Security stopped John Kerry to ask if he was carrying a phone with camera "No camera?" as he was entering a meeting with the President of Egypt, Abdel Fattah Saeed Hussein Khalil el-Sisi. The guard appears to continue to ask the next person behind Kerry as well, just doing his job!
Former Lake Station mayor had secretly recorded approximately 425,000 calls between Oct. 12, 2011, and Aug. 13, 2015, and continued the activity even after being released on bond as his federal corruption cases were pending. An audit of your phone system operations can help reveal potential misuse such as this. Almost all telecom systems in use today have features that can allow various forms of eavesdropping to take place.
A sophisticated bugging device has been found in a hotel meeting room ahead of the Bledisloe Cup rugby clash between the Australian teams the All Blacks and the Wallabies, officials confirmed on Saturday.
Bottom line: don't spy on your family! Many people who want to play James Bond end up looking more like Inspector Clouseau. The vast supply of monitoring devices available from online spy shops tempt many to eavesdrop on their bosses, competitors, friends and families. A [...]
A federal appeals court in Ohio has revived a lawsuit against a company accused of helping a husband spy on his wife and her online friend in violation of state and federal wiretap laws. The case is one of several in recent years to highlight the increasing presence of easy-to-use electronic spy tools in domestic life and divorce proceedings, where evidence of infidelity can carry a tremendous advantage.
Pokémon Go players could be using corporate accounts or devices to play the game. According to cloud platform provider CloudLock, the first release of the Pokémon Go app, which launched in the United States in early July, requested full access to users’ Google accounts (which were used to register player accounts) through an OAuth connection. This permission, which most users granted without reading the registration screen or considering potential security implications, allowed the app to access to all of the information synced to a user’s account, including contact, calendar and files stored on the device.