More stories

  • in

    Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here’s what you need to know

    Adrian Kingsley-Hughes/ZDNETIn an attempt to steal mobile users’ data, malicious actors are targeting Verizon and T-Mobile employees.Current and former Verizon and T-Mobile employees told Bleeping Computer that they’ve received unsolicited messages from unidentified cybercriminals offering up to $300 to perform SIM swaps. In some cases, the attackers are asking the employees to respond to them by text, while others said they could discuss the details on encrypted messaging platform Telegram.”I got your number from the T-Mo employee directory,” one of the messages to a T-Mobile employee said. “I’m looking to pay someone up to $300 per sim swap done, if you’re interested, reply and we can talk.”Also: 6 ways to protect yourself from getting scammed online, by phone, or IRLA SIM swap attack typically involves a cybercriminal getting a wireless carrier to direct service to their phone instead of the actual customer paying for that service. This often leads to identity theft, loss of sensitive information, and financial scams. What’s worse, SIM swap attacks are on the rise.In 2022, the FBI issued a warning to consumers that SIM swap attacks are growing. The agency received 320 SIM swapping complaints between January 2018 and December 2020 that cost victims $12 million. In 2021, that number jumped to 1,611 complaints and more than $68 million in losses. In 2022, complaints jumped to more than 2,000 and losses totaled nearly $73 million. More

  • in

    Gen AI training costs soar yet risks are poorly measured, says Stanford AI report

    The number of significant new AI models coming out of industry has surged in recent years relative to academia and government.  Stanford HAI The seventh-annual report on the global state of artificial intelligence from Stanford University’s Institute for Human-Centered Artificial Intelligence offers some concerning thoughts for society: the technology’s spiraling costs and poor measurement of […] More

  • in

    XZ Utils might not have been the only sabotage target, open-source foundations warn

    South_agency/Getty Images The XZ Utils backdoor (CVE-2024-3094) may not have been an isolated incident, according to a joint statement by the Open Source Security Foundation and the OpenJS Foundation. If you’re unaware of the XZ Utils saga, my esteemed colleague, Steven Vaughn-Nichols, covered the story in “This backdoor almost infected Linux everywhere: The XZ Utils close […] More

  • in

    How to freeze your credit (and why you might want to)

    Antonio Solano via iStock/Getty Images Plus With recent data breaches coming to light, you may wonder how to protect your identity from bad actors. A credit freeze is a simple thing you can do to restrict access to your credit report and prevent bad actors from using your personal information for their financial gain.  Also: […] More

  • in

    AI Safety Summit round two draws government, industry leaders to Seoul next month

    Gov.uk Generative AI is growing exponentially, with new developments daily. As a result, safeguards and policies regarding the technology are more necessary than ever. World leaders will gather soon at the AI Seoul Summit to discuss just that.  Also: Despite DALL-E military pitch, OpenAI maintains its tools won’t be used to develop weapons On Friday, […] More

  • in

    Sisense’s data breach is serious enough that CISA is investigating. Here’s what you need to do

    boonchai wedmakawand/Getty Images Companies around the world need to act quickly after another major security breach hit a company that provides critical data analytics and visualization tools to a slew of organizations. Earlier this week, Sisense confirmed that the data dashboard and analytics company had been hit with a breach that allowed hackers to access its […] More

  • in

    AT&T blasts email to 70M customers, causes massive traffic spike at Experian. Here’s what happened

    rob dobi/Getty Images If you have a lot of customers you need to contact regarding an important communication, such as a data breach, it may be a good idea to stage those communications over several days rather than do it all at once. It appears that one of the US’s largest wireless services carriers did […] More