Kevin's Security Scrapbook

Saturday, February 2, 2013

Alerts sent in by our Blue Blaze Irregulars this week...

• "Time to take the glue gun to your USB ports." Data exfiltration using a USB keyboard. 

• "Dust off your information security policy (or start putting one in place…)" Do you have a comprehensive information security program? Many businesses are still operating without one, leaving them open to preventable data breaches.
 
• "Enough already: encrypt those portable devices" The U.S. Federal Trade Commission (FTC) announced it had reached a settlement with a cord blood bank in respect of the loss of nearly 300,000 customers’ personal information. ...The information had been stored on unencrypted backup tapes, an external hard drive and a laptop that were stolen from a backpack left in an employee’s car.

• “This call may be recorded” - Ninth Circuit says disclaimer not always necessary. But it’s still a good idea! 

• "Man cleared of spying on his wife via computer software..." His attorney argued that prosecutors could not prove why Ciccarone used the software.

• "Nestlégate" Court convicts Nestle of "spying" on Swiss activists. (vintage commercial)



Posted by Kevin D. Murray at 10:26 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: advice, business, computer, eavesdropping, espionage, Hack, keystroke, lawsuit, privacy, spyware, USB, wiretapping
Newer Post Older Post Home

SUBSCRIBE VIA EMAIL DIGEST

ENTER YOUR ADDRESS HERE


No cost. No risk. No obligation. Cancel any time. For updates as they happen follow us on X @spybusters


COUNTERESPIONAGE.COM

conference room tscm inspectionTechnical Surveillance Countermeasures (TSCM) Services | Open access to 50+ FREE Privacy Enhancing Reports

SPY CAMERA DETECTION TRAINING for BUSINESSES and INDIVIDUALS

Spy camera detection course photo
A one-hour, on-line, self-paced, video training course, with a Certificate of Completion. Subcaptions in English, Spanish & Korean.
DETAILS HERE


Is My Cell Phone Bugged?

is my cell phone bugged?Everything you need to know to keep your mobile conversations private. 4+ stars on amazon.com

SpyWarn 2.0 Android App

spywarn 2.0 anti-spyware & ebook android phone app
The SpyWarn 2.0 Android app helps you determine if your phone is infected with spyware.

It comes with a FREE condensed e-book version of, "Is My Cell Phone Bugged?"

Everything is included to conduct your tests. No in-app purchases required. Results are private.


