Connect with us

Technology

Here's what ruthless hackers stole from 110M AT&T customers

Published

on

Here's what ruthless hackers stole from 110M AT&T customers

In a startling revelation, AT&T announced that it had suffered a significant data breach affecting “nearly all” of its cellular customers, as well as customers of mobile virtual network operators (MVNOs) using AT&T’s wireless network and some landline customers. 

The data that was taken was from May 1 through Oct. 31, 2022, with a small number of additional records from Jan. 2, 2023, which has raised serious concerns about customer privacy and data security.

Image of cybersecurity prevention expert at work. (AT&T)

Scope of the breach

The compromised data includes records of calls and text messages, along with phone numbers that AT&T or MVNO cellular numbers interacted with during the specified period. For some records, cell site identification numbers were also exposed. 

AT&T emphasized that the breach did not include the content of calls or texts, personal information like Social Security numbers or dates of birth, or specific timestamps of communications.

Advertisement

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

Cybercriminals target cloud platform

AT&T disclosed that the data was illegally downloaded from their workspace on a third-party cloud platform. The company has since taken steps to close off the illegal access point and is working with law enforcement to apprehend those responsible. At least one person has reportedly been arrested in connection with the incident.

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

Advertisement

AT&T’s customer notification and response

AT&T plans to notify approximately 110 million current and former customers whose information was involved in the breach. The company has created a website to provide more information and resources for affected customers.

We reached out to AT&T, and a company spokesperson provided us with this statement:

“At this time, we do not believe that the data is publicly available. Our top priority, as always, is our customers. We will provide notice to current and former customers whose information was involved along with resources to help protect their information. We sincerely regret this incident occurred and remain committed to protecting the information in our care.”

Delayed disclosure and national security concerns

Interestingly, AT&T, in cooperation with the FBI and the Department of Justice, delayed notifying the public about the breach on two occasions, citing “potential risks to national security and/or public safety.” For its part, AT&T explained that the delayed disclosure was a result of its ongoing collaboration with law enforcement during their investigation into the breach. This decision highlights the complex interplay between corporate responsibility, law enforcement, and national security considerations in cybersecurity incidents.

Advertisement

Recent history of AT&T data breaches

This incident marks the second significant security breach for AT&T in 2024. In March, the company was forced to reset the account passcodes of approximately 7.6 million customers after a cache of customer account information, including encrypted passcodes, was published on a cybercrime forum.

CLICK HERE FOR MORE U.S. NEWS

AT&T took this precautionary action after a security researcher warned that the encrypted passcodes could be easily decrypted, potentially compromising customer accounts. This earlier breach affected roughly 70 million past or present customers and reportedly included sensitive information such as Social Security numbers and full names.

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

Broader implications for data security

This latest incident is part of a larger trend of data breaches targeting cloud platforms. AT&T’s breach has been linked to a series of data thefts from Snowflake, a cloud data giant, which has affected several other companies as well. The breach underscores the ongoing challenges in securing sensitive data stored in cloud environments and the need for robust cybersecurity measures.

Advertisement

As investigations continue and more details emerge, this incident serves as a stark reminder of the persistent threats to data security in our increasingly connected world. It also raises questions about the adequacy of current data protection practices and the need for stronger regulations to safeguard consumer information. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Image emphasizing security. (Kurt “CyberGuy” Knutsson)

26 BILLION REASONS TO PROTECT YOURSELF AFTER A MASSIVE DATA LEAK IS EXPOSED  

How to protect yourself from threats targeting you

You should take immediate action to minimize the damage. Here are some steps that you can follow:

Advertisement

1. Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

2. Enable two-factor authentication

You’ll want to activate two-factor authentication for an extra layer of security.

3. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

4. Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

Advertisement

You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.

5. Invest in personal data removal services

While no service promises to remove all your data from the internet, having a removal service is invaluable, especially after a data breach. These services can help you mitigate the potential damage by ensuring your compromised information is continuously monitored and systematically removed from hundreds of sites. This ongoing process reduces the risk of identity theft, fraud, and other malicious activities, providing an additional layer of security and peace of mind. Remove your personal data from the internet with my top picks here.

6. Use identity theft protection

Identity Theft protection companies can monitor personal information like your home title, Social Security number (SSN), phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using an identity theft protection company is that it could include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

7. Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Advertisement

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Kurt’s key takeaways

The AT&T data breach is another wake-up call for consumers and corporations in our digital age. It underscores the critical need for enhanced cybersecurity measures, particularly in cloud-based systems where vast amounts of sensitive data are stored. As technology evolves, so too must our approach to data protection. This incident should prompt a broader discussion about the balance between technological advancement, user privacy and national security. 

