tag:blogger.com,1999:blog-10690097528830981842024-02-19T10:28:09.533-05:00Spy vs SpyTechnical Surveillance & Eavesdropping CountermeasuresSpy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.comBlogger1721125tag:blogger.com,1999:blog-1069009752883098184.post-83093042136855448942022-12-20T09:17:00.005-05:002022-12-20T11:19:40.498-05:00<p> </p><div class="separator" style="clear: both; text-align: center;"><span style="background-color: white; color: #333333; font-family: montserratbold; font-size: 20px; text-align: left;"><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://comsecllc.com/privacy-protection-techincal-surveillance-during-travel/" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><img border="0" data-original-height="897" data-original-width="1440" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieS1OyKYcK4iNQIzFtTXgnsGp9QXgxCicxCJVtfYnp2nlW7MjGUrirOszCSkW4DUZOC7Q44UOF-Y9p26ubcrudVygTPdRUcqsOv-SQLly_PCvNzdvhxH__e5EqQpaWI8w-1JQBY4o55I_bNrmTx0tre-RcpsH9n1yxhWS57zG8AuTT7pmWcwZOVm9ovA/s320/The%20Covert.jpg" width="320" /></a></div><br /></div></span></div><p></p><div><h3 style="background-color: white; box-sizing: inherit; color: #333333; font-family: montserratbold; font-size: 20px; font-weight: 400; line-height: 24px; margin: 40px 0px 10px; padding: 0px;">Privacy Protection: Technical Surveillance During Travel</h3></div><div><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">Privacy protection while traveling can be a challenge. Whether you are traveling for work or for pleasure, you face an elevated risk of technical surveillance in rentals. The unsettling reality is that someone who rented the space or vehicle before you may have it under technical surveillance. Or, you may be the “intentional” target of technical surveillance so a spy can get access to your valuable information.</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">We’ve all heard the horror stories about the executive whose hotel room was bugged and subsequently sensitive information was accessed by the electronic eavesdropper. Or, the vacationing couple who discover the owner of their rental property had them under audio and/or video surveillance. Or, the traveler who rented a vehicle and found a GPS tracker.</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">If your rental is under technical surveillance, the ramifications could be professionally or personally devastating. So, how can you improve privacy protection from technical surveillance when you travel?</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;"><a href="https://comsecllc.com/privacy-protection-techincal-surveillance-during-travel/" target="_blank">Read more here.</a></p></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-11089747656588655642022-11-21T10:53:00.000-05:002022-11-21T10:53:03.040-05:00<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMgW5ZjIqwmrfS6rbLkAsHgIxuf8Ty9QiujhejzWi3jwSkukLSoWy03QlMUN-O0dgTrtA-FAN8EZqlftIr8dSKlJ0CqH9I9YrMyoLAS2lP6L3zlWt7xpKHfWKrDg8mOOcEKsT-6TEde07z0c783QrBNDuTbZRh_IY0SeM8rGWHfCjAolPXoygLz6fMog/s1024/Corporate-espionage-what-it-is-1440-1024x607.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="607" data-original-width="1024" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMgW5ZjIqwmrfS6rbLkAsHgIxuf8Ty9QiujhejzWi3jwSkukLSoWy03QlMUN-O0dgTrtA-FAN8EZqlftIr8dSKlJ0CqH9I9YrMyoLAS2lP6L3zlWt7xpKHfWKrDg8mOOcEKsT-6TEde07z0c783QrBNDuTbZRh_IY0SeM8rGWHfCjAolPXoygLz6fMog/s320/Corporate-espionage-what-it-is-1440-1024x607.png" width="320" /></a></div> <span style="background-color: white; color: #333333; font-family: montserratbold; font-size: 20px; text-transform: uppercase;">CORPORATE ESPIONAGE – WHAT IT IS & HOW TO PREVENT IT</span><p></p><p><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;">Corporate espionage occurs more often than you may think. Theft of trade secrets and unfair competition are usually at play. Let’s say your business is working on a new design for an outdated product. Or, developed a more efficient, cleaner process. Or, created a disruptive technology that will cause a dynamic shift in its industry. It has the potential to make a lot of money. It will change the existing norms.</span></p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">Perhaps well established market leaders will lose market share as a result. Maybe it’s one of those products, processes or technologies that has applications in several industries. It will change how people live their lives. It will fill a gap that has long needed to be addressed. It’s a design, process or technology that leaves others green with envy. And, those who tried to create it and failed are NOT very happy for your company’s success. This is the type of breakthrough that can create the perfect storm for a corporate espionage attack.</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;"><a href="https://comsecllc.com/corporate-espionage-what-it-is-how-to-prevent-it/" target="_blank">Read more here</a>.</p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-51318497447663179712022-04-07T17:34:00.003-04:002022-04-07T17:34:39.434-04:00Incidents of Women Being Stalked with Apple AirTags...<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg75IUFkpXy6U-x2ecxjhv-QtwZBufLcpEmtFdW9l57pUG2VTsPjBBu5kwEfYvT4I5ECLGlEIEN9vWg9CP9BzP0Ig6M0Z08GZlVfSSX19uLLNw0Nm67NxiPIz1xpADf7ZiP6kwd-Fie4VfbuXpIB6Dbn-0z5PxyvTbZKUS0kEWVExOQKq1rrKYecBxp0w/s445/airtag-4pack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="370" data-original-width="445" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg75IUFkpXy6U-x2ecxjhv-QtwZBufLcpEmtFdW9l57pUG2VTsPjBBu5kwEfYvT4I5ECLGlEIEN9vWg9CP9BzP0Ig6M0Z08GZlVfSSX19uLLNw0Nm67NxiPIz1xpADf7ZiP6kwd-Fie4VfbuXpIB6Dbn-0z5PxyvTbZKUS0kEWVExOQKq1rrKYecBxp0w/s320/airtag-4pack.jpg" width="320" /></a></div><h3 style="text-align: left;">According to police records, women across the United States are being stalked using Apple’s popular AirTag tracking devices.</h3><p></p><p style="text-align: left;">Vice News reports that recently reviewed police records show that Apple’s popular AirTag tracking devices are being used to track women across the United States. Originally designed to help people track down their lost set of keys or backpacks, the small, affordable tracking discs have been used in a number of carjackings and robberies in recent months, now they’ve reportedly become popular tools to stalk women.</p><p style="margin: 0.75em 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="color: #111111; font-family: Georgia, Times New Roman, serif;"><span style="background-color: white;"><a href="https://www.breitbart.com/tech/2022/04/07/incidents-of-women-being-stalked-with-apple-airtags-are-piling-up-across-the-country/" target="_blank">Read more here.</a></span></span></p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-69512768355227897392021-11-08T11:50:00.000-05:002021-11-08T11:50:25.089-05:00NEW IOT DEVICES POSE SPYING RISK..<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJJmYgQUQ3z5Ccgz_f6e4HfOqzO4KeJ8uaSySm90aSWh5rxqwUYSra5BFveO1iybr6qd-UMdFJkmvszDGKZCvc8aR9N8-Nzplcmm4FaNasHus_yy8OUPBbbYK0tnAKNTSCT_dt28aPxSZT/s1440/IOT-Dual-Use-Spying-Devices.