A Walt Disney World employee made an illegal audio recording of her interview with Disney security officials while being questioned about thefts at the theme parks, according to prosecutors.
Alicia Reese later shared that secret recording with Patrick Spikes, a former Disney employee who is accused of breaking into a theme park attraction and stealing props, deputies allege.
Prosecutors have charged Reese with an illegal interception of oral communications, a felony punishable by up to five years in prison.
Reese and Spikes have pleaded not guilty to the charges against them. Reese, who had been an employee of ESPN Club restaurant at Disney’s Boardwalk Resort, was interviewed by two Disney security investigators in March about thefts from the company. more
Friday, December 27, 2019
Thursday, December 26, 2019
The 11 types of business failure – and how you can learn from the mistakes of others
Founders and business professionals can learn a lot about the failure landscape from Robin Banerjee’s new book, Who Blunders and How: The Dumb Side of the Corporate World. The eleven chapters are written in a conversational style and span 265 pages, full of examples, analysis and tips...
(Guess what made the list.)
Some rivalries between business groups have led to allegations of unethical advertising practices, and even corporate espionage... more
It's easy to "blunder" when it comes to corporate espionage. By definition, espionage is a covert practice. Because you don't see it, you don't believe it is happening. Successful espionage is invisible. Only failures make the news. Successful corporations employ specialists to monitor for espionage.
(Guess what made the list.)
Some rivalries between business groups have led to allegations of unethical advertising practices, and even corporate espionage... more
It's easy to "blunder" when it comes to corporate espionage. By definition, espionage is a covert practice. Because you don't see it, you don't believe it is happening. Successful espionage is invisible. Only failures make the news. Successful corporations employ specialists to monitor for espionage.
The Top 200 Worst Passwords of 2019
Independent researchers, who requested to stay anonymous, compiled and
shared with us a list of 200 most popular passwords that were leaked in
data breaches just this year. The database is quite impressive — 500
million passwords in total. And if you think that’s a lot of leaked
passwords, we have some bad news for you — it’s just the tip of the
iceberg. more
Here are the Top 20 to get you started...
Top 2020 New Years Resolution... Fortify your passwords.
Here are the Top 20 to get you started...
Top 2020 New Years Resolution... Fortify your passwords.
World's Smallest Video Camera (unfreakinbelieveable!)
This company in Taiwan has been reducing the size of video cameras year after year. I would like to say this is the smallest possible, but they continue to surprise.
If you have privacy concerns caused by the flood of covert video surveillance cameras, stop by here and learn how to fight back.
If you have privacy concerns caused by the flood of covert video surveillance cameras, stop by here and learn how to fight back.
Trend Micro Reveals Security Worries for 2020
In 2020, tried-and-tested cyber crimes – such as extortion, obfuscation and phishing – will remain, but new risks will inevitably emerge.
Full 5G implementations will introduce new security threats and the increased migration to the cloud will see more organizations facing risks from their cloud and supply chain.
In addition, the sheer number of connected assets and infrastructures will open doors to threats, and fake images, videos, or audio will be used to manipulate enterprise business procedures.
This is according to a new report from security firm Trend Micro, titled: “The New Norm: Trend Micro Security Predictions for 2020.”
...of special interest to our clients...
Full 5G implementations will introduce new security threats and the increased migration to the cloud will see more organizations facing risks from their cloud and supply chain.
In addition, the sheer number of connected assets and infrastructures will open doors to threats, and fake images, videos, or audio will be used to manipulate enterprise business procedures.
This is according to a new report from security firm Trend Micro, titled: “The New Norm: Trend Micro Security Predictions for 2020.”
...of special interest to our clients...
Machine learning and AI will be abused to listen in on connected devices like smart TVs and speakers to snoop on personal and business conversations, which can then provide material for extortion or corporate espionage. moreIOT devices used for espionage, extortion.