It’s also another reminder that we cannot rely on others and need to make ourselves resilient against attacks that are only getting more frequent and destructive. If you do not use tools to enhance your privacy and security, including strong antivirus protection on your iPhone, Android, PC and Mac, use a VPN to insulate your privacy, and actively remove your personal data from the internet, then you are asking for trouble.

In light of this breach, what measures do you think telecom companies should implement to better protect customer data? Should we have been notified of this huge breach earlier than 3 months after the fact?  Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Trump administration bars former EU official and anti-disinformation and hate researchers from US

Published

on

Trump administration bars former EU official and anti-disinformation and hate researchers from US

On Tuesday, the Trump Administration followed through on a threat of retaliation targeting foreigners who are involved in content moderation. The State Department announced sanctions barring US access for former EU commissioner Thierry Breton, as well as four researchers, while issuing an intentionally chilling threat to others, with Secretary of State Marco Rubio claiming, “The State Department stands ready and willing to expand today’s list if other foreign actors do not reverse course.”

One of the researchers the State Department says is banned and now deportable, is Imran Ahmed, who runs the Center for Countering Digital Hate (CCDH), an organization aimed at identifying and pushing back against hate speech online that Elon Musk tried and failed to censor with a lawsuit that was dismissed in early 2024. In his decision, Judge Charles Breyer wrote that X’s motivation for suing was to “punish CCDH for CCDH publications that criticized X Corp. — and perhaps in order to dissuade others.”

The other researchers include Anna-Lena von Hodenberg and Josephine Ballon, leaders of HateAid, a nonprofit that tried to sue X in 2023 for “failing to remove criminal antisemitic content,” as well as Clare Melford, leader of the Global Disinformation Index, which works on “fixing the systems that enable disinformation.”

The press release announcing the sanctions is titled “Announcement of Actions to Combat the Global Censorship-Industrial Complex,” the claimed target of Republicans like House Judiciary Committee leader Jim Jordan, as they’ve worked against attempts to apply fact-checking and misinformation research to social networks. Earlier this month, Reuters reported the State Department ordered US consulates to consider rejecting H-1B visa applicants involved in content moderation, and a few days ago, the Office of the US Trade Representative threatened retaliation against European tech giants like Spotify and SAP over supposedly “discriminatory” activity in regulating US tech platforms.

Continue Reading

Technology

Android Sound Notifications help you catch key alerts

Published

on

Android Sound Notifications help you catch key alerts

NEWYou can now listen to Fox News articles!

Staying aware of your surroundings matters. That includes hearing smoke alarms, appliance beeps or a knock at the door. Still, real life gets busy. You wear headphones. You get focused. Sounds slip by. That is where Android Sound Notifications help. This built-in accessibility feature listens for key sounds and sends an alert to your screen. Think of it as a gentle tap on the shoulder when something important happens.

Although it was designed to help people who are hard of hearing, it is useful for anyone. If you work with noise-canceling headphones or often miss alerts at home, this feature can make a real difference.

Now, if you use an iPhone, here’s how Apple’s Sound Recognition can alert you to alarms and other key sounds on your device. 

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Android Sound Notifications alert you when important sounds happen around you.  (Kurt “CyberGuy” Knutsson)

CHROME ROLLS OUT AI PODCAST FEATURE ON ANDROID

What Sound Notifications do on Android

Sound Notifications use your phone’s microphone to listen for specific sounds nearby. When it detects one, it sends a visual alert. You will see a pop-up, feel a vibration and may even see the camera flash.

By default, Android can detect sounds like:

  • Smoke alarms
  • Fire alarms
  • Sirens
  • Door knocks
  • Doorbells
  • Appliance beeps
  • A landline phone ringing
  • Running water
  • A baby crying
  • A dog barking

That range makes the feature practical at home or at work. Even better, you control which sounds matter to you.

Why this feature is worth using

Here is the simple truth. You cannot hear everything all the time. Distractions happen. Headphones block sound. Focus takes over. Sound Notifications fill that gap. While you stay locked into a task, your phone keeps listening. When something important happens, you still get the message. As a result, you worry less about missing alarms or visitors. You gain awareness without extra effort.

Advertisement

How to turn on Sound Notifications

Getting started only takes a minute. Note: We tested these steps on a Samsung Galaxy S24 Ultra running the latest version of Android. Menu names and locations may differ slightly on other Android phones, depending on the manufacturer and software version.

  • Open the Settings app
  • Go to Accessibility
  • Tap Hearing enhancements
  • Select Sound Notifications
  • Turn the feature on

Turning on Sound Notifications only takes a few taps in Android’s Accessibility settings. (Kurt “CyberGuy” Knutsson)

When you enable Sound Notifications for the first time, Android will ask how you want to start the feature. Choose the option that works best for you:

  • Tap the button in the quick settings panel
  • Tap the Accessibility button
  • Press the Side and Volume Up buttons
  • Press and hold the Volume Up and Volume Down buttons for three seconds

After you select a shortcut, Click Ok.  Then, Sound Notifications will start listening in the background.

ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

If you do not see the option, install the Live Transcribe & Notifications app from the Play Store. You can enable Sound Notifications from there. Once active, your phone listens for selected sounds and alerts you when it detects one. 

Choose which sounds trigger alerts

Not every sound deserves your attention. Thankfully, Android lets you fine-tune alerts.

Advertisement

Settings may vary depending on your Android phone’s manufacturer

  • Go back to Settings
  • Tap Accessibility
  • Click Hearing enhancements
  • Tap Sound Notifications
  • Click Open Sound Notifications. This opens the actual Sound Notifications control screen.
  • On the Sound Notifications screen, tap Settings or the gear icon in the top corner
  • Tap Sound types

You will now see the full list of detectable sounds.

  • Toggle on the sounds you want alerts for, such as smoke alarms or doorbells
  • Toggle off sounds you do not want, like dog barking or appliance beeps, if they are not important to you

You can choose exactly which sounds trigger alerts, helping you avoid unnecessary interruptions. (Kurt “CyberGuy” Knutsson)

Check the sound history log

Sound Notifications keep a log of detected sounds. This helps if you were away from your phone and want to see what happened.

You can also save sounds and name them. That makes it easier to tell the difference between your washer finishing and your microwave timer.

The log adds context, which makes alerts more helpful.

GOOGLE’S NEW CALL REASON FEATURE MARKS CALLS AS URGENT

Advertisement

Teach your phone custom sounds

Android does not stop at presets. You can train it to recognize sounds unique to your space.

Maybe your garage door has a distinct tone. Maybe an appliance uses a nonstandard beep. You can record it once, and your phone will listen for it going forward. To add a custom sound:

Settings may vary depending on your Android phone’s manufacturer

  • Open Sound Notifications
  • Tap the gear icon
  • Select Custom sounds
  • Tap Add sound
  • Hit Record

Record a clear 20-second clip. The better the audio, the better detection works later.

Customize how alerts appear

By default, Sound Notifications use vibration and the camera flash. That visual cue is helpful for urgent alerts. However, not every sound needs that level of attention. You can adjust how alerts appear based on importance.

Settings may vary depending on your Android phone’s manufacturer

Advertisement
  • Open Sound Notifications
  • Open the gear icon
  • Tap Ways to be notified
  • From there, choose which alerts vibrate, flash or stay subtle

This flexibility keeps the feature working for your routine.

Your privacy stays on your phone

It is reasonable to question constant listening. Here is the key detail. Sound Notifications process audio locally on your device. Sounds never leave your phone. Nothing gets sent to Google. The only exception is if you choose to include audio with feedback. That design keeps the feature private and secure.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Android Sound Notifications quietly solve a real problem. They help you stay aware when your ears cannot. Setup is fast. Controls are flexible. Privacy stays intact. Once you turn it on, you may wonder how you lived without it.

What important sound have you missed lately that your phone could have caught for you? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement
Continue Reading

Technology

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Published

on

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Last Samurai Standing begins with a familiar premise. Desperate samurai dispossessed by the restoration of the emperor enter into a deadly game for a life-changing cash prize — all for the entertainment of anonymous elites. Unlike its inspirations Battle Royale and Squid Game, however, Last Samurai Standing’s violence is chaotic, fast-paced, and kinetic, though it hides a careful choreography that makes the series a more electric proposition than its predecessors.

Viewers have Junichi Okada to thank for that. As well as starring in and producing Last Samurai Standing, he serves as the series’ action planner. Many will be familiar with the results of an action planner’s work — sometimes called an action director, elsewhere a “coordinator,” and even “choreographer” — though perhaps not what the role entails. In the case of Last Samurai Standing, it’s a role that touches on nearly every aspect of the production, from the story to the action itself.

“I was involved from the script stage, thinking about what kind of action we wanted and how we would present it in the context of this story,” Okada tells The Verge. “If the director [Michihito Fujii] said, ‘I want to shoot this kind of battle scene,’ I would then think through the content and concept, design the scene, and ultimately translate that into script pages.”

The close relationship between the writer and director extends to other departments, too. Though an action planner’s role starts with managing fight scenes and stunt performers, they also liaise with camera, wardrobe, makeup, and even editorial departments to ensure fight scenes cohere with the rest of the production.

Image: Netflix

Advertisement

It’s a role which might appear a natural progression for Okada, who is certified to teach Kali and Jeet Kune Do — a martial art conceived by Bruce Lee — and holds multiple black belts in jiujitsu. Though the roots of his progression into action planning can be traced back further, to 1995 when he became the youngest member of J-pop group V6.