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="993" data-original-width="1440" height="221" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJJmYgQUQ3z5Ccgz_f6e4HfOqzO4KeJ8uaSySm90aSWh5rxqwUYSra5BFveO1iybr6qd-UMdFJkmvszDGKZCvc8aR9N8-Nzplcmm4FaNasHus_yy8OUPBbbYK0tnAKNTSCT_dt28aPxSZT/s320/IOT-Dual-Use-Spying-Devices.png" width="320" /></a></div><p></p><h3 style="background-color: white; box-sizing: inherit; color: #333333; font-family: montserratbold; font-size: 20px; line-height: 24px; margin: 40px 0px 10px; padding: 0px;">New IoT Devices Pose Spying Risk</h3><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">New IoT devices are emerging daily. The growth rate is astonishing. According to Juniper Research, the number of <a href="https://www.juniperresearch.com/press/iot-connections-to-reach-83-bn-by-2024" rel="noopener" style="box-sizing: inherit; color: #d22d27; overflow-wrap: break-word; text-decoration-line: none; transition: all 0.7s ease 0s;" target="_blank">IoT devices</a> in 2021 will reach an eye-opening 46 billion. Wow!</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;">These new IoT devices often make our lives easier. IoT devices can enhance efficiency, convenience, productivity or the overall quality of our lives. But, there is always a trade off between their life enhancing value and a potential loss of privacy. The truth is that many of the convenient IoT devices we use in our home, at work, in the car or wherever we go, also pose spying risks. This is the case with three newly introduced IoT devices.</p><p style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin: 0px 0px 30px; padding: 0px;"><a href="https://comsecllc.com/new-iot-devices-pose-spying-risk/" target="_blank"><b>Read more here</b></a>.</p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-72164555859133181132021-08-09T10:43:00.004-04:002021-08-30T16:17:27.189-04:00ECONOMIC ESPIONAGE: CHINA’S ECONOMIC WARFARE AGAINST THE UNITED STATES PART 3..<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5p3uS7WPMJn-OYyqz_YNegql6yO9WzTgtveWQk3HGFB1RixFJimZzrgNRtm6b34Jj-sFO4fSyDNVGMMuBKDkHFAZx-V5VpUmKiNIDwh_g3zq4NIAZzzx_3lMSQo2gPzFzDJ2aUyRGC3u4/s770/ECONOMIC-ESPIONAGE-Blog-Image-03-770x400.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="770" height="166" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5p3uS7WPMJn-OYyqz_YNegql6yO9WzTgtveWQk3HGFB1RixFJimZzrgNRtm6b34Jj-sFO4fSyDNVGMMuBKDkHFAZx-V5VpUmKiNIDwh_g3zq4NIAZzzx_3lMSQo2gPzFzDJ2aUyRGC3u4/s320/ECONOMIC-ESPIONAGE-Blog-Image-03-770x400.png" width="320" /></a></div><i>This is the third blog in a multi-part series that examines the economic warfare China has been, and continues, to wage against the United States. In this blog series, we examine who the adversary is, US and China trade history & immigration policy and China’s national initiatives. We will also review recently prosecuted cases of China’s Intellectual Property (IP) and trade secret theft from the US military, US defense contractors, US businesses and US universities. As well, we will examine the tactics China used/uses to perpetrate these massive thefts from the US. Our ultimate goal is to provide information that can be used by US targets of Chinese Economic Espionage exploits to better protect their valuable intellectual property and trade secrets for their benefit, and for the benefit of the US. <a href="https://www.blogger.com/#">Read Part 1</a> and <a href="https://www.blogger.com/#">Part 2</a>.</i><br /><p></p><p><span style="font-family: latoregular;"><span style="color: red; font-size: 17px;"><i><a href="https://comsecllc.com/economic-espionage-chinas-economic-warfare-against-the-united-states-part-3/" target="_blank">Read Part 3 here</a>.</i></span></span></p><p><span style="color: #666666; font-family: latoregular;"><span style="font-size: 17px;"><i><br /></i></span></span></p><div class="separator" style="clear: both; text-align: center;"><br /></div><p></p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-59897914677499908562021-07-28T10:30:00.001-04:002021-09-14T13:22:47.594-04:00Corporate Espionage By Management Creates Risks For Executives And Board Members..<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7gV_Au8oUpfnDdrJzOYc13ZrujWbK5OZQo8MFZRTFSAkyveW9pWhGH67pP3UUAULygWpG2BmGag-HwD6Dkqnq3piYTzzf8y98f1R3nQsaCifwgagjOefIQe_FBZ3IykO0Y2Bg6X4PAqAm/s300/cyber-bugging-300x187.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="187" data-original-width="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7gV_Au8oUpfnDdrJzOYc13ZrujWbK5OZQo8MFZRTFSAkyveW9pWhGH67pP3UUAULygWpG2BmGag-HwD6Dkqnq3piYTzzf8y98f1R3nQsaCifwgagjOefIQe_FBZ3IykO0Y2Bg6X4PAqAm/s0/cyber-bugging-300x187.jpg" /></a></div><p></p><p dir="ltr" id="docs-internal-guid-803167e8-7fff-53f8-41d3-b7a570f67324" style="background-color: white; font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><i><span style="color: red;">*Corporate, Industrial and Economic Espionage is a very real and evolving threat to your business and your intellectual property.</span> <a href="https://comsecllc.com" target="_blank">Contact ComSec</a>, <span style="color: red;">we can help. ~JDL</span></i></p><p dir="ltr" id="docs-internal-guid-803167e8-7fff-53f8-41d3-b7a570f67324" style="font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><span style="background-color: black;">Following the filing of a five-count criminal information against Ticketmaster, alleging conspiracy to commit computer intrusion, computer intrusion of a protected computer, computer intrusion in furtherance of fraud, wire fraud conspiracy, and wire fraud, the company has entered into a plea agreement with federal prosecutors in Brooklyn, New York to pay $10 million in fines to resolve those charges.</span></p><p dir="ltr" style="font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><span style="background-color: black;">According to an acting U.S. Attorney, Ticketmaster employees repeatedly and illegally accessed a competitor's computers without authorization, using stolen passwords to unlawfully collect business intelligence.</span></p><p dir="ltr" style="font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><span style="background-color: black;">The investigation found that an individual bad actor worked for Ticketmaster's competitor, Live Nation, in 2013 as a consultant. He was later hired full-time by Ticketmaster in 2014.</span></p><p dir="ltr" style="font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><span style="background-color: black;">The consultant/employee kept access to usernames and passwords belonging to Live Nation and, between 2013 and 2015, used them without authorization to access Live Nation's systems while working for Ticketmaster.</span></p><p dir="ltr" style="background-color: white; font-family: Calibri, Arial, sans-serif; font-size: 14px; margin-bottom: 15px; margin-top: 4px;"><a href="https://www.rmplusonline.com/article.cfm?id=13105%C2%ACice=238DB5E3-5056-8058-36E2AD39F5B61741&permit=0A0E3846-5056-8058-361E3ABE0361079E">Read More Here</a>.</p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-394310911014678552021-07-05T11:45:00.002-04:002021-07-05T11:47:32.225-04:00ECONOMIC ESPIONAGE: CHINA’S ECONOMIC WARFARE AGAINST THE UNITED STATES PART 2<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVR3WxhJHTy-xEINmUMyiXifMqrA3hzJtPoExyT0jVPHKOecu_3iSAHjd3fySgFbXWJ7t65LsgI_zbTV2Npyu0Bum2ZLrWLH-zedjwldt4Xt_Uj1PZZPZD8-htCGA8lvgcsOfqWq4YNVFR/s1536/ECONOMIC-ESPIONAGE-Blog-Image-01-1-1536x901.