Friday, October 30, 2015

The NFL Swept The Patriots’ Opposing Locker Room For Bugs

Image courtesy of 
Sira Anamwong 
at FreeDigitalPhotos.net

There’s A Crazy Theory As To Why

Hey, did you know that the Patriots have been accused of cheating once or twice in the past? Well, they have! And it appears that some people around the NFL are not forgetting that anytime soon.

According to the latest reports, the NFL conducted a sweep of the opponent’s locker room prior to the Patriots’ October 25 contest against the New York Jets at Gillette Stadium. Those reports indicate that the primary focus of the search was to find bugs discreetly planted for the purpose of eavesdropping.

The Patriots have never been caught using listening devices in the opposing locker room, but rumors of such have emerged in the past, most recently in Sports Illustrated‘s examination of the Pats’ history of breaking and bending the rules.

Read more: http://uproxx.com/sports/2015/10/nfl-swept-patriots-opposing-locker-room-for-bugs-new-york-jets/

Electronic eavesdropping happens more often than you might think. Why? It's easier and less expensive than ever. Advances in audio and video surveillance make it easy to hide the devices, and to remotely access the captured information. Many of the devices on the market do not require the eavesdropper to return to the scene of the crime to retrieve the device. The cost and risk are reduced, and the potential reward becomes much more attractive. If you are concerned you are under surveillance, contact ComSec for a bug sweep. Our experts are standing by to help you regain your privacy and peace of mind. 

Wednesday, October 28, 2015

Here’s how the IRS can spy on you

Image courtesy of  adamr at FreeDigitalPhotos.net
IRS just became the 13th federal agency known to use this technology.

The Internal Revenue Service has become the thirteenth federal agency known to own Stingray surveillance equipment, the Guardian reports.

Stingray devices are IMSI-catchers, otherwise known as “cell-site stimulators.” Disguised as cellphone towers, they can retrieve metadata and content from cellphones in the area. Nate Wessler, a staff attorney at the American Civil Liberties Union, says: “If the IRS is using it, it shows just how far these devices have spread.”

Invoices show the IRS made payments in 2009 and 2012 to the Harris Corporation, one of the companies that produce the equipment. The 2012 document shows the agency had upgraded its Stingray II to HailStorm, a more advanced version, and spent $6,000 on training.

Read more: http://fortune.com/2015/10/26/irs-spying-devices/


Did you know that IMSI catchers are not only used by government agencies? That's right. The technology is commercially available. And, it has been used to capture corporate and private information. Learn more about it here: https://comsecllc.com/comsec-imsi-catcher-case-study/

Monday, October 26, 2015

A New Material Promises NSA-Proof Wallpaper

Image courtesy of  twobee at FreeDigitalPhotos.net

A Utah company has a new nickel-carbon material that could help the Pentagon fight off some of its most haunting threats.


Your next tinfoil hat won’t be made of tinfoil. A small company called Conductive Composites out of Utah has developed a flexible material — thin and tough enough for wallpaper or woven fabric — that can keep electronic emissions in and electromagnetic pulses out. 


Concerned corporate intellectual property is the target or industrial or economic espionage? ComSec offers eavesdropping detection services to corporations and executives. In economically challenging times, nation state and domestic industrial espionage typically increases. We help you detect electronic espionage, and help you stop leaking valuable corporate information. Visit out web site to learn more about our services.

Wednesday, October 21, 2015

NASA Supervisors Charged in Chinese Spy Case

Image courtesy of stockimages at FreeDigitalPhotos.net
Two NASA supervisors were criminally indicted Tuesday under U.S. espionage laws for “willfully violating” national security regulations while allowing a visiting Chinese foreign national to gain “complete and unrestricted access” to the space agency’s Langley Research Center, according to the U.S. Attorneys office for the Eastern District of Virginia.

The indictments of NASA Langley supervisors Glenn A. Woodell and Daniel J. Jobson cap a federal investigation into the two supervisor’s decision to permit Bo Jiang unrestricted access for two years at Langley. Bo Jiang was deported back to China in 2013.

Assistant U.S. Attorney Lisa McKeel filed the indictments against the two NASA supervisors before the U.S. District Court in Newport News, Virginia on October 20. The Daily Caller News Foundation obtained the indictments. Woodell and Jobson’s case will come before a yet-to-be named U.S. District Judge in the next few weeks, according to the U.S. Attorneys office.

Read more: http://dailycaller.com/2015/10/21/nasa-supervisors-charged-in-chinese-spy-case/#ixzz3pEANTib9

Monday, October 19, 2015

Victim of state spying? Facebook will tell you

Image courtesy of 
KROMKRATHOG
 at FreeDigitalPhotos.net

The social network will now explicitly warn users it fears are being targeted by state-sponsored hackers


Facebook will explicitly notify users it believes have been targeted by an attacker suspected of working on behalf of a nation state, the company has announced.

Users whose accounts are targeted or compromised by state-sponsored hackers will now receive a notification upon login, warning them that “we believe your Facebook account and your other online accounts may be the target of attacks from state-sponsored actors”.

