Corporate Espionage and Countermeasures News
News updates and articles are presented regarding corporate espionage, eavesdropping, electronic countermeasures, and TSCM. Please subscribe for automatic updates by entering your email address in the box on the right. You can search past articles and view archives in the column on the right.
Excerpts from recent posts are shown below. Click on the title to view the entire article.
Stolen surveillance system exposes drug dealing thieves.
DOERUN, GA (WALB) - Images from a stolen surveillance system helped investigators arrest a suspected drug dealer. Colquitt County Sheriff's Investigators made three arrests stemming from a burglary and drug deal connection. A Colquitt County farmer went online to see if he could find his stolen [...]
UK: Former deputy prime minister finds car was bugged.
John Prescott seems to be taking this find in stride, but it could be a sign of something more sinister going on. Vehicle TSCM sweeps are an important part of regular security precautions. The former Deputy Prime Minister discovered the device hidden in his car [...]
Waiting to be hacked… new consumer devices offer new eavesdropping potential.
Internet connected devices are attracting a lot of attention. Many, though, have potential security vulnerabilities just waiting to be hacked. The following devices may not have been exploited yet... but considering the possibilities, it's only a matter of time. Some of these just appeared at the CES show in Las [...]
Know your eavesdropping laws, even if you’re a former police chief…
Former Windham, NY police chief, now the town supervisor, has been arraigned on eavesdropping charges following a 10 month state police investigation. Stacey Post is accused of planting an audio and video recording device in the Windham town office building, recording employees without their knowledge. [...]
Hackers attack LA road signs
Science fiction stories often have tales of computerized devices taking over the world. Probably a more immediate worry, rather than the devices controlling us, would be hackers take over those devices, as that is already happening. Cyber security researcher, Graham Cluley, clues us in on happenings in downtown [...]
Tech watch: Device uses lasers to map an entire room through a 1-inch gap
from DailyMail.co.uk Science and Tech Looking through a keyhole could soon reveal far more than you imagine. Scientists have developed a device that could map an entire room simply by shining a laser through a 2cm gap. The system could be used in applications such as firefighting, [...]
Walls have ears: Toronto’s new mayor wants better walls to prevent eavesdropping.
Audio leakage from an office or boardroom is a significant but often overlooked concern. Toronto's new mayor is taking it seriously. Repairs on walls have been requested to help prevent inadvertent eavesdropping. "In this office you can hear straight through the wall." ..."the issue is that [...]
Morgan Stanley sacks employee who pilfered account data
...companies now no longer face just external threats. Employees may give in to threat or greed, and with their access to information, can cause a data breach without specialized knowledge or cyber security skills. Staff are often given far-reaching data access rights, but with this power, rouge employees can prove to be a serious risk to corporations. While the threat of insiders is unlikely to wane, companies can protect themselves more effectively by setting in place access restrictions to sensitive data and monitoring employee access to information caches.
Fake “The Interview” app is really an Android banking trojan
Graham Cluley's computer security website provides information about a Korean Android app that claims to offer a download of the movie "The Interview" is actually infecting smart phone's with malware that is stealing banking information, analyzed by researchers at McAfee. If you are looking for [...]
The Sony hack should make cyber security a hot boardroom topic
From Fortune, by Tom Huddleston, Jr. The massive scale of the cyber attack shows why top executives need to be more involved in shaping cyber strategy at companies. Spooked by the Sony Pictures hack and the leak of sensitive documents, companies of all kinds are [...]