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="901" data-original-width="1536" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVR3WxhJHTy-xEINmUMyiXifMqrA3hzJtPoExyT0jVPHKOecu_3iSAHjd3fySgFbXWJ7t65LsgI_zbTV2Npyu0Bum2ZLrWLH-zedjwldt4Xt_Uj1PZZPZD8-htCGA8lvgcsOfqWq4YNVFR/s320/ECONOMIC-ESPIONAGE-Blog-Image-01-1-1536x901.png" width="320" /></a></div><em style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px;">This is the second blog in a multi-part series that examines the economic warfare China has been, and continues, to wage against the United States. In this blog series, we examine who the adversary is, US and China trade history & immigration policy and China’s national initiatives. We will also review recently prosecuted cases of China’s Intellectual Property (IP) and trade secret theft from the US military, US defense contractors, US businesses and US universities. </em><p></p><p><em style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px;">As well, we will examine the tactics China used/uses to perpetrate these massive thefts from the US. Our ultimate goal is to provide information that can be used by US targets of Chinese Economic Espionage exploits to better protect their valuable intellectual property and trade secrets for their benefit, and for the benefit of the US. Read <a href="https://comsecllc.com/economic-espionage-chinas-economic-warfare-against-the-united-states-part-1/" rel="noopener" style="box-sizing: inherit; color: #d22d27; overflow-wrap: break-word; text-decoration-line: none; transition: all 0.7s ease 0s;" target="_blank">Part 1</a>.</em></p><p><em style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px;"><a href="https://comsecllc.com/economic-espionage-chinas-economic-warfare-against-the-united-states-part-2/">Read part 2 here</a>.</em></p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-2996994357295052592021-05-20T13:43:00.002-04:002021-05-20T13:43:55.542-04:00ECONOMIC ESPIONAGE: CHINA’S ECONOMIC WARFARE AGAINST THE UNITED STATES PART 1<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihlIJxzip0jKyjoDtwqQcgr0xvej54Z3q7xBQ7jU0VVAntMrZlmFTxAKeTzczi48jX2J3Z0Fj_rZl-6rQqyuoJJSyowkVHMLUSazPqgdj43M7sk2ApA2GspPLvf07OOgjqnOH8Xczlkli0/s407/2021-05-18.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="305" data-original-width="407" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihlIJxzip0jKyjoDtwqQcgr0xvej54Z3q7xBQ7jU0VVAntMrZlmFTxAKeTzczi48jX2J3Z0Fj_rZl-6rQqyuoJJSyowkVHMLUSazPqgdj43M7sk2ApA2GspPLvf07OOgjqnOH8Xczlkli0/s320/2021-05-18.png" width="320" /></a></div><br /> <em style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px;">This is the first blog in a multi-part series that examines the economic warfare China has been, and continues, to wage against the United States. In this blog series, we will examine who the adversary is, historic US and China trade history & immigration policy and China’s national initiatives. We will also review recently prosecuted cases of China’s Intellectual Property (IP) and trade secret theft from the US military, US defense contractors, US businesses and US universities. As well, we will examine the tactics China used/uses to perpetrate these massive thefts from the US. Our ultimate goal is to provide information that can be used by US targets of Chinese Economic Espionage exploits to better protect their valuable intellectual property and trade secrets for their benefit, and for the benefit of the US. </em><p></p><p><span style="color: #222222; font-family: Roboto, HelveticaNeue, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;">If you have watched the news or read newspapers at almost any time during the past few decades, you have likely heard reports that the People’s Republic of China (aka PRC, aka China) has been waging economic warfare against the United States. </span></p><p><span style="color: #222222; font-family: Roboto, HelveticaNeue, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;">Webster’s dictionary defines economic warfare as “the use of, or the threat to use, economic means against a country in order to weaken its economy and thereby reduce its political and military power.” </span></p><p><span style="color: #222222; font-family: Roboto, HelveticaNeue, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;">For decades, China has been strategically stealing valuable US intellectual property, trade secrets and human talent for China’s economic, political and military benefit. They have been, and still are, targeting US government agencies, US critical infrastructure, US defense contractors, US businesses and US universities. . .</span></p><p><a class="HH2Fqe ncE9Xc tPMEbc" href="https://comsecllc.com/economic-espionage-chinas-economic-warfare-against-the-united-states-part-1/" ping="/url?sa=t&source=web&rct=j&url=https%3A%2F%2Fcomsecllc.com%2Feconomic-espionage-chinas-economic-warfare-against-the-united-states-part-1%2F&ved=0CAcQuMkCahcKEwiAwrOZ5tjwAhUAAAAAHQAAAAAQBw" style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0.1); color: #1a0dab; display: inline !important; font-family: Roboto, HelveticaNeue, Arial, sans-serif; font-size: 14px; margin: 6px 16px 6px 6px; outline: 0px; text-decoration-line: none;">Learn more</a></p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-26940208944954385782021-02-08T13:22:00.008-05:002021-02-08T13:32:26.137-05:00They Stormed the Capitol. Their Apps Tracked Them...<p> </p><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px 0px 0.9375rem; max-width: 100%; padding: 0px; text-size-adjust: 100%; vertical-align: baseline; width: 600px;"></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhznEQ3Ih_E3LLQVdNoSa36AifwZ-ZDo1g7ismybImuvPid1Dakv6zNudCnyTvGCRDe4AsgT_wJ4eox6j01OfCeYmsVrnNVSpcrPEmrzJYpsHE2QXqbjHQk4JaCva-qy2xvVeI8Ns-w4rjZ/s1966/congress-government-capitol.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1311" data-original-width="1966" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhznEQ3Ih_E3LLQVdNoSa36AifwZ-ZDo1g7ismybImuvPid1Dakv6zNudCnyTvGCRDe4AsgT_wJ4eox6j01OfCeYmsVrnNVSpcrPEmrzJYpsHE2QXqbjHQk4JaCva-qy2xvVeI8Ns-w4rjZ/s320/congress-government-capitol.jpeg" width="320" /></a></div><br />In 2019, a source came to us with a digital file</span><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;"> containing the precise locations of more than 12 million individual smartphones for several months in 2016 and 2017. The data is supposed to be anonymous, but it isn’t. We found celebrities, Pentagon officials</span><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;"> and average Americans</span><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;">.</span></div><div class="separator" style="clear: both; text-align: center;"><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;"><span style="color: black; font-size: medium;"><span style="font-size: medium;"><br /></span></span></span></div><div class="separator" style="clear: both; text-align: center;"><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px; text-align: left;"><span style="color: black; font-size: medium;"><span style="font-size: medium;">It</span></span><span face="nyt-imperial, georgia, "times new roman", times, serif" style="color: #333333; font-size: 1.25rem;"> became clear that this data — collected by smartphone apps and then fed into a dizzyingly complex digital advertising ecosystem — was a liability to national security, to free assembly and to citizens living mundane lives.</span></span></div><div><span face="nyt-imperial, georgia, "times new roman", times, serif" style="background-color: white; color: #333333; font-size: 20px;"><br /></span></div><div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dzuVA4bGKArCQoJDIKUPduLshEG2gogUAq6dsz4RN1RyqLGjdSueGjpqb0y_osqPEQadPsXo6dTcFbR-OGMPg' class='b-hbp-video b-uploaded' frameborder='0'></iframe></div><br /></div><div><br /></div><div><div class="separator" style="clear: both; text-align: center;"><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px; max-width: 100%; padding: 0px; text-align: left; text-size-adjust: 100%; vertical-align: baseline; width: 600px;">Surrendering our privacy to the government would be foolish enough. But what is more insidious is the Faustian bargain made with the marketing industry, which turns every location ping into currency as it is bought and sold in the marketplace of surveillance advertising. </p><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px; max-width: 100%; padding: 0px; text-align: left; text-size-adjust: 100%; vertical-align: baseline; width: 600px;"><br /></p><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px; max-width: 100%; padding: 0px; text-align: left; text-size-adjust: 100%; vertical-align: baseline; width: 600px;">Now, one year later, we’re in a very similar position. But it’s far worse.