Thursday, August 27, 2015

Number of phones infected by Dendroid spying app remains unknown

An American student who hoped to sell enough malicious software to infect 450,000 Google Android smartphones pleaded guilty to a law meant to prevent hacking of phones and computers.

But how many phones were actually infected by Carnegie Mellon University student Morgan Culbertson's malicious creation remained a mystery after his court appearance before a federal judge in Pittsburgh, Pennsylvania. Infected phones could be remotely controlled by others and used to spy and secretly take pictures without the phone owner's knowledge, as well as to record calls, intercept text messages and otherwise steal information the owners downloaded on the devices.

Culbertson, 20, of Churchill, Pennsylvania, faces up to 10 years in prison and US$250,000 (NZ$385,000) in fines when he's sentenced December 2. But he'll likely face probation or a short prison term under sentencing guidelines that will take into account his lack of a criminal record.

Read more: http://bit.ly/1KnFlOR

Image courtesy of adamr at FreeDigitalPhotos.net

Monday, August 24, 2015

Ashley Madison: Spam, Extortion Begins



Attackers, Investigators Have Begun Using Leaked Data, Experts Warn

Organizations are being warned to beware of now-underway spam campaigns and extortion attacks that may target any of their employees who are current or former users of the pro-adultery Ashley Madison online dating site.

Meanwhile, the attackers behind the data breach of Ashley Madison - tagline: "Life is short, have an affair" - are continuing to follow through on their July threat to release details about many of the site's 37 million members, unless parent company Avid Life Media shuts down three of its sites, which it has declined to do.

Read more: http://www.bankinfosecurity.com/ashley-madison-spam-extortion-begins-a-8495

If you're concerned that your cell phone or mobile device has been compromised, consider ComSec LLC's cellular forensic services. Our service detects viruses, spyware, malware, trojans, and other malicious payloads. Just complete the form, send your payment and phone to us, and we'll quickly return your phone with an extensive report with our findings.  

Your cellphone is your constant companion -- usually no more than 6' from you. If you suspect that it's compromised, you have good reason to suspect your privacy is also compromised. We can help you regain your privacy and peace of mind. Contact us!

Image courtesy of 
Radnatt 
at FreeDigitalPhotos.net

Friday, August 21, 2015

Jared Fogle Case - Concealed Cameras Used to Record Visitors


When documents were unsealed in Federal Court in Indianapolis Wednesday, it became clear that the government’s case against former Subway pitchman Jared Fogle was rooted firmly in a parallel investigation of a man named Russell Taylor, the former director of Fogle’s foundation, and according to court documents, his partner in numerous episodes involving sexual images of young children.

“Russell Taylor gave a recorded statement to law enforcement,” the document states. “He admitted that he placed a clock radio containing a hidden camera in a child’s bedroom.” Investigators further stated that Taylor told them that in the past he had placed clocks with concealed cameras in various rooms of the house.

Read more: http://www.nbcchicago.com/news/local/Former-Jared-Foundation-Director-Rooted-in-Fogle-Investigation-322410662.html

Recording devices have been incorporated into seemingly harmless items you would expect to to see in a office or home. For instance, wall clocks, watches, pens, men's ties, buttons, water bottles, etc. are available with embedded recorders (video/audio). The devices are inexpensive and easy for the eavesdropper to use. They compromise your privacy and security, and can be particularly damaging when they are placed in private spaces such as a CEO's office, a corporate apartment, bedroom, bathroom, etc. where there is an expectation of privacy and sensitive information is shared. 

If you are concerned that your company or home are under surveillance, contact ComSec LLC. We provide eavesdropping detection services for corporations, non-profits and individuals. We help restore your privacy and peace of mind. 
Call (800) 615-0392 or click here to submit a contact form.

Image courtesy of Stockimages at FreeDigitalPhotos.net

Tuesday, August 18, 2015

Woman Finds Hidden Camera in Starbucks Bathroom in Brea: Police

 Image courtesy of F
oto76 
at FreeDigitalPhotos.net
(Los Angeles, CA) Brea police on Monday were working to identify the person who hid a small camera in a Starbucks bathroom.

The video recorder, which was about the size of a large pen, was mounted under a shelf in the restroom of the Starbucks located at 101 W. Imperial Highway, the Brea Police Department tweeted on Monday.

According to a news release from the department, a woman was using the restroom when she found the device. She removed the item and alerted police, who were initially unsure if the item was a camera. 


If you're concerned your business or residence has been compromised by illegal eavesdroppers, contact ComSec LLC for a comprehensive TSCM survey. ComSec's TSCM surveys locate hidden cameras, listening devices and other electronic eavesdropping devices. Learn more here: http://comsecllc.com/comsec-tscm-services/ or call 1-800-615-0392.

Monday, August 17, 2015

Special Investigation: Bugged, Tracked, Hacked

Image courtesy of  Pannawat at FreeDigitalPhotos.net
It’s impossible to imagine life without smartphones. Everything about our lives can now be contained in the palm of our hand. Personal details, professional contacts, banking details, photos, medical data, it’s all there, so you’d expect your smartphone to be secure. But in this special investigation Ross Coulthart discovers, we are facing the biggest threat to our privacy that the world has ever seen. The sensitive data contained on our phones is in fact open for anyone to see. 

