Thursday, March 8, 2012
From that wonderful state that brought you the Hatfield–McCoy feud... The Rat App
›
“If every West Virginia resident that owns a smart phone (and knows how to use it) gets this app . . . you'll literally have 10 (sic) ci...
Van Eck 2012 - Brain Sucking Cell Phone Spiders
›
The processors in smart phones and tablets leak radio signals that betray the encryption keys used to protect sensitive data. At the RSA...
Info Security in 2 Steps - Train Your Humans, Have Your Technical Vulnerabilities Checked and Patched
›
There’s a famous saying that “amateurs hack systems, while professionals hack people.” The point is that security technology designed to s...
Do Company Execs Know Sensitive Data When They See It? Many in IT Say No
›
Today’s companies, clearly very good at collecting data, seem “less savvy when it comes to how to classify and manage it.” That’s the conc...
Jamming on the Bus, or The Cell Phone Vigilante
›
PA - A man in Philadelphia decided he'd had enough with listening to his fellow bus passengers blab away on their cellphones. But inste...
Monday, March 5, 2012
Certified Ethical Hacker (CEH) Course Growing
›
India - " We started ethical hacking courses in 2009 with five students which has increased to approx 200 students today, " said J...
Former US Marine, Accused CIA Spy, to be Re-tried in Iran
›
Click to enlarge. Iran’s Supreme Court has overturned a death sentence for spying handed down to a former U.S. Marine, Amir Mirzai Hekmat...
Poison Text Messages and Malicious Mobile Apps on the Rise
›
Nearly one in five mobile phone users have experienced some type of security threat with their device. That's the finding of a Cloudmark...
Sunday, March 4, 2012
Business Espionage: Spy Who Stole DuPont's Secrets Pleads Guilty
›
A former DuPont Corp. scientist has pleaded guilty to conspiring to commit economic espionage for a company controlled by the Chinese govern...
Japanese Acoustic Ray Gun Silences Blabbing Godzillas
›
Tired of listening to a boring talk, a lecture or a colleague rattling in the office? The Japanese have found an answer to your woes. You ca...
Computer Mouse with Ears ...and its own Cell Phone
›
UK - Innocent-looking, regular office equipment are now increasingly being used by employers to monitor staff in Britain. Employers use t...
SpyCam Story #656 - This Week in SpyCam News
›
SpyCam stories have become commonplace and the techniques used, repetitive. While I will continue to keep lose track of the subject for stat...
Saturday, March 3, 2012
Spy School - Monitor a Twitter Account Without Following It
›
Investigator's Tip: " Monitoring an opponent’s Twitter account is an important part of opposition research. If you would like to k...
NSA-Level Cell Phone Security (No, you can't have one.)
›
The US National Security Agency has modified Google’s Android operating system to create smart phones that use powerful encryption to prote...
Just in time to celebrate "International Speak Like A Spy Day"
›
THE DICTIONARY OF ESPIONAGE: SPYSPEAK INTO ENGLISH We use words to tell each other what we mean. Words illuminate reality. But sometimes, a...
‹
›
Home
View web version