</p><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px; max-width: 100%; padding: 0px; text-align: left; text-size-adjust: 100%; vertical-align: baseline; width: 600px;"><br /></p><p class="css-axufdj evys1bk0" style="background-color: white; border: 0px; color: #333333; font-family: nyt-imperial, georgia, "times new roman", times, serif; font-size: 1.25rem; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.875rem; margin: 0px; max-width: 100%; padding: 0px; text-align: left; text-size-adjust: 100%; vertical-align: baseline; width: 600px;"><a href="https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html" target="_blank">Read more here..</a></p></div><p></p><div class="separator" style="clear: both; text-align: left;"> </div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><p></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><br /></div><br /><p></p></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-81996243054093501952021-02-01T13:36:00.002-05:002021-02-01T13:36:07.164-05:00Technician hacked home security cameras to spy on women...<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsJ5_ISvIfYNUNffi9tySeC5Ai6e9MaW0SD0_qqY8NGyArWfMMOrJcm2LScPYGmgzyWp3RB2CmYRuuX6oyJ4OIRTOlZtCKou06KDhpxJJ2SioieT-FrJUKfoa9y6-tpOUl6_JbiZSg07co/s320/CamSpy.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="180" data-original-width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsJ5_ISvIfYNUNffi9tySeC5Ai6e9MaW0SD0_qqY8NGyArWfMMOrJcm2LScPYGmgzyWp3RB2CmYRuuX6oyJ4OIRTOlZtCKou06KDhpxJJ2SioieT-FrJUKfoa9y6-tpOUl6_JbiZSg07co/s0/CamSpy.jpg" /></a></div><br /> <span style="background-color: white; color: #303030; font-family: "Unify Sans", "Helvetica Neue", "Arial Nova", Helvetica, Arial, sans-serif; font-size: 24px;">Here is the backstory</span><p></p><p class="gnt_ar_b_p" style="background-color: white; color: #303030; font-family: "Georgia Pro", Georgia, "Droid Serif", serif; font-size: 18px; margin: 14px 0px; overflow-wrap: break-word;">Earlier this month, Telesforo Aviles, a 35-year-old former technician for security company ADT, admitted to federal prosecutors that he accessed more than 200 ADT customer camera feeds to spy on them. Aviles said he targeted particularly attractive women to watch them at home as they undressed, slept or had sex.</p><p class="gnt_ar_b_p" style="background-color: white; color: #303030; font-family: "Georgia Pro", Georgia, "Droid Serif", serif; font-size: 18px; margin: 14px 0px; overflow-wrap: break-word;">According to the guilty plea submitted by Aviles in court, the ADT tech not only spied on the women but secretly accessed the customers’ accounts more than 9,600 times during a four-year period.</p><p class="gnt_ar_b_p" style="background-color: white; color: #303030; font-family: "Georgia Pro", Georgia, "Droid Serif", serif; font-size: 18px; margin: 14px 0px; overflow-wrap: break-word;"><a href="https://www.thespectrum.com/story/news/local/mesquite/2021/01/31/adt-technician-hacked-home-security-cameras-spy-women/4332300001/" target="_blank">Read more here</a>.</p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-29571217622835353952021-02-01T13:25:00.000-05:002021-02-01T13:25:09.284-05:00Russian hack brings changes, uncertainty to US court system..<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTF0nveIhOZbPvt1UYVbu2oCcMpLCfz0FgQUUoLbLb_8uj9GeNueJCh_hB3keqvhn_uihvqHq_7I3GC6y59tr4ZG1f8sZ0qIC230NOIY737SH6gW6Gt59JRLZJY7BIvA6AgaRQDsmQ8FZ/s800/gavel.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="533" data-original-width="800" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTF0nveIhOZbPvt1UYVbu2oCcMpLCfz0FgQUUoLbLb_8uj9GeNueJCh_hB3keqvhn_uihvqHq_7I3GC6y59tr4ZG1f8sZ0qIC230NOIY737SH6gW6Gt59JRLZJY7BIvA6AgaRQDsmQ8FZ/s320/gavel.jpg" width="320" /></a></div><p></p><div class="card collection-item " data-type="text" style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #333333; font-family: Roboto, Helvetica, sans-serif;"><div class="card-content card-article" id="" style="-webkit-font-smoothing: antialiased; box-sizing: border-box; padding: 10px 0px;"><p style="-webkit-font-smoothing: antialiased; box-sizing: border-box; font-family: Roboto, Helvetica, serif; font-size: 20px; line-height: 1.6; margin: 0px;"><b style="-webkit-font-smoothing: antialiased; box-sizing: border-box;">PHILADELPHIA — </b>(AP) — Trial lawyer Robert Fisher is handling one of America’s most prominent counterintelligence cases, defending an MIT scientist charged with secretly helping China. But how he’ll handle the logistics of the case could feel old school: Under new court rules, he’ll have to print out any highly sensitive documents and hand-deliver them to the courthouse.</p></div></div><div class="card collection-item " data-type="text" style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #333333; font-family: Roboto, Helvetica, sans-serif;"><div class="card-content card-article" id="" style="-webkit-font-smoothing: antialiased; box-sizing: border-box; padding: 10px 0px;"><p style="-webkit-font-smoothing: antialiased; box-sizing: border-box; font-family: Roboto, Helvetica, serif; font-size: 20px; line-height: 1.6; margin: 0px;">Until recently, even the most secretive material — about wiretaps, witnesses and national security concerns – could be filed electronically. But that changed after the massive Russian hacking campaign that breached the U.S. court system’s electronic case files and those of scores of other federal agencies and private companies.</p><p style="-webkit-font-smoothing: antialiased; box-sizing: border-box; font-family: Roboto, Helvetica, serif; font-size: 20px; line-height: 1.6; margin: 0px;"><br /></p><p style="-webkit-font-smoothing: antialiased; box-sizing: border-box; font-family: Roboto, Helvetica, serif; font-size: 20px; line-height: 1.6; margin: 0px;"><a href="https://www.kiro7.com/news/russian-hack-brings/GYUWN5FE6DCPDQZ3CZUYJXVQFQ/" target="_blank">Read more here</a>.</p></div></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-78161420120778861442020-09-25T17:39:00.004-04:002020-09-25T17:39:49.667-04:00Ring’s latest security camera is a drone that flies around inside your house...<p> </p><p></p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/i2jFN_QEcS4" width="320" youtube-src-id="i2jFN_QEcS4"></iframe></div><p></p><p><br /></p><p><span face="adelle-sans, Helvetica, sans-serif" style="background-color: white; color: #6a6a6a; font-size: 21.6px; font-style: italic;">The Always Home Cam is an ambitious new home security device</span></p><p><span face="adelle-sans, Helvetica, sans-serif" style="background-color: white; color: #6a6a6a; font-size: 21.6px; font-style: italic;"><span style="color: #424242; font-family: Helvetica, sans-serif; font-size: 18px; font-style: normal;">Ring latest home security camera is taking flight — literally. The new Always Home Cam is an autonomous drone that can fly around inside your home to give you a perspective of any room you want when you’re not home. Once it’s done flying, the Always Home Cam returns to its dock to charge its battery. It is expected to cost $249.99 when it starts shipping next year.