Thank you, everyone! ~Kevin
Tuesday, October 20, 2020
The Most Underrated Threat to Corporate Information Security
Sharp spike in internet sales of USB spy cables has corporate security and IT directors concerned. Murray Associates researched and developed a solution.
• Malicious USB cables look exactly like the real thing.
• Some act as eavesdropping bugs.
• Some have GPS tracking capability.
• The worst ones… more pdf
Cautionary Tale: What's Worse Than Being Caught on an Open Microphone?
Being caught on an open camera...
"I believed I was not visible on Zoom," he told Vice. "I thought no-one on the Zoom call could see me. I thought I had muted the Zoom video."
Jeffrey Toobin, 60, also a prominent CNN commentator, has been in demand as the US election campaign intensifies.
The incident, first reported by Vice News, happened during an election simulation involving the New Yorker and WNYC radio last week.
Mr Toobin, in a statement to Vice, said: "I made an embarrassingly stupid mistake, believing I was off-camera." more
Spybuster Tip #840:
• Always assume the mic and camera are live, and act appropriately.
Spybuster Tip #841:
• Know how to use your tech.
Friday, October 16, 2020
Consumer Reports - All the tools You Need for Online Safety
Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you:
- Safely backup files
- Browse online without tracking
- Avoid phishing scams
- Prevent identity theft
CR Security Planner is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.
Consumer Reports is an independent, nonprofit member organization
that works with consumers to create more fairness, safety, and
transparency in the marketplace. We don’t run third-party ads, and no
company will ever exercise influence over our recommendations of
products or services.
Even North Korea has Industrial Espionage Problems
North Korean man investigated for industrial espionage...
A North Korean man in his 40s is reportedly under investigation by the Ministry of State Security for turning over internal analyses from his workplace to a Chinese trader, Daily NK has learned.
The internal analyses the man gave to the trader reportedly concerned technology used to develop North Korean-style cosmetics. There is speculation that he will be sent to a political prison camp for espionage. more

Covid 19 Affects MI5's Spies Street Surveillance Tactics
Near-empty streets caused by fewer people traveling into city centers can make it difficult for Britain's spies to track suspects, the new head of MI5, the UK's domestic security service, has said.
Facebook "Bug" Bugged iPhone Camera - Bugged Instagram'er Sues
Facebook has got itself in trouble again as the California-based tech giant has been allegedly sued for spying on Instagram users using the camera on the phone, Bloomberg reported.
According to the lawsuit, which has come following reports from July, the photo-sharing application had been accessing the camera on the iPhone to spy on users even when they weren’t activated.
Facebook has denied the claim and blamed a bug saying that it’s correcting the problem. more
Woman Allegedly Hacked Ex’s Alexa to Scare off New Girlfriend
Double Feature!
An IoT Cautionary Tale...
A Crazy Ex Tale...
A jilted London woman allegedly hacked into her ex-boyfriend’s Amazon Alexa device and used it to scare off his new girlfriend, a report said.
Philippa Copleston-Warren, 45, was accused in a London court of using the virtual assistant to flash the lights inside her former boyfriend’s house on and off and tell his new sweetie to scram after he ended their relationship of two years, The Sun reported.
“The defendant spoke through the Alexa account to tell the complainant’s friend in the property to leave and to take her stuff,” prosecutor Misba Majid told Westminster Magistrates’ Court, according to the newspaper.
“This so distressed the girlfriend, it caused her to cry and she left.”
Copleston-Warren (inset), a management consultant, controlled the device from London, about 130 miles from her businessman ex-beau’s house in Lincolnshire, the paper reported.
She is also accused of hacking her ex’s Facebook account and uploading nude pictures of him. more
Spybuster Tip # 721: Learn how to adjust ALL the features of your digital assistant. This could have been prevented.
In Other News... Japan to Release Radioactive Water Into Sea
Japan is to release treated radioactive water from the destroyed Fukushima nuclear plant into the sea, media reports say.
It follows years of debate over how to dispose of the liquid, which includes water used to cool the power station hit by a massive tsunami in 2011.
Environmental and fishing groups oppose the idea but many scientists say the risk it would pose is low. more
What could possibly go wrong?
Enjoy the weekend, with a good flick.
Monday, October 12, 2020
New Malware Toolset Used for Industrial Espionage
Malware authors are using an advanced toolset for industrial espionage, warned researchers at cybersecurity firm Kaspersky.
...the tool uses “a variety of techniques to evade detection, including hosting its communications with the control server on public cloud services and hiding the main malicious module using steganography.”
...files are disguised to trick employers into downloading them. They contain names related to employees’ contact lists, technical documentation, and medical analysis results to trick employees as part of a common spear-phishing technique...
MontysThree is designed to specifically target Microsoft and Adobe Acrobat documents, Kaspersky said. The malware can enable attackers to capture screenshots and gather information about the victim’s network settings, hostname, etc. more
Espionage Alert: Children's Smartwatch is a Trojan Horse
The X4 smartwatch is marketed by Xplora, a Norway-based seller of children’s watches...
The backdoor is activated by sending an encrypted text message. Harrison Sand, a researcher at Norwegian security company Mnemonic, said that commands exist for surreptitiously reporting the watch’s real-time location, taking a snapshot and sending it to an Xplora server, and making a phone call that transmits all sounds within earshot.
Sand also found that 19 of the apps that come pre-installed on the watch are developed by Qihoo 360, a security company and app maker located in China. more (q.v. our 2017 post & etc.)
Sunday, October 11, 2020
Bugged Turtle Eggs – Good Surveillance Tech
The Wire Inspired a Fake Turtle Egg That Spies on Poachers
Scientists 3D-printed sea turtle eggs and stuffed transmitters inside. When poachers pulled them out of nests, the devices tracked their every move.
In the HBO series The Wire, Baltimore cops Herc and Carver devise an unorthodox way to listen in on a drug dealer named Frog, right on the street: They shove a tiny, $1,250 microphone into a tennis ball, which they then place in a gutter.
Listening in from a building across the street, they watch as Frog picks up the ball and absentmindedly tosses it between his hands, sending thuds and an electric screech into Herc’s headphones. Quickly over it, Frog chucks the ball over their building. Carver rushes after it, only to watch a semi truck crush their very expensive tennis ball.
The Baltimore PD’s failure, though, may still be biologists’ gain. Drawing both from the imaginary surveillance tennis ball and a story arc from Breaking Bad, in which the Drug Enforcement Agency uses GPS to track methylamine barrels, real life researchers have developed the InvestEGGator: a fake sea turtle egg filled with a transmitter in place of an embryo, a clever new way to track where poachers are selling the real deal. moreFriday, October 9, 2020
The FBI Hotel Wi-Fi Security Checklist
The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels.
US hotels, predominantly in major cities, have begun to advertise daytime room reservations for guests seeking a quiet, distraction-free work environment. While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks.
Malicious actors can exploit inconsistent or lax hotel Wi-Fi security
and guests’ security complacency to compromise the work and personal
data of hotel guests. Following good cyber security practices can
minimize some of the risks associated with using hotel Wi-Fi for
telework. more