“Boston is a target-rich environment for anyone who is interested in intellectual property.”
–US Assistant Attorney General John Demers more
Monday, April 8, 2019
From Those Wonderful Folks Who Brought You APT - Manditory Free Pen-Testing
New provisions made to China's Cybersecurity Law gives state agencies the legal authority to remotely conduct penetration testing on any internet-related business operating in China, and even copy and later share any data government officials find on inspected systems...
These new provisions, named "Regulations on Internet Security Supervision and Inspection by Public Security Organs" give the MSP the following new powers:
These new provisions, named "Regulations on Internet Security Supervision and Inspection by Public Security Organs" give the MSP the following new powers:
- Conduct in-person or remote inspections of the network security defenses taken by companies operating in China.
- Check for "prohibited content" banned inside China's border.
- Log security response plans during on-site inspections.
- Copy any user information found on inspected systems during on-site or remote inspections.
- Perform penetration tests to check for vulnerabilities.
- Perform remote inspections without informing companies.
- Share any collected data with other state agencies.
- The right to have two members of the People's Armed Police (PAP) present during on-site inspection to enforce procedures. more
Judd Bank's Tips on How to Spot A Liar
At some point in life,
everyone is a victim of a lie. It may include romantic relationships,
business transactions, political behavior and/or criminal misrepresentation...
There are two main techniques in detecting deception without the use of a polygraph instrument. They are observing body language and asking open-ended questions... more
Concise and very educational. ~Kevin
There are two main techniques in detecting deception without the use of a polygraph instrument. They are observing body language and asking open-ended questions... more
Concise and very educational. ~Kevin
Sunday, April 7, 2019
How to Tell if Someone Snoops on Your Computer
Think about all of the personal information stored on your computer -- it's essentially an extension of your whole identity in digital form. You may have all your photos, videos, resumes, contacts, documents and other sensitive information saved on your PC or Mac.
Can you imagine someone snooping around and getting their hands on all that?
But how can you tell if someone was accessing your files and applications without your knowledge? Is someone using your computer behind your back? Thankfully, there are various ways to find out.
Read on and learn these tricks you can use to see if someone is snooping on your PC or Mac... more
Can you imagine someone snooping around and getting their hands on all that?
But how can you tell if someone was accessing your files and applications without your knowledge? Is someone using your computer behind your back? Thankfully, there are various ways to find out.
Read on and learn these tricks you can use to see if someone is snooping on your PC or Mac... more
Polish Millionaire Arrested Over Eavesdropping Scandal
A fugitive Polish "multi-millionaire" at the heart of an eavesdropping scandal... in 2015 has been arrested in Spain, police said Saturday.
Marek Falenta was sentenced to two-and-a-half years in prison in Poland in December 2016 for setting up an eavesdropping system in swanky restaurants in Warsaw that saw waiters record conversations between business-people and politicians.
That led to a major scandal that erupted in 2014 with media publishing extracts of incriminating conversations... more
Marek Falenta was sentenced to two-and-a-half years in prison in Poland in December 2016 for setting up an eavesdropping system in swanky restaurants in Warsaw that saw waiters record conversations between business-people and politicians.
That led to a major scandal that erupted in 2014 with media publishing extracts of incriminating conversations... more
Friday, April 5, 2019
The Surprising Cost of a GPS Tracking & Cellular Eavesdropping Bug
As described on eBay...
Ultra Mini GF-07 GPS Long Standby Magnetic SOS Tracking Device for Vehicle/Car/Person Location Tracker Locator System Anti-lost Device
Features:
1. Small size and light weight, easy for carry.
2. Black shell, easy to hide, perfect for tracking vehicles, teens, spouses, elderly persons or assets. With two powerful magnets inside, easy to attach to vehicle firmly, no extra installation need.
3. All you need is a working SIM card (NOT included!) to insert into the device, then you can track and map (with Google Maps) in real-time over the Internet.
4. Dial SIM card number, then you can hear voice around this tracker, with no light and no noise, you can monitoring and spy what's going on around the tracker silently and secretly.
5. Voice Recording Function: Send text message 555 to SIM card number, it will reply a message “Snd” and start recording, SIM card and TF card are not included.
Ultra Mini GF-07 GPS Long Standby Magnetic SOS Tracking Device for Vehicle/Car/Person Location Tracker Locator System Anti-lost Device
Features:
1. Small size and light weight, easy for carry.
2. Black shell, easy to hide, perfect for tracking vehicles, teens, spouses, elderly persons or assets. With two powerful magnets inside, easy to attach to vehicle firmly, no extra installation need.