</span></span></p><p><span face="adelle-sans, Helvetica, sans-serif" style="background-color: white; color: #6a6a6a; font-size: 21.6px; font-style: italic;"><span style="color: #424242; font-family: Helvetica, sans-serif; font-size: 18px; font-style: normal;"><a href="https://www.theverge.com/2020/9/24/21453709/ring-always-home-cam-indoor-drone-security-camera-price-specs-features-amazon" target="_blank">Read more here..</a></span></span></p>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-35828825162401356172020-08-13T15:50:00.004-04:002020-08-13T15:51:20.755-04:00The Secret SIMs Used By Criminals to Spoof Any Number..<p></p><div class="separator" style="background-color: white; clear: both; font-family: "neue haas grotesk text", "helvetica neue", helvetica, arial, sans-serif; font-size: 20px; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXQWOeMyZs7Ds6ssg6ScGt1ymE2M_KAkRBxWpXZAG8VGksayYrBuDxb9dyhLyyvQuLQsGQssBYHKwjA_6jESHQdPdwSC79nBVJMw9zZ1CoWKA-XaiCILXZ0ChUvQb90WncWXNzXjD_Pvuz/s512/unnamed.png" style="clear: left; float: left; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="512" data-original-width="512" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXQWOeMyZs7Ds6ssg6ScGt1ymE2M_KAkRBxWpXZAG8VGksayYrBuDxb9dyhLyyvQuLQsGQssBYHKwjA_6jESHQdPdwSC79nBVJMw9zZ1CoWKA-XaiCILXZ0ChUvQb90WncWXNzXjD_Pvuz/w168-h168/unnamed.png" width="168" /></a></div><p style="background-color: white; font-family: "neue haas grotesk text", "helvetica neue", helvetica, arial, sans-serif; font-size: 20px;">Criminals use so-called Russian, encrypted, or white SIMs to change their phone number, add voice manipulation to their calls, and try to stay ahead of law enforcement.</p><div><br /></div><div><span style="font-family: inherit;">The unsolicited call came from France. Or at least that's what my phone said. When I picked up, a man asked if I worked with the National Crime Agency, the UK's version of the FBI. When I explained, no, as a journalist I don't give information to the police, he said why he had contacted me.</span></div><p style="text-align: left;"><span style="font-family: inherit;">"There are these special SIM cards out there," he said, referring to the small piece of hardware that slips inside a cell phone. "I'm actually ringing from one now," he added, before later explaining he runs an underground site that sells these cards.</span></p><p style="text-align: left;"><a href="https://www.vice.com/en_us/article/n7w9pw/russian-sims-encrypted" target="_blank"><b><span style="color: #2b00fe; font-family: inherit;">Read more here..</span></b></a></p><br /><br /> <br /><br />Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-42323803788615350122020-07-28T12:59:00.001-04:002020-07-28T12:59:39.305-04:00TIKTOK APP SECURITY CONCERNS<span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZZ2tVlAkTu3bN-59fRqaizRMew5uPzTDgBGonMGeywdeWCYLj8i59wTZwERtuPb5mQn8XMRws3cDXs27Vmf5LvDQExa_7NlUWmM5Ap-fDpweNBZssPqPM43SXQF4KaWtSI-JF00WOUbZr/s1440/tiktok-app-substantial-security-threat-1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="803" data-original-width="1440" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZZ2tVlAkTu3bN-59fRqaizRMew5uPzTDgBGonMGeywdeWCYLj8i59wTZwERtuPb5mQn8XMRws3cDXs27Vmf5LvDQExa_7NlUWmM5Ap-fDpweNBZssPqPM43SXQF4KaWtSI-JF00WOUbZr/s320/tiktok-app-substantial-security-threat-1.jpg" width="320" /></a></div></span><h4 style="text-align: left;"><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;">TikTok. You’ve likely heard of, or used, this wildly popular app. If you are one of the few who doesn’t know what TikTok is, the app is social media sharing app used to create short dance, lip-sync, comedy and talent videos.</span></h4><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"><br /></span></div><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;">It’s been downloaded over </span><a href="https://www.oberlo.com/blog/tiktok-statistics" rel="noopener noreferrer" style="background-color: white; box-sizing: inherit; color: #d22d27; font-family: latoregular; font-size: 17px; overflow-wrap: break-word; text-decoration-line: none; transition: all 0.7s ease 0s;" target="_blank">2 billion times</a><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"> on the app store and Google play (as of 07/03/2020), and has over 800 million active users worldwide. A whopping 69% of TikTok users are Gen Z’ers (age 7 to 22). Chances are either you’re a TikTok app user, or a family member or close associate is. But, did you know that this app has been banned in India? Or, that the US government is also considering banning the TikTok app over security concerns? </span></div><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"><br /></span></div><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;">From its Chinese ownership to concern about the app’s privacy policy and data access, there are some well founded concerns about the TikTok app security that you should be aware of.</span></div><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"><br /></span></div><div><span style="background-color: white; color: #666666; font-family: latoregular; font-size: 17px;"><a href="https://comsecllc.com/tiktok-app-security-concerns/" target="_blank"><b>Read more here..</b></a></span></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-71208839396400940422020-07-28T12:52:00.002-04:002020-07-28T12:52:47.171-04:00Hackers reportedly demand $10 million from Garmin to release data..<br /><div class="separator" style="clear: both; text-align: left;"><h1 style="background-color: white; box-sizing: border-box; color: #404040; font-family: Georgia; font-size: 1.55556em; font-weight: 400; line-height: 1.25; margin: 0px 0px 0.25em;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrZEraAnTRnEQoiOL8BGsZutvCor64AUmk3E6N8rAKmO8EVyEhuExKGPpTERS6YF1JSXFX3FU4hEnFUrLyN7ZM1BIoadiIdZNqlymRA4bqL09kpclddlONd1geNoO9GJxbPkMwhPWpp2DT/s1600/Garmin+Hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrZEraAnTRnEQoiOL8BGsZutvCor64AUmk3E6N8rAKmO8EVyEhuExKGPpTERS6YF1JSXFX3FU4hEnFUrLyN7ZM1BIoadiIdZNqlymRA4bqL09kpclddlONd1geNoO9GJxbPkMwhPWpp2DT/s320/Garmin+Hack.jpg" width="320" /></a></div></h1><h4 style="text-align: left;">Hackers reportedly demand $10 million from Garmin to release data.</h4><div><p style="background-color: white; box-sizing: border-box; font-family: Georgia; font-size: 18px; margin: 0px 0px 2em;"><font color="#404040">Hackers are reportedly demanding $10 million to free Garmin’s systems from a ransomware cyberattack that began Thursday, according </font><font color="#404040">to </font><font color="#000000">BleepingComputer</font><font color="#404040">.</font></p><p style="background-color: white; box-sizing: border-box; color: #404040; font-family: Georgia; font-size: 18px; margin: 0px 0px 2em;">Employees within Garmin confirmed to the tech site that Garmin suffered an attack using WastedLocker, a new ransomware operated by a malware exploitation gang commonly known as Evil Corp. Ransomware is malicious software designed to keep an individual or company from accessing their own data unless a ransom is paid.</p><p style="background-color: white; box-sizing: border-box; color: #404040; font-family: Georgia; font-size: 18px; margin: 0px 0px 2em;">Screenshots shared with BleepingComputer show lists of files encrypted by the malware, with ransom notes attached to each file. The notes tell Garmin to email one of two email addresses “to get a price for your data.” That price is reportedly $10 million.</p><p style="background-color: white; box-sizing: border-box; color: #404040; font-family: Georgia; font-size: 18px; margin: 0px 0px 2em;"><a href="https://cyclingtips.com/2020/07/hackers-demand-10-million-from-garmin-to-release-data/"><b>Read more here..