Wednesday, September 3, 2025
Spybuster Tip: iPhone 'secret code' reveals if someone is spying on your text message
Thursday, August 21, 2025
Security Advice of the Week
To protect yourself, aka think like a spy, you can use the following checklist to stay alert and avoid getting pulled under by scammers:
- Pause before acting on urgent claims.
- Question the logic—does it make sense, or is it just dramatic?
- Verify facts across multiple reliable sources.
- Ask who benefits if you act right now.
Monday, July 7, 2025
Travel Security - Hotel Safes & Spybuster Tips
Check for default codes:
• The hotel is responsible for ensuring the safe is secure and the master code is reset to prevent unauthorized access.
• If the master code is not reset, anyone with knowledge of the default code can potentially access the safe.
• Some hotels may charge a fee to reset the safe code to a custom PIN number.
• Portable Travel Safes - Soft or hard lockboxes with steel cable tethers. You hide them elsewhere in the room (e.g., attached to plumbing or heavy furniture). They avoid the hotel supplied safe altogether.
• Tamper-Evident Devices - Security tape, zip ties, or door seals placed over the safe seam or keypad can alert you to tampering. They don’t secure, only monitor.
• Bluetooth Tracker - Hide a Tile, AirTag, or Chipolo inside the safe. It may notify if the safe is opened, and its location if it has been moved.
• Security Cables - Wrap a steel cable lock (not a heavy duty bike or motorcycle cable) through the safe door handle or around the body—but this depends on the safe’s design. These may also be useful for turning your suitcase or backpack into an impromptu security enclosure.
Q. Why make this information publicly available and teach the bad guys?
Thursday, June 19, 2025
Protecting Electronic Devices When Crossing U.S. Borders
- Consider leaving your device behind.
- Password-protect your electronic devices with strong passwords
- Back up data before traveling.
- Remove sensitive data from a device before traveling.
- Remember that “deleted” files can be searched.
- Log out of cloud accounts
- Know your rights and legal status.
- Keep emergency contact information (including for an attorney) on paper to make this information available if a device is seized.
- If your device is seized, request a receipt (CBP Form 6051D)
- After a search, be sure to change your passwords.
Friday, October 11, 2024
Webinar Recap! Trade Secrets Audits: Strengthening Your Company’s IP Protection
Key Insights from the Webinar... more
Tuesday, May 28, 2024
Chinese Language Phone Keyboard Exploits Leave One Billion Users Exposed
Given the scope of these vulnerabilities, the sensitivity of what users type on their devices, the ease with which these vulnerabilities may have been discovered, and that the Five Eyes have previously exploited similar vulnerabilities in Chinese apps for surveillance, it is possible that such users’ keystrokes may have also been under mass surveillance.
Recommendation: We urge users to install the latest updates to their keyboard apps and that they keep their mobile operating systems up to date. We also recommend that at-risk users consider switching from a cloud-based keyboard app to one that operates entirely on-device. more
Monday, March 18, 2024
How to Hunt Down Malware on Mobile Devices
What Malware Looks Like and How it Gets There
Mobile malware manifests in various forms, from ransomware encrypting data to spyware surreptitiously monitoring activities. Understanding the modus operandi of mobile malware is critical for detection and mitigation efforts...How it lands on a device and what you can do... more
Thursday, February 15, 2024
Spybusters Tip #725: How to Find an Apple AirTag Hidden in Your Car
Friday, January 26, 2024
Citizens Warned Against Spy's 'Exotic Beauty' Traps
The Ministry of State Security said a Chinese man, Li Si, went to a nightclub while on an overseas trip and was later blackmailed by foreign spies.
The ministry's WeChat post's title read, "Hunting for beauty? You may become the prey". Analysts say such warnings reflect a sense of insecurity among China's leaders. more
Wednesday, January 24, 2024
How To Turn On Apple iPhone’s New Anti-Theft Feature
Activating Apple's new security mechanism is very straightforward. First you need to enable two-factor authentication for your Apple AI and set up a device passcode, Face ID or Touch ID, Find My, and Significant Locations (under Location Services).
