions.

Android vs. iPhone: Which is harder to hack?

This is a long-standing debate with no simple answer. iPhones are generally considered more secure due to Apple’s walled garden approach: a closed ecosystem, a strict vetting process for the App Store, and timely security updates for all supported devices. Android’s open-source nature offers more flexibility but also creates a more fragmented ecosystem, where security updates can be delayed depending on the device manufacturer. However, both platforms use powerful security features like application sandboxing. 

The most important factor is not the brand but your behavior. A user who practices good digital hygiene—using strong passwords, avoiding suspicious links, and vetting apps—is well-protected on any platform.

Signs your phone has been hacked

Detecting a phone hack early can save you from significant trouble. Watch for key red flags: your battery draining much faster than usual, unexpected spikes in your mobile data usage, a persistently hot device even when idle, or a sudden barrage of pop-up ads. You might also notice apps you don’t remember installing or find that your phone is running unusually slow. To check, go into your settings to review your battery and data usage reports for any strange activity. The most effective step you can take is to install a comprehensive security app, like McAfee® Mobile Security, to run an immediate scan and detect any threats.

How to remove a hacker from your phone

Discovering that your phone has been hacked can be alarming, but acting quickly can help you regain control and protect your personal information. Here are the urgent steps to take so you can remove the hacker, secure your accounts, and prevent future intrusions.

  1. Disconnect immediately: Turn on Airplane Mode to cut off the hacker’s connection to your device via Wi-Fi and cellular data.
  2. Run an antivirus scan: Use a reputable mobile security app to scan your phone, and identify and remove malicious software.
  3. Review and remove apps: Manually check your installed applications. Delete any you don’t recognize or that look suspicious. While you’re there, review app permissions and revoke access for any apps that seem overly intrusive.
  4. Change your passwords: Using a separate, secure device, change the passwords for your critical accounts immediately—especially for your email, banking, and social media.
  5. Perform a factory reset: For persistent infections, a factory reset is the most effective solution. This will wipe all data from your phone, so ensure you have a clean backup—the time before you suspected a hack—to restore from.
  6. Monitor your accounts: After securing your device, keep a close eye on your financial and online accounts for any unauthorized activity.

10 tips to prevent your phone from being hacked

While there are several ways a hacker can get into your phone and steal personal and critical information, here are a few tips to keep that from happening:

  1. Use comprehensive security software. We’ve gotten into the good habit of using this on our desktop and laptop computers. Our phones? Not so much. Installing security software on your smartphone gives you a first line of defense against attacks, plus additional security features.
  2. Update your phone OS and its apps. Keeping your operating system current is the primary way to protect your phone. Updates fix vulnerabilities that cybercriminals rely on to pull off their malware-based attacks. Additionally, those updates can help keep your phone and apps running smoothly while introducing new, helpful features.
  3. Stay safe on the go with a VPN. One way that crooks hack their way into your phone is via public Wi-Fi at airports, hotels, and even libraries. This means your activities are exposed to others on the network—your bank details, password, all of it. To make a public network private and protect your data, use a virtual private network.
  4. Use a password manager. Strong, unique passwords offer another primary line of defense, but juggling dozens of passwords can be a task, thus the temptation to use and reuse simpler passwords. Hackers love this because one password can be the key to several accounts. Instead, try a password manager that can create those passwords for you and safely store them as well. Comprehensive security software will include one.
  5. Avoid public charging stations. Charging your device at a public station seems so convenient. However, some hackers have been known to juice jack by installing malware into the charging station, while stealing your passwords and personal info. Instead, bring a portable power pack that you can charge ahead of time. They’re pretty inexpensive and easy to find.
  6. Keep your eyes on your phone. Many hacks happen simply because a phone falls into the wrong hands. This is a good case for password or PIN protecting your phone, as well as turning on device tracking to locate your phone or wipe it clean remotely if you need to. Apple and Google provide their users with a step-by-step guide for remotely wiping devices.
  7. Encrypt your phone. Encrypting your cell phone can save you from being hacked and can protect your calls, messages, and critical information. To check if your iPhone is encrypted, go into Touch ID & Passcode, scroll to the bottom, and see if data protection is enabled. Typically, this is automatic if you have a passcode enabled. Android users have automatic encryption depending on the type of phone.
  8. Lock your SIM card. Just as you can lock your phone, you can also lock the SIM card that is used to identify you, the owner, and to connect you to your cellular network. Locking it keeps your phone from being used on any other network than yours. If you own an iPhone, you can lock it by following these simple directions. For other platforms, check out the manufacturer’s website.
  9. Turn off your Wi-Fi and Bluetooth when not in use. Think of it as closing an open door. As many hacks rely on both Wi-Fi and Bluetooth to be performed, switching off both can protect your privacy in many situations. You can easily turn off both from your settings by simply pulling down the menu on your home screen.
  10. Steer clear of unvetted third-party app stores. Google Play and Apple’s App Store have measures in place to review and vet apps, and ensure that they are safe and secure. Third-party sites may not have that process and might intentionally host malicious apps. While some cybercriminals have found ways to circumvent Google and Apple’s review process, downloading a safe app from them is far greater than anywhere else.

Final thoughts

Your smartphone is central to your life, so protecting it is essential. Ultimately, your proactive security habits are your strongest defense against mobile hacking. Make a habit of keeping your operating system and apps updated, be cautious about the links you click and the networks you join, and use a comprehensive security solution like McAfee® Mobile Security.

By staying vigilant and informed, you can enjoy all the benefits of your mobile device with confidence and peace of mind. Stay tuned to McAfee for the latest on how to protect your digital world from emerging threats.

The post How Do Hackers Hack Phones and How Can I Prevent It? appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Russia Is Cracking Down on End-to-End Encrypted Calls

By: Lily Hay Newman — August 16th 2025 at 10:30
Plus: ICE agents accidentally add a random person to a sensitive group chat, Norwegian intelligence blames the Kremlin for hacking a dam, and new facial recognition vans roam the UK.
☐ ☆ ✇ WIRED

The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived

By: Lily Hay Newman — August 14th 2025 at 10:20
The breach of the US Courts records system came to light more than a month after the attack was discovered. Details about what was exposed—and who’s responsible—remain unclear.
❌