</b></a></p></div></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-64968968277952253992020-07-28T12:45:00.001-04:002020-07-28T12:45:49.337-04:00How a Chinese Agent Weaponized LinkedIn to Steal Sensitive Info<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQY2He8XUzExp_71rgDWV0FyDwlt0uOjtUt4pIX1Ak4POwy2lJfI9hAfGBbWViFzomz03cp-fzxQcKyGb0BmCLDb5saMlL924Us54PUE_7ekwpzvYSBVT5Cn-pb5O0VXVNNKwBnvpS5Fny/s1750/linkedin+hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="background-color: white; color: #6c6c6c; font-family: proxima-nova; font-size: 20px; text-align: left;"></span></a><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQY2He8XUzExp_71rgDWV0FyDwlt0uOjtUt4pIX1Ak4POwy2lJfI9hAfGBbWViFzomz03cp-fzxQcKyGb0BmCLDb5saMlL924Us54PUE_7ekwpzvYSBVT5Cn-pb5O0VXVNNKwBnvpS5Fny/s1750/linkedin+hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG-Itqwoh3pyTUyx9pdrV6tREMZ1KA3dpbrlZ5gQ9yQFyXrlmgVOGQLUzg4kQRaRMghb8m4bvfDUvkm43CfA3Y1mT3LLA47W0A9LqQq0WwZ_JMZ6Yq086HjUTMHTHCYxjKWz5cdU75xyiV/s1750/linkedin+hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="984" data-original-width="1750" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG-Itqwoh3pyTUyx9pdrV6tREMZ1KA3dpbrlZ5gQ9yQFyXrlmgVOGQLUzg4kQRaRMghb8m4bvfDUvkm43CfA3Y1mT3LLA47W0A9LqQq0WwZ_JMZ6Yq086HjUTMHTHCYxjKWz5cdU75xyiV/s320/linkedin+hack.jpg" width="320" /></a></div><div style="text-align: left;"></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQY2He8XUzExp_71rgDWV0FyDwlt0uOjtUt4pIX1Ak4POwy2lJfI9hAfGBbWViFzomz03cp-fzxQcKyGb0BmCLDb5saMlL924Us54PUE_7ekwpzvYSBVT5Cn-pb5O0VXVNNKwBnvpS5Fny/s1750/linkedin+hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br /></a></div><div><br /></div><h3 style="text-align: left;">‘Dickson’ Yeo had set up a fake consultancy company on LinkedIn, which he used to bait US govt and military workers.</h3><div><p style="background-color: white; box-sizing: border-box; color: #292929; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;"><br /></p><p style="background-color: white; box-sizing: border-box; color: #292929; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;">A Singaporean national, who had set up a fake consultancy company to solicit “valuable non-public information” from the United States’ government and military workers has pleaded guilty to acting as an illegal agent of Chinese intelligence.</p><p style="background-color: white; box-sizing: border-box; color: #292929; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;"><br /></p><p style="background-color: white; box-sizing: border-box; color: #292929; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;">The US Justice Department, in a statement on Friday 24 July, said Jun Wei You was recruited by the Chinese government around 2015 while he was a PhD candidate in Singapore and researching on Chinese foreign policy.</p><p style="background-color: white; box-sizing: border-box; color: #292929; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;"><br /></p><p style="background-color: white; box-sizing: border-box; font-family: var(--font-2); font-size: var(--base-large); line-height: 1.6; margin-bottom: var(--space3); margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px;"><a href="https://www.thequint.com/tech-and-auto/how-chinese-agent-dickson-yeo-weaponised-linkedin-to-steal-united-states-information"><font color="#2b00fe"><b>Read more here..</b></font></a></p></div>Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-64585816489480964762020-06-08T14:12:00.000-04:002020-06-08T14:12:25.036-04:00SWEYNTOOTH BLUETOOTH FLAW AFFECTS IOT DEVICES TO SECURITY SYSTEMS<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUCm0MDjdqjZ6p_58j0vY1YdyPaBQXOHD4ClUgNUhieWDFA0Dp4LJ6a6S7yhs_cjyX7P9hrWCuRQBER-l-6tPww6cigwBHCdn-aWWNjaqYw6V59fOqjCidjiQYLWn0G2qZkFMSnvb_JPTO/s1600/fitbit-SweynTooth.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="960" data-original-width="1440" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUCm0MDjdqjZ6p_58j0vY1YdyPaBQXOHD4ClUgNUhieWDFA0Dp4LJ6a6S7yhs_cjyX7P9hrWCuRQBER-l-6tPww6cigwBHCdn-aWWNjaqYw6V59fOqjCidjiQYLWn0G2qZkFMSnvb_JPTO/s320/fitbit-SweynTooth.jpg" width="320" /></a></div>
<h3 style="background-color: white; box-sizing: inherit; color: #333333; font-family: montserratbold; font-size: 20px; font-weight: 400; line-height: 24px; margin: 40px 0px 10px; padding: 0px;">
<span style="color: #666666; font-family: latoregular; font-size: 17px;">It’s difficult to imagine the modern workplace without wireless technology.</span></h3>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
It wasn’t that long ago when everything was connected with wires: phones, internet, headsets… Nowadays, that’s all handled by LTE, WiFi, and, of course, Bluetooth.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
Bluetooth technology has revolutionized the world of consumer electronics. It’s found in countless products, including speakers, headphones, smart home devices, and even medical devices. With its “pairing” security, it’s generally considered to be a secure, borderline foolproof method of connecting your devices using minimal energy. However, like with all wireless technologies, there are always exploits that could put you and your business at risk.</div>
<div style="background-color: white; box-sizing: inherit; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
<span style="color: blue;"><a href="https://comsecllc.com/sweyntooth-bluetooth-flaw-affects-iot-devices-to-security-systems/" target="_blank">Read more here</a>.</span></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-81924810296322457292020-02-13T17:36:00.002-05:002020-02-13T17:36:32.474-05:00O.MG CABLE : HEADS UP ABOUT A SERIOUS PRIVACY THREAT<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnXGHeStT92wVGSDZuUHHPFyILbT8WKCF1sbyPU6zmtocSltGizIFUj81MYEhdssnwN40ZMmEwTaasgovz8AlYa9mPMTthT3UXBv-rhjVHS2_qpNMFAC0nOn9xJL9r5lbYlYBvvEOItufE/s1600/omg-cable-apple-charger-privacy-2048x1356.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1060" data-original-width="1600" height="211" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnXGHeStT92wVGSDZuUHHPFyILbT8WKCF1sbyPU6zmtocSltGizIFUj81MYEhdssnwN40ZMmEwTaasgovz8AlYa9mPMTthT3UXBv-rhjVHS2_qpNMFAC0nOn9xJL9r5lbYlYBvvEOItufE/s320/omg-cable-apple-charger-privacy-2048x1356.jpg" width="320" /></a></div>
<h3 style="background-color: white; box-sizing: inherit; color: #333333; font-family: montserratbold; font-size: 20px; font-weight: 400; line-height: 24px; margin: 40px 0px 10px; padding: 0px;">
<strong style="box-sizing: inherit;">O.MG Cable Privacy Threat</strong></h3>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
How do you charge your wireless devices?</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
While wireless charging is gaining popularity as a way to charge up our phones, the vast majority of people still use cables. If you’re an iPhone or iPad user, then your cable of choice is likely the Lightning Connector.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
<a href="https://en.wikipedia.org/wiki/Lightning_(connector)" rel="noopener noreferrer" style="box-sizing: inherit; color: #d22d27; overflow-wrap: break-word; text-decoration-line: none; transition: all 0.7s ease 0s;" target="_blank">The Lightning Connector</a> was Apple’s replacement for their longstanding 30-pin dock connect used on iPods, iPhones, and iPads until 2012. Making its debut on the iPhone 5, Lightning was a massive upgrade for Apple users looking to charge or sync their devices. It was usable in any orientation, much smaller than the old connector, and was much more durable. Today, if you own an Apple device, you probably have a ton of Lightning Cables lying around your home or office.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