Thursday, November 21, 2019
"Electronic Device" Found in Mayor's Office
MI - Flint Police are investigating after an electronic surveillance device was found inside Flint City Hall.
The device was found in the mayor's office, Interim Police Chief Phil Hart said.
Hart said he cannot speak as to what the capabilities of the electronic surveillance device are at this time.
No other information has been released because it is still under investigation. more
Former Flint Police Chief Timothy Johnson believed the device could've been in City Hall when Former Mayor Karen Weaver was in office.
He said she was concerned when she moved into City Hall that it had been bugged with recording devices. So Johnson said they checked her office, even removing ceiling tiles.* But, he explained, Weaver's was the only office they checked. more
* A professional technical surveillance countermeasures inspection is quite a bit more thorough.
The device was found in the mayor's office, Interim Police Chief Phil Hart said.
Hart said he cannot speak as to what the capabilities of the electronic surveillance device are at this time.
No other information has been released because it is still under investigation. more
Former Flint Police Chief Timothy Johnson believed the device could've been in City Hall when Former Mayor Karen Weaver was in office.
He said she was concerned when she moved into City Hall that it had been bugged with recording devices. So Johnson said they checked her office, even removing ceiling tiles.* But, he explained, Weaver's was the only office they checked. more
* A professional technical surveillance countermeasures inspection is quite a bit more thorough.
Spybuster Tip #734: Don't Store Incriminating Photos on Your Android Phone
This time around, a team of security researchers found a terrifying flaw with the Android camera apps that could let malicious apps completely take control over a phone’s camera to spy on users without their knowledge.
It doesn’t take a genius to know that photos and videos can contain extremely sensitive information, and therefore, you should think twice about giving an app permission to use a camera...
Android camera apps often store photos and videos to an SD card, granting an app permission to storage gives it access to the entire contents of that card, according to the researchers. And the truly terrifying thing is that attackers wouldn’t even need to request access to the camera.
To demonstrate the vulnerability, the team at Checkmarx recorded a proof-of-concept video. Using a mockup Weather app, the team was able to not only take photo and video from a Pixel 2 XL and Pixel 3, it also was able to glean GPS data from those photos.
The team was able to detect when the phone was face down and could then remotely direct the rear camera to take photos and video. Another creepy bit is that attackers could potentially enact a “stealth mode,” where camera shutter noises are silenced and after taking photos, return the phone to its lock screen like nothing happened.
But perhaps most disturbingly, the video demonstrates a scenario where attackers could start recording a video while someone was in the middle of call, record two-way audio, and take photos or video of the victim’s surroundings—all without the target knowing. more
It doesn’t take a genius to know that photos and videos can contain extremely sensitive information, and therefore, you should think twice about giving an app permission to use a camera...
Android camera apps often store photos and videos to an SD card, granting an app permission to storage gives it access to the entire contents of that card, according to the researchers. And the truly terrifying thing is that attackers wouldn’t even need to request access to the camera.
To demonstrate the vulnerability, the team at Checkmarx recorded a proof-of-concept video. Using a mockup Weather app, the team was able to not only take photo and video from a Pixel 2 XL and Pixel 3, it also was able to glean GPS data from those photos.
The team was able to detect when the phone was face down and could then remotely direct the rear camera to take photos and video. Another creepy bit is that attackers could potentially enact a “stealth mode,” where camera shutter noises are silenced and after taking photos, return the phone to its lock screen like nothing happened.
But perhaps most disturbingly, the video demonstrates a scenario where attackers could start recording a video while someone was in the middle of call, record two-way audio, and take photos or video of the victim’s surroundings—all without the target knowing. more
Tuesday, November 19, 2019
WhatsApp? Eavesdropping. That's WhatsApp.
WhatsApp parent company Facebook has issued a warning about a new vulnerability on its hugely-popular chat app, which could let hackers take control of their device remotely and eavesdrop on your every conversation.
