Thursday, August 27, 2015

Number of phones infected by Dendroid spying app remains unknown

An American student who hoped to sell enough malicious software to infect 450,000 Google Android smartphones pleaded guilty to a law meant to prevent hacking of phones and computers.

But how many phones were actually infected by Carnegie Mellon University student Morgan Culbertson's malicious creation remained a mystery after his court appearance before a federal judge in Pittsburgh, Pennsylvania. Infected phones could be remotely controlled by others and used to spy and secretly take pictures without the phone owner's knowledge, as well as to record calls, intercept text messages and otherwise steal information the owners downloaded on the devices.

Culbertson, 20, of Churchill, Pennsylvania, faces up to 10 years in prison and US$250,000 (NZ$385,000) in fines when he's sentenced December 2. But he'll likely face probation or a short prison term under sentencing guidelines that will take into account his lack of a criminal record.

Read more: http://bit.ly/1KnFlOR

Image courtesy of adamr at FreeDigitalPhotos.net

Monday, August 24, 2015

Ashley Madison: Spam, Extortion Begins



Attackers, Investigators Have Begun Using Leaked Data, Experts Warn

Organizations are being warned to beware of now-underway spam campaigns and extortion attacks that may target any of their employees who are current or former users of the pro-adultery Ashley Madison online dating site.

Meanwhile, the attackers behind the data breach of Ashley Madison - tagline: "Life is short, have an affair" - are continuing to follow through on their July threat to release details about many of the site's 37 million members, unless parent company Avid Life Media shuts down three of its sites, which it has declined to do.

Read more: http://www.bankinfosecurity.com/ashley-madison-spam-extortion-begins-a-8495

If you're concerned that your cell phone or mobile device has been compromised, consider ComSec LLC's cellular forensic services. Our service detects viruses, spyware, malware, trojans, and other malicious payloads. Just complete the form, send your payment and phone to us, and we'll quickly return your phone with an extensive report with our findings.  

Your cellphone is your constant companion -- usually no more than 6' from you. If you suspect that it's compromised, you have good reason to suspect your privacy is also compromised. We can help you regain your privacy and peace of mind. Contact us!

Image courtesy of 
Radnatt 
at FreeDigitalPhotos.net

Friday, August 21, 2015

Jared Fogle Case - Concealed Cameras Used to Record Visitors


When documents were unsealed in Federal Court in Indianapolis Wednesday, it became clear that the government’s case against former Subway pitchman Jared Fogle was rooted firmly in a parallel investigation of a man named Russell Taylor, the former director of Fogle’s foundation, and according to court documents, his partner in numerous episodes involving sexual images of young children.

“Russell Taylor gave a recorded statement to law enforcement,” the document states. “He admitted that he placed a clock radio containing a hidden camera in a child’s bedroom.” Investigators further stated that Taylor told them that in the past he had placed clocks with concealed cameras in various rooms of the house.

Read more: http://www.nbcchicago.com/news/local/Former-Jared-Foundation-Director-Rooted-in-Fogle-Investigation-322410662.html

Recording devices have been incorporated into seemingly harmless items you would expect to to see in a office or home. For instance, wall clocks, watches, pens, men's ties, buttons, water bottles, etc. are available with embedded recorders (video/audio). The devices are inexpensive and easy for the eavesdropper to use. They compromise your privacy and security, and can be particularly damaging when they are placed in private spaces such as a CEO's office, a corporate apartment, bedroom, bathroom, etc. where there is an expectation of privacy and sensitive information is shared. 

If you are concerned that your company or home are under surveillance, contact ComSec LLC. We provide eavesdropping detection services for corporations, non-profits and individuals. We help restore your privacy and peace of mind. 
Call (800) 615-0392 or click here to submit a contact form.

Image courtesy of Stockimages at FreeDigitalPhotos.net

Tuesday, August 18, 2015

Woman Finds Hidden Camera in Starbucks Bathroom in Brea: Police

 Image courtesy of F
oto76 
at FreeDigitalPhotos.net
(Los Angeles, CA) Brea police on Monday were working to identify the person who hid a small camera in a Starbucks bathroom.

The video recorder, which was about the size of a large pen, was mounted under a shelf in the restroom of the Starbucks located at 101 W. Imperial Highway, the Brea Police Department tweeted on Monday.

According to a news release from the department, a woman was using the restroom when she found the device. She removed the item and alerted police, who were initially unsure if the item was a camera. 


If you're concerned your business or residence has been compromised by illegal eavesdroppers, contact ComSec LLC for a comprehensive TSCM survey. ComSec's TSCM surveys locate hidden cameras, listening devices and other electronic eavesdropping devices. Learn more here: http://comsecllc.com/comsec-tscm-services/ or call 1-800-615-0392.

Monday, August 17, 2015

Special Investigation: Bugged, Tracked, Hacked

Image courtesy of  Pannawat at FreeDigitalPhotos.net
It’s impossible to imagine life without smartphones. Everything about our lives can now be contained in the palm of our hand. Personal details, professional contacts, banking details, photos, medical data, it’s all there, so you’d expect your smartphone to be secure. But in this special investigation Ross Coulthart discovers, we are facing the biggest threat to our privacy that the world has ever seen. The sensitive data contained on our phones is in fact open for anyone to see. 

Anyone in the know can bug or track your phone, from anywhere in the world. It’s long been the dirty little secret of international espionage, but now, organized crime, commercial spies and potential terrorists are exploiting this security loophole for their own gain. 

Watch the compelling video demonstrating the huge hole in mobile communications: http://www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking/

Saturday, August 15, 2015

NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help

Image courtesy of jannoon028 at FreeDigitalPhotos.net
The National Security Agency’s ability to capture Internet traffic on United States soil has been based on an extraordinary, decades long partnership with a single company: AT&T.

While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”  Read more: http://bit.ly/1J7EYCB

If you believe your mobile phone or device is compromised with spyware or malware, contact ComSec LLC. We perform cellular forensics services that identify spyware and malware on cellular devices. Learn more about the service here: http://comsecllc.com/cellular-forensic-services/

Wednesday, August 12, 2015

CORPORATE ESPIONAGE & THE INSIDER THREAT



Effective Risk Management Requires More Than A Strong Cybersecurity Program
With a global cost of $445 billion annually, cybercrime and espionage[1] are a significant risk to an organization’s bottom line. US businesses seeking to effectively manage their risks cannot overlook the threat they pose or their potential financial implications. According to a recent study by Allianz, cybercrime, IT failures, espionage and data breaches are ranked the third most important US business risk[2], preceded in importance only by business interruptions/supply chain risks (ranked 1st) and natural catastrophes (ranked 2nd). Regardless if the threat is foreign or domestic, perpetrated by a company insider or an outsider, a single event can result in damage to brand reputation, lead to an erosion of customer confidence and/or financially devastate the affected company. In today’s digital world, a comprehensive cybersecurity program is a necessity, but relying solely on cybersecurity to address cybercrime and corporate espionage risks simply is not sufficient. J.D. LeaSure, President/CEO of ComSec LLC and a counterespionage expert, provides valuable insight into protecting corporate information from insider threats that corporate cybersecurity programs do not address.