Hamas warns against buying cars imported from Israel
By on 01/11/2010
By on 01/11/2010
Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number – prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)
By on 01/11/2010
Earlier this year after a suspicious break-in, a leading Sydney Councillor accidentally discovered a listening device concealed under his house. It was alleged that the same councillor had located another device some weeks earlier that was apparently logging computer activity, via a crude attachment at the back of his PC. The councillor felt that the installation must be politically motivated, as little was stolen during the initial break-in. Furthermore, there was an election looming and various suspicious [political] incidents occurred during the lead-up.
As a result, management within the local government he represents requested that a series of sweeps be undertaken of other councillor’s homes.
It begs the question of who would be bugging a local councillor and for what benefit? We have undertaken technical surveillance countermeasure inspections for numerous governments (local, state and federal) over the years, generally as a precautionary measure. Interestingly, we’ve found definitive evidence of listening devices having been placed at a number of locations and have provided practical security advice accordingly. In most cases, however, we’ve believed that these placements have been in relation to various inquiries undertaken by law enforcement agencies – an area we do not want to interfere with.
By on 31/10/2010
11/5/10 – UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)
By on 28/10/2010