Key Insights from the Webinar... more
Friday, October 11, 2024
Webinar Recap! Trade Secrets Audits: Strengthening Your Company’s IP Protection
Key Insights from the Webinar... more
Tuesday, May 28, 2024
Chinese Language Phone Keyboard Exploits Leave One Billion Users Exposed
Given the scope of these vulnerabilities, the sensitivity of what users type on their devices, the ease with which these vulnerabilities may have been discovered, and that the Five Eyes have previously exploited similar vulnerabilities in Chinese apps for surveillance, it is possible that such users’ keystrokes may have also been under mass surveillance.
Recommendation: We urge users to install the latest updates to their keyboard apps and that they keep their mobile operating systems up to date. We also recommend that at-risk users consider switching from a cloud-based keyboard app to one that operates entirely on-device. more
Monday, March 18, 2024
How to Hunt Down Malware on Mobile Devices
What Malware Looks Like and How it Gets There
Mobile malware manifests in various forms, from ransomware encrypting data to spyware surreptitiously monitoring activities. Understanding the modus operandi of mobile malware is critical for detection and mitigation efforts...How it lands on a device and what you can do... more
Thursday, February 15, 2024
Spybusters Tip #725: How to Find an Apple AirTag Hidden in Your Car
Friday, January 26, 2024
Citizens Warned Against Spy's 'Exotic Beauty' Traps
The Ministry of State Security said a Chinese man, Li Si, went to a nightclub while on an overseas trip and was later blackmailed by foreign spies.
The ministry's WeChat post's title read, "Hunting for beauty? You may become the prey". Analysts say such warnings reflect a sense of insecurity among China's leaders. more
Wednesday, January 24, 2024
How To Turn On Apple iPhone’s New Anti-Theft Feature
Activating Apple's new security mechanism is very straightforward. First you need to enable two-factor authentication for your Apple AI and set up a device passcode, Face ID or Touch ID, Find My, and Significant Locations (under Location Services).
Sunday, January 14, 2024
Spybuster Tip #629: Delete Apps that are 'Spying' Using 'One Day Rule'
Friday, January 5, 2024
Spybuster Tip # 823: Store Your Car Key Fobs in a Metal Can
The Relay Attack, a two-person attack, is when a thief walks up to the victim’s home with a piece of equipment that captures the signal from the key fob and then transmits the signal from a car key fob. "An accomplice waits nearby at the car door, usually with another device, to open the car when the signal is received," the AARP website said. The copied signal can fool the car into starting the ignition.
Saturday, June 24, 2023
Spybuster Tip #712 - Stop Smartphone Eavesdropping - Cap The App
Here’s how to do it on iPhone:
- Open the Settings app
- Scroll to Privacy & Security
- Tap Microphone
- Review the apps that have access to your microphone and toggle them on or off
- Open the Settings app
- Tap Privacy
- Tap Permission Manager
- Tap on Microphone
- Review the apps that have access to your microphone and toggle them on or off | more
Saturday, March 25, 2023
Journalist Plugs in Unknown USB Drive Mailed to Him
In case you missed our memo...
USB Memory Security Recommendations
- Block ports with a mechanical port block lock.
- Place security tape over that.
- Create a “no USB sticks unless pre-approved” rule.
- Warn employees that a gift USB stick could be a Trojan Horse gift.
- Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
- Don’t let visitors stick you. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.
Trending… IBM Takes The USB Memory Security Lead
“IBM has allegedly issued a worldwide ban against the the use of removable drives, including Flash, USB, and SD cards, to transfer data.
This new policy is being instituted to prevent confidential and sensitive information from being leaked due to misplaced or unsecured storage devices.
According to a report by The Register, IBM’s global chief Information security officer Shamla Naidoo issued an advisory stating that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (eg: USB, SD card, flash drive).” This advisory further stated that this policy is already in effect for some departments, but will be further enforced throughout the entire company.” more
Monday, January 16, 2023
Spybuster Tip #823 - Remote Control Duplicators
Never let your door / gate opener fob out of your control.
Here's why... Anyone (service person, neighbor, guest, valet, etc.) only needs to have access to your fob for a few seconds to make one for themselves.
Fob duplicators are cheap, available and easy to use... (more detailed version here)
Wednesday, July 13, 2022
17 CIA Tips - Think like a spy and stay safe while on vacation
I found the CIA's best practices, culled from the experience of its officers in the field, are exceptionally helpful, easy to adopt and especially relevant to Americans in these fraught times.
Here’s how to think like a spy on the ground overseas... more
Thursday, February 17, 2022
Spybuster Tip # 712: How to Thwart Off-Site Meeting Spies
The National Executive Council of the Academic Staff Union of Universities, on Sunday, changed the venue of the meeting... A reliable source said the venue was changed due to the fear of bugging of the auditorium by secret agents of the Nigerian government. more
Thursday, September 23, 2021
Reasons You Should Never Connect To Public Wifi
There Are Too Many Risks
Put simply, the risks you take when you connect to Wifi in public places such as libraries, stations, cafes, and shopping malls are often too great to make the benefits worthwhile...
