Tuesday, October 6, 2015

Hacking Wireless Printers With Phones on Drones

ComSec LLC can detect IMSI catchers / WiFi threats. Read a case study here: https://comsecllc.com/comsec-imsi-catcher-case-study/ Contact us if you're concerned about WiFi threats and need service > 1-800-615-0392.

YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents.

But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage.

Monday, October 5, 2015

Man pleads guilty to corporate espionage, awaits sentencing

Image courtesy of Idea go at FreeDigitalPhotos.net
Nation state sponsored corporate and economic espionage is a real threat to US technology companies operating in the US and abroad. There are certain industries and technologies that are more likely targets of nation state sponsored attacks. If your company suspects you are the target of corporate or economic espionage, call ComSec LLC. Our expert TSCM/Cyber TSCM pros are trained, equipped and effective. We'll help you detect electronic eavesdropping threats and provide valuable information to help protect your corporate information: https://comsecllc.com/ 

Man pleads guilty to corporate espionage, awaits sentencing

CHARLOTTE, N.C. (AP) - A researcher has pleaded guilty to charges that he stole trade secrets from his government and civilian employers, but his attorneys are hoping to limit the time he serves in prison.

The Charlotte Observer reports (http://bit.ly/1M6Hzi5) Xiwen Huang pleaded guilty Friday to one count of stealing trade secrets. Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a Charlotte company.

Read more: http://www.washingtontimes.com/news/2015/oct/2/man-pleads-guilty-to-corporate-espionage-awaits-se/

Monday, September 28, 2015

“Sick, twisted individual:” Landt to spend 12 years in prison for setting up hidden cameras

If you suspect an employee, other insider or an outsider has your business under electronic surveillance, contact ComSec LLC. Our TSCM experts detect eavesdropping devices that can be used to erode your privacy, damage your reputation and steal valuable corporate secrets. Contact us today to discuss your concerns and schedule service, or call us at 1-800-615-0392.

KENOSHA COUNTY -- An Illinois man will spend twelve years in a Wisconsin prison for conspiring to set up hidden cameras in women's locker rooms at Uline and the RecPlex in Pleasant Prairie. Karl Landt was sentenced on Friday, September 18th.

There was anger and there were tears as one victim after another talked of the impact Karl Landt's four-year, hidden camera project has had on them. And not once did he look them in the eye.

"This is once in a lifetime, historic case," said Michael Gravely, prosecutor.

Landt spent four years compiling more than 20,000 hours of pornographic videos to satisfy his sexual fetishes. Many of those videos were recorded by his girlfriend, at his direction, inside women's locker rooms.

"What kind of sick, twisted individual do you have to be to do this to your coworkers?" said one of Landt's victims. Read more: http://fox6now.com/2015/09/18/developing-landt-to-be-sentenced-for-setting-up-hidden-cameras-inside-womens-locker-rooms/

Image courtesy of Sira Anamwong at FreeDigitalPhotos.net

Friday, September 25, 2015

China Is Stealing American Property

Image courtesy of KEKO64 at FreeDigitalPhotos.net
If you suspect your company is the target of corporate espionage, contact ComSec LLC. We offer counterespionage services in the US and globally. Learn more here: http://www.comsecllc.com/

On Friday, communist China’s president Xi Jinping will make a state visit to Washington. Presidential candidates, government agencies and special interest groups are clamoring to have their pet issues added to the discussion agenda. Which ones should President Obama choose?

The 2013 report of the prestigious bipartisan Commission on the Theft of American Intellectual Property certainly indicates that Chinese cyber-theft should top the list. It states, “The scale of international theft of American intellectual property (IP) is unprecedented — hundreds of billions of dollars per year, on the order of the size of U.S. exports to Asia,” and concludes, “China is the world’s largest source of IP theft.” The FBI agrees.

At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53 percent increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95 percent of those cases involved individuals associated with the Chinese government.

Read more: http://dailycaller.com/2015/09/24/china-is-stealing-american-property/#ixzz3mlQHOzHF

Wednesday, September 23, 2015

Loco-motive for rail worker accused of corporate espionage

Two major Canadian rail companies are set to battle out an espionage claim in court after a worker defected from one organization to the other – allegedly taking confidential and incredibly valuable information with him.

Canadian National Railway Co. claims former employee Greg Shnerer downloaded pricing information, customer contracts and the corporate business plan – only to quit days later, absconding to industry rival Canadian Pacific Railway Ltd.

Read more: http://www.hrmonline.ca/hr-news/locomotive-for-rail-worker-accused-of-corporate-espionage-196778.aspx

Image courtesy of adamr at FreeDigitalPhotos.net

If you are concerned your company is the target of corporate espionage, call ComSec LLC at 1-800-615-0392. ComSec provides electronic eavesdropping detection services in the US and globally for corporation and executive residences. Visit our web site to learn more: https://comsecllc.com/corporate-tscm-services/

Monday, September 21, 2015

39 iOS Apps Infected, Including WeChat, Affecting Hundreds of Millions of Users

Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users

Yesterday we posted an analysis report on a novel malware XcodeGhost that modifies Xcode IDE to infect Apple iOS apps. In the report, we mentioned that at least two popular iOS apps were infected. We now believe many more popular iOS apps have been infected, including WeChat, one of the most popular IM applications in the world.

After we posted the report, some security companies like Qihoo 360 scanned popular apps in App Store by code analysis; and some iOS developers analyzed some more apps using crowd-sourcing techniques. Several Internet companies such as Tencent, NetEase, and Jianshu, have made statements on their respective affected products. Read more: http://bit.ly/1LEKFtf

If you are concerned your smartphone or mobile device is infected with viruses, spyware, Trojans, malware and other malicious payloads, contact ComSec for Cellular Forensics Services: https://comsecllc.com/cellular-forensic-services/

Image courtesy of  KROMKRATHOG at FreeDigitalPhotos.net

Tuesday, September 15, 2015

Cisco router break-ins bypass cyber defenses

Image courtesy of watcharakun at FreeDigitalPhotos.net
Security researchers say they have uncovered clandestine attacks across three continents on the routers that direct traffic around the Internet, potentially allowing suspected cyberspies to harvest vast amounts of data while going undetected.

In the attacks, a highly sophisticated form of malicious software, dubbed SYNful Knock, has been implanted in routers made by Cisco (CSCO.O), the world's top supplier, U.S. security research firm FireEye (FEYE.O) said on Tuesday.

Routers are attractive to hackers because they operate outside the perimeter of firewalls, anti-virus, behavioral detection software and other security tools that organizations use to safeguard data traffic. Until now, they were considered vulnerable to sustained denial-of-service attacks using barrages of millions of packets of data, but not outright takeover.

Read more: http://www.reuters.com/article/2015/09/15/us-cybersecurity-routers-cisco-systems-idUSKCN0RF0N420150915

Concerned your router may be compromised? ComSec's cyber TSCM service includes an inspection of your Wi-Fi and wireless Internet of Things. We can detect issues with your WiFi security that your cybersecurity program cannot detect. Learn more about our cyber TSCM services, or call us at 1-800-615-0392.