3. All you need is a working SIM card (NOT included!) to insert into the device, then you can track and map (with Google Maps) in real-time over the Internet.
4. Dial SIM card number, then you can hear voice around this tracker, with no light and no noise, you can monitoring and spy what's going on around the tracker silently and secretly.
5. Voice Recording Function: Send text message 555 to SIM card number, it will reply a message “Snd” and start recording, SIM card and TF card are not included.
Electronic surveillance devices, like this one, are flooding into the country. Below is just one of the many ads on eBay alone. At these prices (as low as $11.99, and cheaper from the China and Hong Hong listings) they are throwaway items. Set it and forget it. No need to risk retrieving it to recharge the battery.
Businesses especially need to be concerned. Imagine competitors tracking your sales people, delivery trucks, or your top executives. Learn more about these types of devices and what you can do about them.
Click to enlarge. |
Labels:
#eavesdropping,
advice,
cybersecurity,
GPS,
GSM,
privacy,
spybot,
tracking
Pre-Installed Anti Malware Phone App Does More Harm Than Good
Researchers have discovered multiple vulnerabilities in a pre-installed app on phones made by one of the world’s biggest smartphone vendors that potentially impacted the privacy and security of more than 150 million Android users worldwide.
According to security researchers at Check Point Research, the vulnerabilities were found in an app pre-installed on smartphones made by Xiaomi, the biggest mobile phone manufacturer in China and India, and the fourth biggest by market share in the world.
The app in question was a self-proclaimed security app dubbed “Guard Provider,” which promised to protect Xiaomi users from malware.
Xiaomi said last year it had originally hoped to offer its smartphones and other hardware here in the States in 2019, though those efforts may have been delayed for PR reasons... more
Whew!
According to security researchers at Check Point Research, the vulnerabilities were found in an app pre-installed on smartphones made by Xiaomi, the biggest mobile phone manufacturer in China and India, and the fourth biggest by market share in the world.
The app in question was a self-proclaimed security app dubbed “Guard Provider,” which promised to protect Xiaomi users from malware.
Xiaomi said last year it had originally hoped to offer its smartphones and other hardware here in the States in 2019, though those efforts may have been delayed for PR reasons... more
Whew!
Thursday, April 4, 2019
The War Against Smartphone Spyware is On
Eva Galperin says she's learned the signs: the survivors of domestic abuse who come to her describing how their tormentors seem to know everyone they've called, texted, and even what they discussed in their most private conversations...
Galperin has a plan to end that scourge for good—or at least take a serious bite out of the industry.
In a talk she is scheduled to give next week at the Kaspersky Security Analyst Summit in Singapore, Galperin will lay out a list of demands:
Check here if you need a solution for checking your Android phone for spyware.
Galperin has a plan to end that scourge for good—or at least take a serious bite out of the industry.
In a talk she is scheduled to give next week at the Kaspersky Security Analyst Summit in Singapore, Galperin will lay out a list of demands:
- First, she's calling on the antivirus industry to finally take the threat of stalkerware seriously, after years of negligence and inaction.
- She'll also ask Apple to take measures to protect iPhone users from stalkerware, given that the company doesn't allow antivirus apps into its App Store.
- Finally, and perhaps most drastically, she says she'll call on state and federal officials to use their prosecutorial powers to indict executives of stalkerware-selling companies on hacking charges.
Check here if you need a solution for checking your Android phone for spyware.
Wednesday, April 3, 2019
Mar-a-Lago Intruder Caught with USB Stick Loaded with Malware
A Chinese woman carrying a thumb drive loaded with malware was detained at Mar-a-Lago Saturday after trying to gain access to events advertised on Chinese-language social media by Li “Cindy” Yang, the South Florida massage parlor entrepreneur who also ran a business selling access to President Donald Trump and his family.
The woman, Yujing Zhang, has been charged with two federal crimes: making false statements to a federal officer and entering restricted property.
She was carrying four cellphones, one laptop, one external hard drive and a thumb drive, according to court records. In a charging document, a Secret Service agent said a preliminary forensic examination of the thumb drive showed it contained “malicious malware.” The court filing did not provide further details about the nature of the malware. more
See our report on dangerous USB sticks, and what to do about them.
Worried about a person like this entering your premises? Call us.
The woman, Yujing Zhang, has been charged with two federal crimes: making false statements to a federal officer and entering restricted property.