- Misuse of personal data Distribution of malware
- Insecure connection
- Online attacks on business
- Eavesdropping
Hackers or anyone with a sound knowledge about internet software and applications can eavesdrop on your personal data if they are using the same public Wi-Fi connection as you are...
- Try not to share your personal data while you are using a personal Wi-Fi connection.
- Avoid logging in to websites that involve your personal or bank credentials.
- Try using a VPN (virtual Private Network) service that will help you to encrypt all the data you receive or send.
- Use 2-Factor authorizations that will make your connection secure and prevent the risk of data loss.” more
Tuesday, September 21, 2021
Spy Tip 592 - How to Eavesdrop More Effectively
He explained: “Try listening with your right ear and not your left – your right ear is connected to the left side of your brain which processes speech and language.”
His posts on body hacks have gone viral and include a range of tricks and trips.
He also revealed how you can get rid of hiccups. more
Monday, March 22, 2021
How Grandma Hears Everything...
There is a new eavesdropping spy trick in town. You could get burned unless you know about it.
Let’s start with Grandma. She is hard of hearing. A while back the family gave her money to buy two new hearing aids. Nice. Now she has stopped saying, “WHAT!” all the time. She hears everything clearly.
There is only one problem. She seems to hear everyone’s conversations even when she is not in the room. Sometimes she is in her room with the door closed.
It’s a mystery, but we’ll figure it out soon. more
Tuesday, February 23, 2021
The Most Secure and Anonymous Communication Tools Available
via David Koff, Tech Talk - The Technology Newsletter for Everyone...
What I’m about to share with you here is… kind of fringe. Like, “Edward Snowden” fringe.
Hopefully, that got your attention.
For some years now, the hacker, privacy, and journalism communities have all been debating, discussing, and using the tools I’m about to share with you in this installment. These tools are used not only to lock down your security and anonymity on the known internet, but also to access the portions of the internet that are normally hidden — “The Dark Web.”
Despite their usefulness, I haven’t really seen information about these
tools shared with the general public in a straightforward,
easy-to-understand way. I think it’s worth changing that; while most of
us don’t need the same high-privacy, high-security tools that confidential informants, journalists, and whistleblowers use, we should all know about these tools in case the time comes when we actually need them. more
Tuesday, December 29, 2020
Check Your Holiday Rental for Hidden Surveillance Cameras
Australia - There's something unsettling about the idea of being watched while you and your loved ones kick back on holidays. If you've searched online to find whether holiday rental landlords spy on their guests, there's plenty to feed your paranoia...
Still, if something feels off or you want to sweep the house, there are some steps you can take. Although without professionals and high-tech gear involved, it can't be 100 per cent accurate...
Julian Claxton, a counter-espionage specialist, recommended a hidden camera detector — small devices that project a light that will reflect off the lens of a covert camera... "The reality is, that's how a lot of these cameras can be found — through anomalies. Things that just don't look right within an environment," he explained.
Tips:
- Inspect what's on the Wi-Fi network... Many cameras sold in consumer electronic stores need an internet connection so they can be viewed remotely from a computer or app. This could provide a clue.
- Try to spot the camera lens... Julian Claxton, a counter-espionage specialist, recommended a hidden camera detector — small devices that project a light that will reflect off the lens of a covert camera.
- Check the power points... Hidden cameras need ongoing power, so Mr Claxton suggested looking at what's connected to power points.
- Look for oddly placed objects... Hidden cameras can be built into just about anything, but for the lay person, Mr Claxton suggested using "a bit of common sense". more
Also, consider taking a one-hour, on-line, video Spycam Detection Training course.
Sunday, November 29, 2020
Concerned about Sony's PS5 spying on you? Here is What You Can Do...
Gamers are a bit concerned about privacy on the PS5.
It was recently confirmed the DualSense's mic auto-records anything you say when unlocking an in-game trophy. This is just the tip of the iceberg, really.
As a PS5 owner you can limit the data that Sony collects. But you can't turn data collection off entirely.
Here's how to adjust your data collection settings:
Settings -> Users and Accounts -> Privacy -> Data You Provide more
Friday, October 9, 2020
The FBI Hotel Wi-Fi Security Checklist
The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels.
US hotels, predominantly in major cities, have begun to advertise daytime room reservations for guests seeking a quiet, distraction-free work environment. While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks.
Malicious actors can exploit inconsistent or lax hotel Wi-Fi security
and guests’ security complacency to compromise the work and personal
data of hotel guests. Following good cyber security practices can
minimize some of the risks associated with using hotel Wi-Fi for
telework. more