Search This Blog

Top 10 Investigator Blogs

Murray Associates TSCM - Top - Investigator - Blogs

The Scrapbook Archives

  • ►  2025 (98)
    • ►  June (13)
    • ►  May (21)
    • ►  April (13)
    • ►  March (30)
    • ►  February (6)
    • ►  January (15)
  • ►  2024 (223)
    • ►  December (21)
    • ►  November (14)
    • ►  October (22)
    • ►  September (1)
    • ►  August (22)
    • ►  July (24)
    • ►  June (15)
    • ►  May (31)
    • ►  March (19)
    • ►  February (25)
    • ►  January (29)
  • ►  2023 (208)
    • ►  December (17)
    • ►  November (22)
    • ►  October (15)
    • ►  September (9)
    • ►  August (6)
    • ►  July (20)
    • ►  June (20)
    • ►  May (14)
    • ►  April (19)
    • ►  March (28)
    • ►  February (23)
    • ►  January (15)
  • ►  2022 (181)
    • ►  December (23)
    • ►  November (9)
    • ►  October (15)
    • ►  September (11)
    • ►  August (19)
    • ►  July (10)
    • ►  June (13)
    • ►  May (18)
    • ►  April (15)
    • ►  March (18)
    • ►  February (18)
    • ►  January (12)
  • ►  2021 (200)
    • ►  December (8)
    • ►  November (12)
    • ►  October (8)
    • ►  September (23)
    • ►  August (20)
    • ►  July (20)
    • ►  June (11)
    • ►  May (20)
    • ►  April (17)
    • ►  March (24)
    • ►  February (16)
    • ►  January (21)
  • ►  2020 (322)
    • ►  December (20)
    • ►  November (24)
    • ►  October (37)
    • ►  September (28)
    • ►  August (28)
    • ►  July (23)
    • ►  June (24)
    • ►  May (34)
    • ►  April (45)
    • ►  March (12)
    • ►  February (21)
    • ►  January (26)
  • ►  2019 (294)
    • ►  December (8)
    • ►  November (15)
    • ►  October (40)
    • ►  September (8)
    • ►  August (32)
    • ►  July (28)
    • ►  June (17)
    • ►  May (30)
    • ►  April (35)
    • ►  March (31)
    • ►  February (13)
    • ►  January (37)
  • ►  2018 (348)
    • ►  December (29)
    • ►  November (26)
    • ►  October (12)
    • ►  September (33)
    • ►  August (23)
    • ►  July (39)
    • ►  June (24)
    • ►  May (31)
    • ►  April (26)
    • ►  March (25)
    • ►  February (36)
    • ►  January (44)
  • ►  2017 (331)
    • ►  December (28)
    • ►  November (39)
    • ►  October (21)
    • ►  September (7)
    • ►  August (31)
    • ►  July (32)
    • ►  June (27)
    • ►  May (8)
    • ►  April (31)
    • ►  March (19)
    • ►  February (51)
    • ►  January (37)
  • ►  2016 (390)
    • ►  December (23)
    • ►  November (39)
    • ►  October (22)
    • ►  September (33)
    • ►  August (37)
    • ►  July (40)
    • ►  June (27)
    • ►  May (30)
    • ►  April (31)
    • ►  March (31)
    • ►  February (41)
    • ►  January (36)
  • ►  2015 (356)
    • ►  December (17)
    • ►  November (34)
    • ►  October (26)
    • ►  September (28)
    • ►  August (46)
    • ►  July (19)
    • ►  June (30)
    • ►  May (23)
    • ►  April (13)
    • ►  March (25)
    • ►  February (28)
    • ►  January (67)
  • ►  2014 (561)
    • ►  December (49)
    • ►  November (34)
    • ►  October (53)
    • ►  September (32)
    • ►  August (28)
    • ►  July (64)
    • ►  June (40)
    • ►  May (39)
    • ►  April (50)
    • ►  March (67)
    • ►  February (63)
    • ►  January (42)
  • ▼  2013 (463)
    • ►  December (34)
    • ►  November (47)
    • ►  October (48)
    • ►  September (28)
    • ►  August (47)
    • ►  July (47)
    • ►  June (44)
    • ►  May (34)
    • ►  April (38)
    • ►  March (29)
    • ▼  February (30)
      • Security Scrapbook Reader's Question - Spy School
      • Business Espionage - Quote of the Month
      • Spykpe
      • Express Scripts vs. E&Y - Trade Secret Theft Alleg...
      • U.S. Unveils New Strategy to Combat Trade-Secret T...
      • Skype Plebes Petition Redmond Patricians
      • Yet Another Teleconference Eavesdrop (with recomme...
      • Send Employees for Counterespionage Training? Bril...
      • United States Intelligence Community - Virtual Car...
      • Weird Security News of the Week
      • Mechanic Hits Emails at Rival Limo Firm
      • Hobby Drones Under Fire
      • A UAV Alternate POV
      • Two Princesses in a Bug House
      • If the competition isn't bugging you, they are pro...
      • Report Recommends a TSCM Sweep of City Hall
      • Law Proposed to Let Parents Wiretap Kids
      • Groundbreaking Encryption App is a Fed Freaker
      • Authorities... "No probing all the way. Promise."
      • Business Espionage - Sentences Short - Fines Small
      • British Army Unveils New Mini Spy Drone
      • Two sneaky Android apps have been detected...
      • New Wave Of Hidden Cameras Make Spying Easy
      • Spy vs. Spy vs. Judge Leonie
      • See What Drones See
      • Experts warn on wire-tapping of the cloud
      • Man held on suspicion of business espionage
      • New Report: Drones Could Be Used for Stalking, Voy...
      • Alerts sent in by our Blue Blaze Irregulars this w...
      • From the Business Spy's Toolkit - NoteMark
    • ►  January (37)
  • ►  2012 (535)
    • ►  December (32)
    • ►  November (31)
    • ►  October (21)
    • ►  September (36)
    • ►  August (38)
    • ►  July (44)
    • ►  June (52)
    • ►  May (52)
    • ►  April (40)
    • ►  March (58)
    • ►  February (69)
    • ►  January (62)
  • ►  2011 (689)
    • ►  December (51)
    • ►  November (47)
    • ►  October (55)
    • ►  September (45)
    • ►  August (84)
    • ►  July (58)
    • ►  June (55)
    • ►  May (57)
    • ►  April (38)
    • ►  March (72)
    • ►  February (59)
    • ►  January (68)
  • ►  2010 (559)
    • ►  December (54)
    • ►  November (56)
    • ►  October (52)
    • ►  September (48)
    • ►  August (39)
    • ►  July (44)
    • ►  June (47)
    • ►  May (47)
    • ►  April (44)
    • ►  March (38)
    • ►  February (45)
    • ►  January (45)
  • ►  2009 (740)
    • ►  December (34)
    • ►  November (45)
    • ►  October (43)
    • ►  September (59)
    • ►  August (63)
    • ►  July (48)
    • ►  June (68)
    • ►  May (57)
    • ►  April (84)
    • ►  March (71)
    • ►  February (75)
    • ►  January (93)
  • ►  2008 (824)
    • ►  December (101)
    • ►  November (64)
    • ►  October (57)
    • ►  September (77)
    • ►  August (63)
    • ►  July (41)
    • ►  June (53)
    • ►  May (43)
    • ►  April (60)
    • ►  March (70)
    • ►  February (99)
    • ►  January (96)
  • ►  2007 (811)
    • ►  December (78)
    • ►  November (88)
    • ►  October (75)
    • ►  September (70)
    • ►  August (76)
    • ►  July (39)
    • ►  June (47)
    • ►  May (57)
    • ►  April (36)
    • ►  March (77)
    • ►  February (72)
    • ►  January (96)
  • ►  2006 (11)
    • ►  December (11)

VISITORS



Social Media Icons

News: eavesdropping, espionage, privacy, spycam, bugging, spying, cybersecurity, TSCM, surveillance. Powered by Blogger.