Sunday, January 14, 2024
Spybuster Tip #629: Delete Apps that are 'Spying' Using 'One Day Rule'
Friday, January 5, 2024
Spybuster Tip # 823: Store Your Car Key Fobs in a Metal Can
The Relay Attack, a two-person attack, is when a thief walks up to the victim’s home with a piece of equipment that captures the signal from the key fob and then transmits the signal from a car key fob. "An accomplice waits nearby at the car door, usually with another device, to open the car when the signal is received," the AARP website said. The copied signal can fool the car into starting the ignition.
Saturday, June 24, 2023
Spybuster Tip #712 - Stop Smartphone Eavesdropping - Cap The App
Here’s how to do it on iPhone:
- Open the Settings app
- Scroll to Privacy & Security
- Tap Microphone
- Review the apps that have access to your microphone and toggle them on or off
- Open the Settings app
- Tap Privacy
- Tap Permission Manager
- Tap on Microphone
- Review the apps that have access to your microphone and toggle them on or off | more
Saturday, March 25, 2023
Journalist Plugs in Unknown USB Drive Mailed to Him
In case you missed our memo...
USB Memory Security Recommendations
- Block ports with a mechanical port block lock.
- Place security tape over that.
- Create a “no USB sticks unless pre-approved” rule.
- Warn employees that a gift USB stick could be a Trojan Horse gift.
- Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
- Don’t let visitors stick you. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.
Trending… IBM Takes The USB Memory Security Lead
“IBM has allegedly issued a worldwide ban against the the use of removable drives, including Flash, USB, and SD cards, to transfer data.
This new policy is being instituted to prevent confidential and sensitive information from being leaked due to misplaced or unsecured storage devices.
According to a report by The Register, IBM’s global chief Information security officer Shamla Naidoo issued an advisory stating that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (eg: USB, SD card, flash drive).” This advisory further stated that this policy is already in effect for some departments, but will be further enforced throughout the entire company.” more
Monday, January 16, 2023
Spybuster Tip #823 - Remote Control Duplicators
Never let your door / gate opener fob out of your control.
Here's why... Anyone (service person, neighbor, guest, valet, etc.) only needs to have access to your fob for a few seconds to make one for themselves.
Fob duplicators are cheap, available and easy to use... (more detailed version here)
Wednesday, July 13, 2022
17 CIA Tips - Think like a spy and stay safe while on vacation
I found the CIA's best practices, culled from the experience of its officers in the field, are exceptionally helpful, easy to adopt and especially relevant to Americans in these fraught times.
Here’s how to think like a spy on the ground overseas... more
Thursday, February 17, 2022
Spybuster Tip # 712: How to Thwart Off-Site Meeting Spies
The National Executive Council of the Academic Staff Union of
Universities, on Sunday, changed the venue of the meeting... A reliable source said the venue was changed due to the fear of
bugging of the auditorium by secret agents of the Nigerian government. more
Thursday, September 23, 2021
Reasons You Should Never Connect To Public Wifi
There Are Too Many Risks
Put simply, the risks you take when you connect to Wifi in public places such as libraries, stations, cafes, and shopping malls are often too great to make the benefits worthwhile...
- Misuse of personal data Distribution of malware
- Insecure connection
- Online attacks on business
- Eavesdropping
Hackers or anyone with a sound knowledge about internet software and applications can eavesdrop on your personal data if they are using the same public Wi-Fi connection as you are...
- Try not to share your personal data while you are using a personal Wi-Fi connection.
- Avoid logging in to websites that involve your personal or bank credentials.
- Try using a VPN (virtual Private Network) service that will help you to encrypt all the data you receive or send.
- Use 2-Factor authorizations that will make your connection secure and prevent the risk of data loss.” more
Tuesday, September 21, 2021
Spy Tip 592 - How to Eavesdrop More Effectively
He explained: “Try listening with your right ear and not your left – your right ear is connected to the left side of your brain which processes speech and language.”
His posts on body hacks have gone viral and include a range of tricks and trips.
He also revealed how you can get rid of hiccups. more
Monday, March 22, 2021
How Grandma Hears Everything...
There is a new eavesdropping spy trick in town. You could get burned unless you know about it.
Let’s start with Grandma. She is hard of hearing. A while back the family gave her money to buy two new hearing aids. Nice. Now she has stopped saying, “WHAT!” all the time. She hears everything clearly.
There is only one problem. She seems to hear everyone’s conversations even when she is not in the room. Sometimes she is in her room with the door closed.
It’s a mystery, but we’ll figure it out soon. more