The Relay Attack, a two-person attack, is when a thief walks up to the victim’s home with a piece of equipment that captures the signal from the key fob and then transmits the signal from a car key fob. "An accomplice waits nearby at the car door, usually with another device, to open the car when the signal is received," the AARP website said. The copied signal can fool the car into starting the ignition.
Friday, January 5, 2024
Spybuster Tip # 823: Store Your Car Key Fobs in a Metal Can
The Relay Attack, a two-person attack, is when a thief walks up to the victim’s home with a piece of equipment that captures the signal from the key fob and then transmits the signal from a car key fob. "An accomplice waits nearby at the car door, usually with another device, to open the car when the signal is received," the AARP website said. The copied signal can fool the car into starting the ignition.
Wednesday, October 18, 2023
Is This a Bug?
This question comes from Reddit, where someone answered correctly.
We have a collection of many other "Is This a Bug?" photos and explanations.Monday, October 9, 2023
China Is Becoming a No-Go Zone for Executives
“There is a very significant cautionary attitude toward travel to China,” said Tammy Krings, chief executive of ATG Travel Worldwide, which works with large employers around the world. “I would advise mission-critical travel only.” Krings said she has seen a roughly 25% increase in cancellations or delays of business trips to China by U.S. companies in recent weeks. more
Tuesday, August 15, 2023
Baby Monitors & Smart Speakers Enabling Abuse, say MPs
The MPs say the government must tackle the situation. (hear! hear!) more
Thursday, April 27, 2023
Hugh Grant Accuses The Sun Used 'Bugging' to Obtain Private Information
The 62-year-old actor made the allegations in a witness statement read out as part of his lawsuit against News Group Newspapers (NGN) - the publisher of The Sun and the now-defunct News Of The World.
The British star attended the final day of a hearing at London's High Court where NGN is bringing a bid to have claims by him and Prince Harry thrown out. more
Thursday, April 6, 2023
Doctor Slipped Cleaner into Spouse’s Tea - He Installed Cameras
A Mission Viejo dermatologist is accused of using liquid cleaner to try to poison her husband. Suspicious about the taste of his tea, he installed cameras at home.
Wednesday, March 15, 2023
From Phone Bugging to Kidnapping...
...these are the biggest security concerns of the super-rich...Armed burglaries, kidnapping, offshore bank account hacking - when it comes to security risks of the super-rich, nothing is off the cards.
‘UHNWs often have unique security concerns due to their wealth and high profile’, says David Webb, Managing Director at Valkyrie, a specialist security consultancy firm. ‘These issues are not just specific to them but can also involve their families and close friends...
Wednesday, July 13, 2022
MA - Lawmaker Hopes to Change Wiretapping Law
Alex Fopiano was in court today as his lawyer asked the judge to dismiss the criminal charges against him. He is accused of attempting to suffocate his wife, Shauna Fopiano, with a pillow...
She was criminally charged with eight counts of illegal wiretapping for making secret recordings of her husband, her alleged abuser. In a deal approved earlier this month, the charges will be dismissed in six months as long as she commits no other crimes.
"I was shocked that this is something that could still actually happen to somebody in Massachusetts," said state Sen. Patrick O'Connor, R-Weymouth.
The state's wiretapping law makes it a criminal offense to record someone without their permission. O'Connor said it should be updated to include an exemption to give victims of domestic violence the chance to record their abusers. more
17 CIA Tips - Think like a spy and stay safe while on vacation
I found the CIA's best practices, culled from the experience of its officers in the field, are exceptionally helpful, easy to adopt and especially relevant to Americans in these fraught times.
Here’s how to think like a spy on the ground overseas... more
Tuesday, May 31, 2022
The CIA Shares How to Travel Like a Spy
Sunday, May 15, 2022
Things Often Mistaken for Eavesdropping Bugs
Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”
Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky.
Thursday, August 26, 2021
Personal Security: Remove Your House from Apple Maps, Google Maps & Bing Maps
If you’d like to opt out of a property you own or rent appearing in one of these street-level views, you can use a reporting or request method in each service:
- Apple: Apple requires that you email them “to request that a face, license plate, or your own house be censored.” The address is MapsImageCollection@apple.com.
- Google: Visit maps.google.com and go to the address of concern. Expand the side panel on the left, then click the photo in the side panel to have it enlarge in your browser. Look for an info box in the upper left of the photo and click on the icon of the three vertical dots. In the pop-up that appears, click “Report a problem” and select what you would like to have blurred from the “Request blurring” list of options. You can also submit via the Google Maps app.
