In response to a letter from Senator Ron Wyden, T-Mobile has come forth with more location data abuses by third parties.
Three security flaws found in 4G and 5G networks could be used to intercept phone calls and track peoples’ location.
Most smartphones coming out are designed to work on higher frequency cellular bands. But there aren’t any current phones that work on the 600MHz band.
Keiran Dennie tweeted an interesting chart that compares the security of various smartphone operating systems.
Wondering about Android and Apple phone security? Here’s an objective chart to help you decide.
It’s a well known fact of Android that people have to rely on their carrier to push out security updates. This can take weeks, months, and sometimes they don’t get released at all.
You might have heard of the term “phone tethering” before. In case you didn’t know what it meant, David Nield put together a guide explaining the term and how to use it.
We’re going to focus largely on wifi tethering here—creating a wifi hotspot from your phone or tablet—but you do have other options. If you’ve got a spare USB cable you can create a more stable connection between laptop and mobile device, or you can tether via Bluetooth, which is significantly slower but less taxing on battery life.
I’ll put an addendum here. Tethering depends on your carrier, and some carriers don’t allow it, like prepaid carriers. I used to use Net10 and I couldn’t use create a Wi-Fi hotspot.
Verizon doesn’t want you to remember when it throttled the cellular data of first responders during the California wildfires.
Hiya, a spam-blocking app analyzed 450,000 of its users to figure out how big of a problem robo calls are.
There’s more to the bounty hunter location data story that Motherboard reported on earlier this month. One of the data brokers involved was Zumigo.
The Korean FTC has found Apple guilty of unfair practices in its dealings with carriers, but it will let Apple respond.
AT&T, Sprint, and T-Mobile sell access to customers’ location data. As an experiment, Joseph Cox paid a bounty hunter to locate a phone, and it worked.
The bounty hunter did this all without deploying a hacking tool or having any previous knowledge of the phone’s whereabouts. Instead, the tracking tool relies on real-time location data sold to bounty hunters that ultimately originated from the telcos themselves, including T-Mobile, AT&T, and Sprint, a Motherboard investigation has found. These surveillance capabilities are sometimes sold through word-of-mouth networks.
The technology apparently works on all mobile networks, but there was some issue with Verizon. Shady practices like this are why we need an American GDPR, as well as a better FCC.
The carrier will start charging customers for the full month after they cancel.
Although the four carriers promised to support it at launch, Verizon and T-Mobile are lagging.
An eSIM makes it easier to switch between carriers. But right now only ten countries in the world support it.
Those in the computer security industry aren’t impressed though.
The regulations, “will erase millions in annual revenue for carriers” because locking phones is a completely arbitrary practice designed to lock consumes to a carrier.