Anyone in the know can bug or track your phone, from anywhere in the world. It’s long been the dirty little secret of international espionage, but now, organized crime, commercial spies and potential terrorists are exploiting this security loophole for their own gain. 

Watch the compelling video demonstrating the huge hole in mobile communications: http://www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking/

Saturday, August 15, 2015

NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help

Image courtesy of jannoon028 at FreeDigitalPhotos.net
The National Security Agency’s ability to capture Internet traffic on United States soil has been based on an extraordinary, decades long partnership with a single company: AT&T.

While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”  Read more: http://bit.ly/1J7EYCB

If you believe your mobile phone or device is compromised with spyware or malware, contact ComSec LLC. We perform cellular forensics services that identify spyware and malware on cellular devices. Learn more about the service here: http://comsecllc.com/cellular-forensic-services/

Wednesday, August 12, 2015

CORPORATE ESPIONAGE & THE INSIDER THREAT



Effective Risk Management Requires More Than A Strong Cybersecurity Program
With a global cost of $445 billion annually, cybercrime and espionage[1] are a significant risk to an organization’s bottom line. US businesses seeking to effectively manage their risks cannot overlook the threat they pose or their potential financial implications. According to a recent study by Allianz, cybercrime, IT failures, espionage and data breaches are ranked the third most important US business risk[2], preceded in importance only by business interruptions/supply chain risks (ranked 1st) and natural catastrophes (ranked 2nd). Regardless if the threat is foreign or domestic, perpetrated by a company insider or an outsider, a single event can result in damage to brand reputation, lead to an erosion of customer confidence and/or financially devastate the affected company. In today’s digital world, a comprehensive cybersecurity program is a necessity, but relying solely on cybersecurity to address cybercrime and corporate espionage risks simply is not sufficient. J.D. LeaSure, President/CEO of ComSec LLC and a counterespionage expert, provides valuable insight into protecting corporate information from insider threats that corporate cybersecurity programs do not address.

Tuesday, August 11, 2015

Spies Still Use Hidden Cameras & Conventional Electronic Eavesdropping Devices

Image courtesy of  Marin at FreeDigitalPhotos.net
We live in digital world, and with that shift to technology comes the unfortunate consequence of the invasion of our privacy. On a daily basis, we hear of data breaches, mobile phone hacking, phishing scams and ATM skimmers. Many of us have been impacted by exposure of our personal protected information (PII). 

With all the attention focused on cybersecurity and cybercrime, we can lose sight of the more conventional means of privacy invasion that are no less a threat. Yes, spies still use hidden cams, electronic eavesdropping devices, GPS trackers and other methods that are not "cyber" related. 

Just this morning, three hidden camera related incidents were reported in the news:
Any invasion of privacy impacts the victim. The feelings of vulnerability are quickly replaced by the need to restore privacy. How do you know if you are a victim of illegal eavesdropping? If you can answer any of these questions with a YES, then you may be bugged: http://comsecllc.com/am-i-bugged/  

Victims can sometimes dismiss the suspicions as paranoia, when in fact they may be very real. If you suspect you are bugged, and would like your privacy restored, contact ComSec LLC. We offer corporate and residential bug sweeps.



About the Author:
J.D. LeaSure (CCISM) is the President/CEO of ComSec LLC, a global provider of world-class counterespionage and TSCM / Cyber TSCM services.  Learn more at http://www.ComSecLLC.com

Monday, August 10, 2015

Corporate Espionage & Spying Aren't Glamorous! They're Illegal.

Image courtesy of Idea go at FreeDigitalPhotos.net
Spy gadgets are plentiful, and they're inexpensive. Perform a search on eBay for "spy bugs", and it will likely shock you. Even the most inexpensive eavesdropping devices can be used by a novice to steal your valuable information. 

We've provided the link and information about the "10 Gadgets That Will Make You Feel Like a Spy" below as a means of helping you to be informed about the threats. The manufacturers of spying tools often glorify the act of spying. But, spying is illegal and it can devastate the lives of the victims. It's not glamorous!

If you suspect your home or corporation is the target of an illegal eavesdropper, visit our page: http://comsecllc.com/am-i-bugged/ to get valuable insight into the likelihood that you are bugged. If you are bugged, we can help you regain your privacy and peace of mind! Contact us: http://comsecllc.com/contact-comsec/

_________________________________________________________________________
10 Gadgets That Will Make You Feel Like a Spy

From James Bond to Austin Powers, there’s one thing that all movie spies have in common: Gadgets. And while some of the spy gadgets seen in movies seem patently ridiculous – like the wristwatch circular saw that Bond uses in 1973’s Live and Let Die — others seem more useful, like the “sticky” gloves that Ethan Hunt uses to scale the side of a skyscraper in 2011’s Mission Impossible – Ghost Protocol. Well, before you get your hopes up, we should probably warn you that neither of those products actually exists (as far as we know anyway). And while you will probably never get your hands on the crazy gadgets that you have seen in various spy movies, there are still many impressive gadgets available that will make you feel like a real secret agent. Here are 10 gadgets that will help you unlock your inner spy. 