Facebook has warned users about a potential vulnerability within its WhatsApp chat app that allows cyber-criminals to take control of your device remotely. The security flaw could also allow them to eavesdrop on your conversations.
And if that wasn’t worrying enough, all you’d have to do to let the hackers access your handset is watch a single video... This security flaw affects all versions of WhatsApp, from Windows Phone to iOS. It even includes the enterprise-focused WhatsApp Business. That suggests the issue was found in the underlying code that powers all versions of the chat app...
WhatsApp has closed the loophole with the latest updates to WhatsApp. If you haven’t already got automatic app updates set on your smartphone, you should head to your respective app store and download the latest software to make sure you’re sa
According to Facebook, the potential issue only impacts the following versions of WhatsApp:
fe from attack.
Facebook has warned users about a potential vulnerability within its WhatsApp chat app that allows cyber-criminals to take control of your device remotely. The security flaw could also allow them to eavesdrop on your conversations.
And if that wasn’t worrying enough, all you’d have to do to let the hackers access your handset is watch a single video... This security flaw affects all versions of WhatsApp, from Windows Phone to iOS. It even includes the enterprise-focused WhatsApp Business. That suggests the issue was found in the underlying code that powers all versions of the chat app...
WhatsApp has closed the loophole with the latest updates to WhatsApp. If you haven’t already got automatic app updates set on your smartphone, you should head to your respective app store and download the latest software to make sure you’re sa
According to Facebook, the potential issue only impacts the following versions of WhatsApp:
fe from attack.
- Android versions of WhatsApp before 2.19.274
- iOS versions of WhatsApp before 2.19.100
- Enterprise Client versions of WhatsApp before 2.25.3
- Windows Phone versions of WhatsApp before and including 2.18.368
- Business for Android versions of WhatsApp before 2.19.104
- Business for iOS versions of WhatsApp before 2.19.100
Beginner's Guide to Small Business Cyber Security
Cyber Essentials is a guide for leaders of small businesses as well as leaders of small and local government agencies to develop an actionable understanding of where to start implementing organizational cybersecurity practices.
Consistent with the NIST Cybersecurity Framework and other standards, the Cyber Essentials are the starting point to cyber readiness...
Managing cyber risks requires building a Culture of Cyber Readiness. The Culture of Cyber Readiness has six Essential Elements... more
Consistent with the NIST Cybersecurity Framework and other standards, the Cyber Essentials are the starting point to cyber readiness...
Managing cyber risks requires building a Culture of Cyber Readiness. The Culture of Cyber Readiness has six Essential Elements... more
Eavesdropping Vulnerability: Cisco SPA100 - Update Firmware
While setting up a VoIP service in their home, security researchers at Tenable Research discovered a total of 19 vulnerabilities in VoIP adapters from Cisco's SPA100 Series.
If exploited, these vulnerabilities could allow an attacker to eavesdrop on a user's conversations, initiate fraudulent phone calls and even pivot further into their internal network.
Tenable Research informed Cisco PSIRT of the 19 vulnerabilities they discovered across seven Cisco security advisories and the networking giant has since addressed these flaws with a new 1.4.1 SR5 firmware release for their SPA 100 series devices.
...if you're using a Cisco SPA 100 series VoIP adapter, it is highly recommended that you update to the latest firmware before these flaws are exploited in the wild. more
If exploited, these vulnerabilities could allow an attacker to eavesdrop on a user's conversations, initiate fraudulent phone calls and even pivot further into their internal network.
Tenable Research informed Cisco PSIRT of the 19 vulnerabilities they discovered across seven Cisco security advisories and the networking giant has since addressed these flaws with a new 1.4.1 SR5 firmware release for their SPA 100 series devices.
...if you're using a Cisco SPA 100 series VoIP adapter, it is highly recommended that you update to the latest firmware before these flaws are exploited in the wild. more
Monday, November 18, 2019
Hot Wheels - Part I
A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . .
And His $9 Million WhatsApp Hacking Van
On a wildflower-lined gravel track off a quiet thoroughfare in Larnaca, Cyprus, Tal Dillian is ensconced in a blacked-out truck. It’s a converted GMC ambulance, pimped out with millions of dollars of surveillance kit, antennas on top reaching out to learn what it can from any smartphone within a 1-kilometer radius and, at the click of a button, empty them of all the content within.
WhatsApp messages, Facebook chats, texts, calls, contacts?
Everything?
“Exactly,” says Dilian, a 24-year Israeli intelligence veteran and multimillionaire spy-tech dealer, though he doesn’t look it; imagine a shabbier, more hirsute George Clooney...
He’s dialing up the charm offensive over the two days he gives Forbes unprecedented access to the normally hidden, clandestine spy-tech industry, estimated to be worth $12 billion and rising. more
And His $9 Million WhatsApp Hacking Van
On a wildflower-lined gravel track off a quiet thoroughfare in Larnaca, Cyprus, Tal Dillian is ensconced in a blacked-out truck. It’s a converted GMC ambulance, pimped out with millions of dollars of surveillance kit, antennas on top reaching out to learn what it can from any smartphone within a 1-kilometer radius and, at the click of a button, empty them of all the content within.
WhatsApp messages, Facebook chats, texts, calls, contacts?
Everything?
“Exactly,” says Dilian, a 24-year Israeli intelligence veteran and multimillionaire spy-tech dealer, though he doesn’t look it; imagine a shabbier, more hirsute George Clooney...
He’s dialing up the charm offensive over the two days he gives Forbes unprecedented access to the normally hidden, clandestine spy-tech industry, estimated to be worth $12 billion and rising. more
Hot Wheels - Part II
Cypriot police have confiscated a van reportedly loaded with
sophisticated surveillance equipment and have questioned its Israeli
owner following media reports that the vehicle was being hired out to
spy on people...
The police probe was initiated after local media highlighted an earlier Forbes report on the Israeli it identified as a former intelligence officer who showed off the $9 million van’s spying capabilities. more
The police probe was initiated after local media highlighted an earlier Forbes report on the Israeli it identified as a former intelligence officer who showed off the $9 million van’s spying capabilities. more
The Invisible Man - 122 Years in the Making
“Quantum
Stealth” (Light Bending material) non-powered adaptive camouflage which
portrays what is behind the user in-front of the user bending the light around
the target. The cost is inexpensive, very lightweight and there are no power
requirements.
It even blocks thermal imaging! more
It even blocks thermal imaging! more
Sunday, November 17, 2019
Venezuela's Ex-spy Chief Disappears on Eve of Extradition to U.S. (shocking, just shocking)
Hugo Carvajal, nicknamed "El Pollo," or "The Chicken," was the military-intelligence chief for Presidents Hugo Chavez and Nicholas Maduro, and some experts have said he could be a source of incriminating intelligence on Maduro and his regime...
In written answers to questions by The Associated Press, Carvajal said he wanted to share secret information on drug trafficking and corruption. more | sing-a-long
In written answers to questions by The Associated Press, Carvajal said he wanted to share secret information on drug trafficking and corruption. more | sing-a-long
More Pirates of The Caribbean
Russia’s underwater spy ship recently traveled across the Atlantic Ocean and is currently sailing in America’s backyard.
Yantar,
allegedly a ship meant to research the deep ocean, has an odd habit of
skulking around sunken military equipment—and undersea
telecommunications cables.
The ship has suddenly popped up in the
Caribbean, prompting military watchers to wonder what the strange ship
is up to.
Yantar is a Russian Navy
vessel, but one that lacks a single weapon. The ship was commissioned in
2015 and officially is known as a "special purpose ship" or
"oceanographic vessel." It is operated by the Russian Navy's Main
Directorate of Underwater Research, which Russian military watchers
believe controls Russia’s undersea spying efforts. more
Subscribe to:
Posts (Atom)