The user is then prompted to turn on Facebook’s “login approvals”, a form of two-factor authorisation which texts a login code to the user when they (or anyone else) tries to access the app using their phone.

Read more: http://www.theguardian.com/technology/2015/oct/19/facebook-warn-users-state-spying-hackers 

Friday, October 16, 2015

Researchers figure out how to silently hack Siri and Google voice search

Image courtesy blackzheep of at FreeDigitalPhotos.net
Most smartphones can respond to your voice commands, but they might also respond to someone else’s. Researchers from France’s ANSSI information security agency has found a way to make Apple’s Siri and Google voice search respond to commands without talking to them. It happens via radio waves and works up to 16 feet away. This technique can be used to exploit the device in a number of ways.

This clever hack relies upon the headphone jack, which has a microphone input on virtually all modern smartphones. The main limitation of the method developed by ANSSI is that the target device needs to have headphones with a mic plugged into the device. That’s because the electromagnetic waves must use the cord as an antenna to access the mic input. The electrical signals can be made to look like a user’s voice, thus activating Siri or Google.

Read more: http://www.extremetech.com/mobile/216290-researchers-figure-out-how-to-silently-hack-siri-and-google-voice-search 

Wednesday, October 14, 2015

FBI tips for IoT safety: National Cyber Security Awareness Month

Image courtesy of nenetus at FreeDigitalPhotos.net
There are more than three billion Internet users across the globe, and in the United States alone, there are over 200 million users who are connected. These staggering stats on connectivity are on the rise, thanks to the Internet of Things (IoT) movement, making more and more everyday objects capable of communicating data to other machines, apps and services.

But there are also downsides to connectivity, especially as things like light bulbs, doorknobs and security systems are controllable via mobile apps and tap into home networks. The increase in internet-connected devices grants more access to personal data and home networks, where hackers can spread malware, steal credit card information and remotely control the devices upon which we rely. As October is National Cyber Security Awareness Month, the FBI is sharing some safety tips to consumers, and highlighting security issues we should all keep in mind. 

Read more: http://siliconangle.com/blog/2015/10/14/fbi-tips-for-iot-safety-national-cyber-security-awareness-month/

Concerned your home data network is compromised by IoT devices? ComSec LLC offers comprehensive cyber TSCM services. Our services detect your vulnerabilities. Call us today to schedule service: https://comsecllc.com/cyber-tscm/

Friday, October 9, 2015

Image courtesy of chanpipat at FreeDigitalPhotos.net

Webcam hacker used Blackshades malware to spy on his victims

A hacker from Leed has been found guilty of spying on unsuspecting victims for between five and 12 hours each day, seeing everything they did in front of their computer.. The hacker whose name is Stefan Rigo, has been found guilty of voyeurism offenses after he used Blackshades malware to spy on unsuspecting victims via webcam.

According to BBC News, Rigo pleaded guilty back into July to one count of voyeurism and one count of another computer-related offense. The documents filed in the court reveal that Rigo used his ex-girlfriend’s credit card to purchase Blackshades malware, a well known remote access trojan (RAT) that surreptitiously infects users’ computers

Read more: http://www.techworm.net/2015/10/webcam-voyeur-spent-12-hours-a-day-spying-on-unsuspecting-victims.html

Concerned your mobile device is compromised? You need ComSec's cellular forensics service. Learn more: https://comsecllc.com/cellular-forensic-services/  

Tuesday, October 6, 2015

Hacking Wireless Printers With Phones on Drones

ComSec LLC can detect IMSI catchers / WiFi threats. Read a case study here: https://comsecllc.com/comsec-imsi-catcher-case-study/ Contact us if you're concerned about WiFi threats and need service > 1-800-615-0392.

YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents.

But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage.

Monday, October 5, 2015

Man pleads guilty to corporate espionage, awaits sentencing

Image courtesy of Idea go at FreeDigitalPhotos.net
Nation state sponsored corporate and economic espionage is a real threat to US technology companies operating in the US and abroad. There are certain industries and technologies that are more likely targets of nation state sponsored attacks. If your company suspects you are the target of corporate or economic espionage, call ComSec LLC. Our expert TSCM/Cyber TSCM pros are trained, equipped and effective. We'll help you detect electronic eavesdropping threats and provide valuable information to help protect your corporate information: https://comsecllc.com/ 


Man pleads guilty to corporate espionage, awaits sentencing

CHARLOTTE, N.C. (AP) - A researcher has pleaded guilty to charges that he stole trade secrets from his government and civilian employers, but his attorneys are hoping to limit the time he serves in prison.

The Charlotte Observer reports (http://bit.ly/1M6Hzi5) Xiwen Huang pleaded guilty Friday to one count of stealing trade secrets. Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a Charlotte company.

Read more: http://www.washingtontimes.com/news/2015/oct/2/man-pleads-guilty-to-corporate-espionage-awaits-se/