Thursday, August 6, 2015

Hacker's RollJam device can steal your car keys, open your garage


Your remote car key isn’t a key. It's billions of them.

It doesn’t have just one secret code to your car. That’d be too easy for someone to electronically intercept, copy and use.

Instead, your car key uses what’s known as “rolling code.” Every time you press the button, a new, randomly generated code is sent over a radio frequency to your car, which has a synchronized code generator that recognizes it and then burns it so it can never be used again. The key and the car then create new codes for the next time around, and the process repeats. Read more: http://www.foxnews.com/leisure/2015/08/06/haker-rolljam-device-can-steal-your-car-keys-open-your-garage/?intcmp=hpbt1

Image courtesy of digidreamgrafix at FreeDigitalPhotos.net

Only 11% of People Worry about Keeping Work Files Safe on Mobile Devices

Image courtesy of nokhoog_buchachon at FreeDigitalPhotos.net
If you're concerned employee issued mobile devices are exposing your valuable corporate information, contact us. We provide malware and spyware detection services for cell phones and other mobile devices. Learn more: http://comsecllc.com/cellular-forensic-services/

According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only one in 10 is seriously concerned about keeping work information safe should cybercriminals gain access to their device.

One way or another, many employees of large and medium-sized companies use personal mobile devices for work. 36% of respondents store work files on them, and 34% keep work-related email messages. Sometimes, more confidential information can also be found on users' devices, such as passwords to corporate email accounts (18%), networks or VPNs (11%). Such information represents a valuable prize for cybercriminals hunting for corporate secrets.

Read more: http://www.prnewswire.com/news-releases/personal-devices-and-corporate-secrets-only-11-of-people-worry-about-keeping-work-files-safe-on-mobile-devices-kaspersky-lab-survey-shows-520635162.html

Tuesday, August 4, 2015

FDA: Discontinue Use of Flawed Infusion Pumps

Agency Cites Cybersecurity Concerns in its Warning
For the first time, the Food and Drug Administration has issued a warning urging healthcare organizations to discontinue the use of a family of medical devices due to cybersecurity issues and transition to other products.

In a July 31 safety communication, the FDA says healthcare providers using the Hospira Symbiq Infusion System, Version 3.13 or older, are "strongly encouraged" to transition to alternative infusion systems and discontinue use of these pumps due to cybersecurity vulnerabilities.

"Hospira and an independent researcher confirmed that Hospira's Symbiq Infusion System could be accessed remotely through a hospital's network," the FDA notes in its statement.
Read more: http://www.healthcareinfosecurity.com/fda-discontinue-use-flawed-infusion-pumps-a-8449

Image courtesy of koratmember at FreeDigitalPhotos.net

Smartphone battery could be spying on you

Phone batteries are sending out information that could be used to identify their owners and track them around the internet, even if they have taken very careful privacy precautions, according to a paper by security researchers, says The Independent.
A piece of software in HTML5 — the technology used to let people read sites on the web — tells websites how much battery is left in a users’ phone, and is intended to allow websites to help preserve battery if phones are running low. But that same information can be used to identify phones as they move around the internet, allowing people to be tracked.

Websites and the scripts that run on them don’t have to ask users’ permission to see how much charge is left, so phones will respond to the request to say how much charge they have and how long it will take them to power back up. That information can then be used as a way of identifying the phones themselves, without their users ever knowing.

Read more: http://en.prothom-alo.com/science-technology/news/74315/Smartphone-battery-could-be-spying-on-you


Image courtesy of Ohmega1982 at FreeDigitalPhotos.net
_______________________________________________________________________

Concerned your cellphone may be infected with malware or spyware? ComSec LLC offers cellular forensics services that identify malware and spyware on mobile devices. Learn more here: http://comsecllc.com/cellular-forensic-services/

Monday, August 3, 2015

Secret NSA Map Shows China Cyber Attacks on U.S. Targets

A secret NSA map obtained exclusively by NBC News shows the Chinese government's massive cyber assault on all sectors of the U.S economy, including major firms like Google and Lockheed Martin, as well as the U.S. government and military.

The map uses red dots to mark more than 600 corporate, private or government "Victims of Chinese Cyber Espionage" that were attacked over a five-year period, with clusters in America's industrial centers. The entire Northeast Corridor from Washington to Boston is blanketed in red, as is California's Silicon Valley, with other concentrations in Dallas, Miami, Chicago, Seattle, L.A. and Detroit. The highest number of attacks was in California, which had almost 50.

Read more: http://www.nbcnews.com/news/us-news/exclusive-secret-nsa-map-shows-china-cyber-attacks-us-targets-n401211

Image courtesy of ddpavumba at FreeDigitalPhotos.net