UN report alleges that Saudi crown prince hacked Jeff Bezos’s phone

Digital forensic evidence points to the phone’s massive, months-long data egress having likely been triggered by Pegasus mobile spyware. Continue reading UN report alleges that Saudi crown prince hacked Jeff Bezos’s phone

iCloud-hacking politician to be sentenced on Christmas eve

Former Dutch city council member Mitchel van der K invaded hundreds of iCloud accounts “frequently and repeatedly”. Continue reading iCloud-hacking politician to be sentenced on Christmas eve

Food writer Jack Monroe loses at least £5,000 in SIM-swap fraud

Her accounts were drained in spite of using 2FA, showing that SIM swaps can still circumvent what’s a good security tool. Continue reading Food writer Jack Monroe loses at least £5,000 in SIM-swap fraud

Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153

Elements of an Effective Penetration Testing Program
The post Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153 appeared first on Security Weekly. Continue reading Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153