“Dance experience connects directly to creating action,” he says. “[In both] rhythm and control of the body are extremely important.” Joining V6 at the age of 15, that experience has made Okada conscious of how he moves in relation to a camera during choreography, how he is seen within the structure of a shot, and, critical to action planning, how to navigate all of that safely from a young age.

That J-pop stardom also offered avenues into acting, initially in roles you might expect for a young pop star: comic heartthrobs and sitcom sons. But he was steadily able to broaden his output. A starring turn in Hirokazu Kore-eda’s Hana followed, as did voice acting in Studio Ghibli’s Tales From Earthsea and From Up on Poppy Hill. A more telling departure was a starring role in 2007’s SP, in which he played a rookie in a police bodyguard unit, for which he trained for several years under shootfighting instructor Yorinaga Nakamura.

“What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

In the years since, Okada has cemented himself as one of Japan’s most recognizable actors, hopping between action starring roles in The Fable to sweeping period epics like Sekigahara. Those two genres converge in his Last Samurai Standing role of Shujiro, a former Shogunate samurai now reduced to poverty, working through his PTSD and reckoning with his bloodthirsty past in the game. These days, it’s less of a concern that the character butts up against his past idol image, he suggests. “What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

Advertisement

For Okada’s work on Last Samurai Standing, as both producer and action planner, that involved lacing high-octane but believable action with the respect for history and character studies of the period dramas he loves. “Rather than being 100 percent faithful to historical accuracy,” he adds, “my goal was to focus on entertainment and story, while letting the ‘DNA’ and beauty of Japanese period drama gently float up in the background.”

A focus on what he defines as “‘dō’ — movement,” pure entertainment that “never lets the audience get bored” punctuated — with “‘ma,’” the active emptiness that connects those frenetic moments. Both can be conversations, even if one uses words and another communicates dialogue through sword blows. This is most apparent when Shujiro faces his former comrade Sakura (Yasushi Fuchikami) inside a claustrophobic bank vault that serves as a charnel house for the game’s less fortunate contestants.

“The whole battle is divided into three sequences,” Okada says. The first starts with a moment of almost perfect stillness, a deep breath, before the two launch into battle. “A fight where pride and mutual respect collide,” he says, “and where the speed of the techniques reaches a level that really surprises the audience.” It’s all captured in one, zooming take with fast, tightly choreographed action reminiscent of Donnie Yen and Wu Jing in Kill Zone.

So intense is their duel that both shatter multiple swords. The next phase sees them lash out in a more desperate and brutal manner with whatever weapons they find. Finally, having fought to a weary stalemate, the fight becomes, Okada concludes, “a kind of duel where their stubbornness and will are fully exposed” as they hack at each other with shattered blades and spear fragments.

A still image from the Netflix series Last Samurai Standing.

Image: Netflix

It’s a rhythm that many fights in Last Samurai Standing follow, driven by a string of physical and emotional considerations that form the basis of an action planner’s tool kit: how and why someone fights based on who they are and their environment. Here it is two former samurai in an elegant and terrifyingly fast-paced duel. Elsewhere we see skill matched against brutality, or inexperience against expertise.

Advertisement

“I define a clear concept for each sequence,” Okada says, before he opens those concepts up to the broader team. From there, he might add notes, but in Last Samurai Standing, action is a collaborative affair. “We keep refining,” he says. “It’s a back-and-forth process of shaping the sequence using both the ideas the team brings and the choreography I create myself.”

There is a third factor which Okada believes is the series’ most defining. “If we get to continue the story,” he says, “I’d love to explore how much more we can lean into ‘sei’ — stillness, and bring in even more of a classical period drama feel.”

As much of a triumph of action as Last Samurai Standing is, its quietest moments are the ones that stay with you. The charged looks between Shujiro and Iroha (Kaya Kiyohara) or their shuddering fright when confronted with specters of their past. Most of all, Shujiro watching his young ward, Futaba Katsuki (Yumia Fujisaki), dance before a waterlogged torii as mist hovers. These pauses are what elevate and invigorate the breathless action above spectacle.

The pauses are also emblematic of the balance that Last Samurai Standing strikes between its period setting and pushing the boundaries of action, all to inject new excitement into the genre. “Japan is a country that values tradition and everything it has built up over time. That’s why moments where you try to update things are always difficult,” Okada says. “But right now, we’re in the middle of that transformation.”

That is an evolution that Okada hopes to support through his work, both in front of and behind the camera. If he can create avenues for new generations of talent to carry Japanese media to a broader audience and his team to achieve greater success on a global stage, “that would make me very happy,” he says. “I want to keep doing whatever I can to help make that possible.”

Advertisement

The first season of Last Samurai Standing is streaming on Netflix now, and a second season was just confirmed.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Advertisement
Continue Reading

Trending