However, a recent innovation called <a href="https://youtu.be/Qu_RoNOeCxA" rel="noopener noreferrer" style="box-sizing: inherit; color: #d22d27; overflow-wrap: break-word; text-decoration-line: none; transition: all 0.7s ease 0s;" target="_blank">The O.MG Cable</a> is a privacy nightmare for those who own Apple devices.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
<a href="https://comsecllc.com/o-mg-cable-heads-up-about-a-serious-privacy-threat/" target="_blank">Read more here..</a></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-3423799681461770942020-02-11T16:46:00.000-05:002020-02-11T16:52:15.616-05:00Wireless Tech to Steal Luxury Cars in Seconds...<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3nkfuwhtvA_qNcaU2BcsWUTQ7oHuUPbaxcFj9RbbRhSeNJfbkK7qgaWFbAV2CgVuUuh-qDTTexxskdxcGJIaOlG52ilBlgSIQRmKZu2eniprzQFFIYKonCquXxJGrnZxEEZAXHt3d0ZDi/s1600/download.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="168" data-original-width="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3nkfuwhtvA_qNcaU2BcsWUTQ7oHuUPbaxcFj9RbbRhSeNJfbkK7qgaWFbAV2CgVuUuh-qDTTexxskdxcGJIaOlG52ilBlgSIQRmKZu2eniprzQFFIYKonCquXxJGrnZxEEZAXHt3d0ZDi/s1600/download.jpg" /></a></div>
<h3>
<i><span style="font-size: small;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Motherboard obtained a video of a so-called relay attack from EvanConnect, who sells keyless repeaters that can be used to break into and steal luxury cars</span>.</span></i></h3>
<div>
<i><span style="font-size: small;"><br /></span></i></div>
<div>
<div>
<div style="background-color: white; box-sizing: inherit; font-family: Lora, Georgia, serif; font-size: 18px; margin-bottom: 30px; margin-left: auto; margin-right: auto;">
As they both walked through a dimly lit parking garage, one of the pair of men peered at a black, laptop-sized device inside his messenger bag. Using buttons on its outer case, he flicked through various options on the device's bright LED screen before landing on his choice.</div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/Z-JfFjEaOag/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/Z-JfFjEaOag?feature=player_embedded" width="320"></iframe></div>
<div style="background-color: white; box-sizing: inherit; font-family: Lora, Georgia, serif; font-size: 18px; margin-bottom: 30px; margin-left: auto; margin-right: auto;">
<br /></div>
<div style="background-color: white; box-sizing: inherit; font-family: Lora, Georgia, serif; font-size: 18px; margin-bottom: 30px; margin-left: auto; margin-right: auto;">
With the device armed, the second man walked towards a bright white Jeep parked in the garage. He held his own piece of technology: a small box with an antenna jutting from the top. The man tried to open the car's door, but it was locked. He pushed a button on the top of his handheld device, a light flickered, and instantly the car was open. He clambered into the driver's seat, and pushed the button to start the vehicle.</div>
<div style="background-color: white; box-sizing: inherit; font-family: Lora, Georgia, serif; font-size: 18px; margin-bottom: 30px; margin-left: auto; margin-right: auto;">
<a href="https://www.vice.com/en_us/article/7kz48x/guy-selling-relay-attack-keyless-repeaters-to-steal-cars" target="_blank">Read more here..</a></div>
</div>
</div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-89598010793748701712019-08-09T18:02:00.000-04:002019-08-09T18:02:39.810-04:00WHAT YOU NEED TO KNOW ABOUT 5G AND NETWORK SECURITY<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSAb6Bh0MuR3gex5d6hbLg7NB8qKFlehA1Jxq6ZXazITSQFBFGmAMimKyfbmiU7MdjFmE7R1Sd1afuo26YlHsQWoGfOlQ3z2P5Yeli3zUhBpk6bwdYaXxrMSPvfJJVAfP8ZItf5C3GP1Zh/s1600/mobile-5g-security-770x400.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="770" height="166" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSAb6Bh0MuR3gex5d6hbLg7NB8qKFlehA1Jxq6ZXazITSQFBFGmAMimKyfbmiU7MdjFmE7R1Sd1afuo26YlHsQWoGfOlQ3z2P5Yeli3zUhBpk6bwdYaXxrMSPvfJJVAfP8ZItf5C3GP1Zh/s320/mobile-5g-security-770x400.jpg" width="320" /></a></div>
Do you always want the latest and greatest when it comes to technology?<br /><br /><div>
As the march of communication technology continues, new and innovative tools come out every day that improve our lives and make our data more secure. Well, that’s the theory, anyway.<br /><br /><div>
<br /></div>
<div>
The reality is that there can be a real “look-before-you-leap” problem when it comes to communication technologies. Just take a look at 5G, for example.</div>
<div>
<br />5G is considered to be the next step up in mobile communication. Just how LTE was a massive improvement over 3G, 5G looks primed to change the landscape when it comes to wireless devices completely. With major carriers, including AT&T and Verizon, rolling out their 5G networks later this year, you should know that it might not be quite as safe as advertised…</div>
</div>
<div>
<br /></div>
<div>
<a href="https://comsecllc.com/what-you-need-to-know-about-5g-and-network-security/" target="_blank"><span style="color: blue;">Read more here..</span></a></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-87156633111882846442019-07-21T18:19:00.000-04:002019-07-21T18:19:05.173-04:00DETECTING CORPORATE DATA LEAK EXPOSURES WITH OSINT<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvzMUINGzM4qc6ZTlTJ6ekH5SFqV0Knl975kEFrmQYbVPH1cMYZoXP-6dwIkZzz5s1Ao_8xIiD2jFyCikRXWsxG5ao4uz5rhXdFmvO0XGD3qXmpYuiDRp2GT5QeZ6P0F1oepNIBGYoGAJy/s1600/data-leak-assessment.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="961" data-original-width="1440" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvzMUINGzM4qc6ZTlTJ6ekH5SFqV0Knl975kEFrmQYbVPH1cMYZoXP-6dwIkZzz5s1Ao_8xIiD2jFyCikRXWsxG5ao4uz5rhXdFmvO0XGD3qXmpYuiDRp2GT5QeZ6P0F1oepNIBGYoGAJy/s320/data-leak-assessment.jpg" width="320" /></a></div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
Do you want to know one of the biggest cybersecurity risks out there for individuals and organizations? Publicly accessible information.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
Every other week, you read about some massive organization that had their data hacked and released on the web. Sometimes, this data was out there on the dark web for months and months before anyone noticed, only becoming evident when the information was somehow used against them. But by the time that the organization is forced to take action, it’s often too late for anything but damage control.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
How does this information get out there? Well…</div>
<div style="background-color: white; box-sizing: inherit; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
<a href="https://comsecllc.com/detecting-corporate-data-leak-exposures-with-osint/" target="_blank"><b><span style="color: blue;">Read more here..</span></b></a></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-88220685337386357542019-07-16T13:58:00.000-04:002019-07-16T13:58:39.731-04:00HOW NASA COULD HAVE AVOIDED GETTING HACKED<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDJGwRCYt-I53ffKQfYqoxdJtHWfjH8omfdsgHCg18opiNExn_82pmnUiSGGaDrry643Zqs6TB-MX5woW8HN2GWuR1_BCmIJCHu8SBXdBQyd4SDCdKeiB4Wx3XGD1AhKnAmCmPRpwup6p6/s1600/How-Nasa-Could-Have-Avoided-Being-Hacked.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="782" data-original-width="1440" height="173" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDJGwRCYt-I53ffKQfYqoxdJtHWfjH8omfdsgHCg18opiNExn_82pmnUiSGGaDrry643Zqs6TB-MX5woW8HN2GWuR1_BCmIJCHu8SBXdBQyd4SDCdKeiB4Wx3XGD1AhKnAmCmPRpwup6p6/s320/How-Nasa-Could-Have-Avoided-Being-Hacked.jpg" width="320" /></a></div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
