A controversial mobile phone application, which helps a cell phone user read the text messages of others secretly, has been removed from sale by Internet search engine Google.
Google said the application, called SMS Secret Replicator, violated its terms.
Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number – prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)
Google may have dropped it from their marketplace, but doesn’t mean this $9.99 app is not available elsewhere. (more)
Coming soon, a way you can detect if your phone is infected with spyware. (more)
Corporate espionage is a very real threat
Levels of corporate espionage have significantly increased across all industry sectors in recent years, with the financial crisis exacerbating the problem. Technological advances and an increasingly transient workforce have contributed to the steady rise in espionage levels during the past decade. More recently, the increased competition between companies, heightened workplace pressures, large-scale redundancies and cost-cutting measures caused by the financial crisis have contributed to a dramatic proliferation in the scale and frequency of acts of espionage.
Read More
ASIS International recently held their 2010 international conference and exhibition in Dallas, Texas USA. I was lucky enough to have attended this exhibition and was absolutely amazed at just how many vendors were displaying state-of-the-art closed circuit television (CCTV) systems. Every step you took, was under surveillance. It is for this reason that I am shocked and amused to think that someone would be foolish enough to steal anything from such an exhibition, not to mention one of the world’s largest security exhibitions! Well, believe it or not, it happened!
Apparently, on the second morning of the ASIS 2010 Conference, several exhibitors reported that various items had been stolen from their exhibition stands. That’s right – a security exhibition is robbed! One of the victims was smart enough to approach a nearby exhibitor, who had several overt surveillance cameras pointing in the direction of the theft.
Read More
via Steven J. Vaughan-Nichols
The only thing “new” about Firesheep is that how it easy makes it to do. I’m unimpressed. Anyone who was serious about grabbing your personal information has already been doing it for years. Trust me, if someone really wanted your data and you’ve been using open Wi-Fi networks, they already grabbed it.
No, the real worry isn’t about some jerk grabbing your Twitter password in a coffee house.
The real worry has always been that your office Wi-Fi is easy to compromise and then someone can use a
packet-sniffer to get something that really matters like your your Accounts Payable password. (
more)
Need a Wi-Fi Security Audit and Compliance Inspection? (you do) Please call me. (more)
11/4/10 – UPDATE: IBM researchers are proposing an approach to WiFi security they call Secure Open Wireless in light of the release of the Firesheep tool. (more)
11/5/10 – UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)