- Microsoft: Visit Bing Maps, click “Report a privacy concern with this image” at the lower-left corner of the page, and select House (or another option) from “What kind of concern do you have?” You can describe in the text box below that you want to have your house blurred. more
Thursday, August 19, 2021
Your Own Personal License Plate Reader
via Theodore Claypoole, Womble Bond Dickinson (US) LLP
Somewhere along the path between doorbell cameras and anti-tank weapons lies the newest home protection equipment – privately-owned license plate readers. A new company straight out of Y Combinator is offering machine-learning license plate capture technology for your home and office. Flock Safety, a start-up that describes itself in press releases as a crime-solving company, offers for sale TALON, a national network of automatic license plate readers. Anyone can own a node in this network.
Until recently, license plate readers had been the province of law enforcement... more
OK, how much?
The Flock Safety Falcon camera is $2,500 per camera per year, with a one-time $250 installation cost. This price includes everything — installation, maintenance, footage hosting, cellular service, and software updates. The Sparrow camera (a lighter and smaller version of our Falcon camera) costs slightly less with the same basic subscription model. more
Friday, August 13, 2021
Tips for Closing Hard-to-Delete Online Accounts
via Consumer Reports
Tips for Deleting Old Accounts
- Check to see if anyone has figured out the steps. Google “how to delete [company name] account” and you’ll often find instructions. (A step-by-step guide to deleting two dozen common accounts.)
- Go to the Settings page first. Companies sometimes put the delete button in settings, account menus, or pages to edit your profile; it varies by company.
- Try the privacy policy. Privacy policies often include instructions, and you can search for words like “account,” “delete,” “close,” or “deletion.”
- Explore the Help menus. If there’s a Help menu or an FAQ section on a website, you can often find deletion instructions there.
- Try customer service. When available, text chats are usually faster than phone calls in my experience.
- Take advantage of privacy laws. California’s privacy law, the CCPA, requires most businesses to let state residents delete data collected from them. Companies don’t have to fulfill a deletion request if you’re not a resident, but some honor requests from anyone. Look for “California” or “CCPA” in privacy policies for details.
- Don’t forget the accounts you’ve forgotten. You may have registered for accounts years ago that have slipped your mind. A whole article
with detailed instructions on how to find them. Some tips to get
started: Google your email address and old usernames; check for saved
log-ins in your web browser or password manager; search your email inbox
for old “welcome” messages. Try variations on phrases like “welcome
to,” “new account,” “password,” or “confirm your email.” more
Thursday, May 6, 2021
Vishing — Phone Call Attacks and Scams
via Jen Fox, SANS OUCH Newsletter...
While some of today’s cyber criminals
do use advanced technologies, many simply use the phone to trick their victims...
-
Anytime anyone calls you and creates a tremendous sense of urgency or pressure, be extremely suspicious. They are attempting to rush you into making a mistake. Even if the phone call seems OK at first, if it starts to feel strange, you can stop and say “no” at any time.
-
Be especially wary of callers who insist that you purchase gift cards or prepaid debit cards.
-
Never trust Caller ID. Bad guys will often spoof the number, so it looks like it is coming from a legitimate organization or has the same area code as your phone number.
-
Never allow a caller to take temporary control of your computer or trick you into downloading software. This is how they can infect your computer.
-
Unless you placed the call, never give the other party information that they should already have. For example, if the bank called you, they shouldn’t be asking for your account number.
-
If you believe a phone call is an attack, simply hang up. If you want to confirm that the phone call was legitimate, go to the organization’s website (such as your bank) and call the customer support phone number directly yourself. That way, you really know you are talking to the real organization.
-
If a phone call is coming from someone you do not personally know, let the call go directly to voicemail. This way you can review unknown calls on your own time. Even better, on many phones you can enable this by default with the “Do Not Disturb” feature. more
Monday, December 14, 2020
Exercise Like Your Walter Mitty Secret Agent Life Depended On It
via Justin Harper, Business reporter, BBC News, Singapore
I was the hero in my very own spy story, speeding from one checkpoint to another to foil the bad guys.
The plot came from a running app called Running Stories, which casts you as a secret agent in a story playing out with a heart-thumping soundtrack.
It is one of the latest apps designed to make exercise more entertaining, using real-time data that integrates the plot with your surroundings.
Key events in the storyline are triggered when a runner passes specific GPS markers and landmarks.
From being shot at by snipers to racing to catch a speedboat along the river, the plot kept me engaged and burned plenty of calories. more