When you think of NASA, you think of the cutting edge of science and space exploration. These are the people who were responsible for the moon landing, the Mars missions, and countless technological innovations that have defined the world as we know it today.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
What you might not think of is inadequate and out-of-date security, but here we are.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
In June of 2019, NASA confirmed that its Jet Propulsion Laboratory (JPL) was hacked back in April 2018. What’s worse is that this hack remained undetected for almost one year. It doesn’t exactly fill you with confidence about our nation’s space agency, does it?<span id="more-12872" style="box-sizing: inherit;"></span></div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
While the final extent of the damage is not (and may never be) known, NASA has confirmed that malicious actors stole approximately 500 MB of data related to the Mars missions. If you follow the news, these missions involve sending unmanned drones (such as the Curiosity rover) to the red planet to gather information. If things go well, the plan is to send a crewed mission at some point in the 2020s.</div>
<div style="background-color: white; box-sizing: inherit; color: #666666; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
So, how was this high-tech cyber heist accomplished? Through espionage worthy of a Mission: Impossible movie? Nope. What if we told you that it was all because of an unauthorized Raspberry Pi?</div>
<div style="background-color: white; box-sizing: inherit; font-family: latoregular; font-size: 17px; line-height: 30px; margin-bottom: 30px; padding: 0px;">
<a href="https://comsecllc.com/how-nasa-could-have-avoided-getting-hacked/" target="_blank"><span style="color: blue;"><b>Read more here</b></span></a><span style="color: #666666;">.</span></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-45312305456685309182019-03-21T09:05:00.000-04:002019-03-21T09:05:40.891-04:00Hundreds of motel guests were secretly filmed and live-streamed online..<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN4RTPn97LXR-55w81_ISKzIn096tfc9sqL0LzJnMk-d2ncIEaROK7iUL_OqgMAXJDSpTbIDJCF51fAsS-QFdgGSlBdINyedfLveXuAqh8aMLqDUalfuFN1H7uGCOwqBHJZ7DrYlvgk3_w/s1600/Spy+Cam.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="438" data-original-width="780" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN4RTPn97LXR-55w81_ISKzIn096tfc9sqL0LzJnMk-d2ncIEaROK7iUL_OqgMAXJDSpTbIDJCF51fAsS-QFdgGSlBdINyedfLveXuAqh8aMLqDUalfuFN1H7uGCOwqBHJZ7DrYlvgk3_w/s320/Spy+Cam.jpg" width="320" /></a></div>
About 1,600 people have been secretly filmed in motel rooms in South Korea, with the footage live-streamed online for paying customers to watch, police said Wednesday.<br />Two men have been arrested and another pair investigated in connection with the scandal, which involved 42 rooms in 30 accommodations in 10 cities around the country. Police said there was no indication the businesses were complicit in the scheme.<br /><br /><div>
In South Korea, small hotels of the type involved in this case are generally referred to as motels or inns. Cameras were hidden inside digital TV boxes, wall sockets and hairdryer holders and the footage was streamed online, the Cyber Investigation Department at the National Police Agency said in a statement.</div>
<div>
<br /></div>
<div>
<a href="https://www.cnn.com/2019/03/20/asia/south-korea-hotel-spy-cam-intl/index.html" target="_blank"><span style="color: blue;">Read more here</span></a>.</div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-89618284859764124632019-01-31T16:41:00.001-05:002019-01-31T16:41:59.645-05:00New security flaw impacts 5G, 4G, and 3G telephony protocols<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZA5guD-24-OXKfdYn-pCnHeY1-SThJ0Kgw18NV7P5JFW2xAW3WcrFIBTO2OagYveYEA6HstgvR8Qb9Gh6-hwlF2Dk5euEU-a7lMitR8BK7WWbz1k2B2GPD7T_9AbfrKxklnGEtDv_AVw0/s1600/5g.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="430" data-original-width="1000" height="137" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZA5guD-24-OXKfdYn-pCnHeY1-SThJ0Kgw18NV7P5JFW2xAW3WcrFIBTO2OagYveYEA6HstgvR8Qb9Gh6-hwlF2Dk5euEU-a7lMitR8BK7WWbz1k2B2GPD7T_9AbfrKxklnGEtDv_AVw0/s320/5g.png" width="320" /></a></div>
Researchers have reported their findings and fixes should be deployed by the end of 2019.<div>
A new vulnerability has been discovered in the upcoming <a href="https://en.wikipedia.org/wiki/5G">5G</a> cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards.</div>
<br /><div>
Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.This new vulnerability has been detailed in a research paper named "New Privacy Threat on 3G, 4G, and Upcoming5G AKA Protocols," published last year.According to researchers, the vulnerability impacts AKA, which stands for Authentication and Key Agreement, a protocol that provides authentication between a user's phone and the cellular networks.<div>
<br /></div>
<div>
<a href="https://www.zdnet.com/google-amp/article/new-security-flaw-impacts-5g-4g-and-3g-telephony-protocols/" target="_blank"><b><span style="color: blue;">Read More Here</span></b></a>.</div>
</div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0tag:blogger.com,1999:blog-1069009752883098184.post-71336517652539857132019-01-30T17:27:00.001-05:002019-01-30T17:27:33.192-05:00Apple ‘knew FaceTime could let people spy on you a WEEK before telling us..<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrHKuF9hc4ypyLDSZ9dnUVegxeXQoFuh86nbDfONey08L10XIpElgAr4AKCS4JyBksQgNVHyndMGH6WZU2vXuI4OZYzpJR5LhCF21loV39MdELQJQFkcSB8tGN8xqml2lKb-9qHtE5Le9N/s1600/facetime4.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1286" data-original-width="640" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrHKuF9hc4ypyLDSZ9dnUVegxeXQoFuh86nbDfONey08L10XIpElgAr4AKCS4JyBksQgNVHyndMGH6WZU2vXuI4OZYzpJR5LhCF21loV39MdELQJQFkcSB8tGN8xqml2lKb-9qHtE5Le9N/s320/facetime4.jpg" width="159" /></a></div>
<div class="article__content article__content--intro" style="background-color: white; box-sizing: border-box; color: #232327; font-family: Roboto, sans-serif; font-size: 16px; font-weight: 700; line-height: 1.25em; margin-bottom: 13px; word-break: break-word;">
APPLE was reportedly told that its FaceTime app could let strangers spy on you more than a week and a half ago.</div>
This will come as a shock to many iPhone owners, as Apple only confirmed the bug's existence late on Monday, January 28.<br /><br />It comes as security experts revealed this morning that an Apple iCloud bug let anyone read your private iPhone notes.<br /><br />The Face Time bug meant that anyone could call your FaceTime and listen in through your microphone, without you ever accepting the call.<br /><br />In some cases, it was even possible to secure a live video feed of the victim – without their knowledge or consent.<br /><br />Apple has temporarily disabled Group FaceTime while it prepares a "fix" this week, but the company supposedly knew about the bug days prior to the 9to5mac reveal.<br /><br />According to the New York Times, 14-year-old Grant Thomas, from Arizona, discovered the bug on January 19. The teen found that he could use FaceTime video chats to eavesdrop on his friend's phone before his friend had answered the call.<br /><br />His mother Michele reportedly sent a video of the hack to Apple the very next day, warning over a "major security flaw".<div>
<br /></div>
<div>
<b><a href="https://www.thesun.co.uk/tech/8312202/apple-facetime-spying-bug-revealed/" target="_blank">Read more here</a>.</b></div>
Spy vs Spyhttp://www.blogger.com/profile/12144185360491010186noreply@blogger.com0