She was carrying four cellphones, one laptop, one external hard drive and a thumb drive, according to court records. In a charging document, a Secret Service agent said a preliminary forensic examination of the thumb drive showed it contained “malicious malware.” The court filing did not provide further details about the nature of the malware. more
See our report on dangerous USB sticks, and what to do about them.
Worried about a person like this entering your premises? Call us.
Labels:
#espionage,
#hack,
#weird,
business,
computer,
cybersecurity,
government,
USB
Monday, April 1, 2019
How to Stop Acoustical Leakage Eavesdropping
Acoustical leakage often occurs even when specific steps are taken to keep conversations private, like closing an office or conference room door. But, as sure as sound wants to migrate, outsiders want to hear...
Aside from structural requirements, walls are built to provide privacy, primarily visual privacy. Little thought is given to privacy from acoustical leakage.
Thin walls and loose fitting doors are the biggest leakers, with open air plenum ceilings and duct work doing their share of leaking as well.
Ideally, acoustical leakage mitigation should be addressed by the architect and installed during the initial construction phase of the building project. Even when they do, a common misconception among contractors is that soundproofing means throwing up another layer of drywall. Wrongo.
Acoustical leakage can be mitigated two ways... more
Aside from structural requirements, walls are built to provide privacy, primarily visual privacy. Little thought is given to privacy from acoustical leakage.
Thin walls and loose fitting doors are the biggest leakers, with open air plenum ceilings and duct work doing their share of leaking as well.
Ideally, acoustical leakage mitigation should be addressed by the architect and installed during the initial construction phase of the building project. Even when they do, a common misconception among contractors is that soundproofing means throwing up another layer of drywall. Wrongo.
Acoustical leakage can be mitigated two ways... more
International Spy Museum is Moving and Expanding
The name isn’t changing, but when International Spy Museum opens in its shiny new home in May, it’s going to be about a lot more than just spies.
The museum, armed with a 140,000-square-foot new building at 700 L'Enfant Plaza SW, more than 5,000 new artifacts and a whole lot of tech, now aims to be about the full field of intelligence — not just human intelligence, or spying.
Spy will begin selling tickets for the opening, on May 12, in the coming weeks, and will also be rolling out an online trivia game that will give people a chance to win tickets to its opening gala, to be held May 11. more
The museum, armed with a 140,000-square-foot new building at 700 L'Enfant Plaza SW, more than 5,000 new artifacts and a whole lot of tech, now aims to be about the full field of intelligence — not just human intelligence, or spying.
Spy will begin selling tickets for the opening, on May 12, in the coming weeks, and will also be rolling out an online trivia game that will give people a chance to win tickets to its opening gala, to be held May 11. more
Man Admits Placing Camera in Friend's Home - Spied for a Year
FL - A 55-year-old Florida man accused of installing a hidden camera in a family friend’s home and watching them on his phone was arrested and charged Wednesday.
Terry Sumner plugged the camera into a wall outlet in the living room of the home sometime last year, according to the Hillsborough County Sheriff’s Office.
The woman discovered the camera March 5 and contacted authorities.
Sumner, of Plant City, admitted to detectives that he placed the camera there and it had been there for about a year.
“Sumner explained that there was a smartphone application on his phone that he would use to watch, listen and record activity in the victim's home through a live feed...” more
Terry Sumner plugged the camera into a wall outlet in the living room of the home sometime last year, according to the Hillsborough County Sheriff’s Office.
The woman discovered the camera March 5 and contacted authorities.
Sumner, of Plant City, admitted to detectives that he placed the camera there and it had been there for about a year.
“Sumner explained that there was a smartphone application on his phone that he would use to watch, listen and record activity in the victim's home through a live feed...” more
Former French Spy Accused in Africa Murder Plot Shot Dead in ‘Professional’ Hit
A former French spy was found dead with several bullet wounds at a rest stop in the Alps near Lake Geneva. Police said the killing of Daniel Forestier was a “professional job” and he had been shot five times in the head and heart, according to reports. more
Sunday, March 31, 2019
Security Tip: Why it Always Pays to Hire The Best.
Following the revelation that the The National Enquirer had obtained
intimate texts and images between Amazon CEO Jeff Bezos and Lauren
Sanches, Bezos ordered an investigation into who was behind the data
breach.
In a post on The Daily Beast, Bezos’ security consultant Gavin De Becker says that his team of investigators have “concluded with high confidence that the Saudis had access to Bezos’ phone...” more
In a post on The Daily Beast, Bezos’ security consultant Gavin De Becker says that his team of investigators have “concluded with high confidence that the Saudis had access to Bezos’ phone...” more
Subscribe to:
Posts (Atom)