News

What's happening in the security industry.

ULTRASONIC BEACONS ARE TRACKING YOUR EVERY MOVEMENT

May 7, 2017

More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising. Academics from Technische Universitat Braunschweig in Germany recently published a paper in which they describe their research into the practice of using these beacons to monitor a consumer’s shopping […]

Read More

Siemens employee arrested for suspected industrial espionage

April 21, 2017

A 65-year-old Siemens Netherlands employee has been arrested by Dutch investigators on suspicion of industrial espionage, according to the Financieele Dagblad. He was arrested in Twente and was attempting to leave for China. The man is suspected of violating trade secrets and infringing patent rights, which are criminal activities in the Netherlands, said the OM […]

Read More

Hackers can spy on your calls and track location, using just your phone number

April 19, 2016

In Brief The famous ‘60 Minutes’ television show shocked some viewers Sunday evening when a team of German hackers demonstrated how they spied on an iPhone used by U.S. Congressman, then recorded his phone calls and tracked his movement through Los Angeles. Hackers leverage a security flaw in SS7 (Signalling System Seven) protocol that allows […]

Read More

Hikvision Smart Banking Solution

March 30, 2016

Hikvision’s interesting Smart Banking Solution

Read More

Microsoft unveils new data plan to tackle US internet spying

November 12, 2015

Tech giant comes up with radical new regime to ringfence European data Microsoft chief executive Satya Nadella holds a speech to present the companies new cloud strategy for Germany in Berlin Microsoft threw down a challenge to the US tech industry on Wednesday as it came up with a radical new regime to try to […]

Read More

The Chinese dissident Ai Weiwei ‘finds bugging devices’ at his Beijing studio

October 12, 2015

Ai Weiwei has posted a number of pictures of what he says are listening devices found in his Beijing studio. The Chinese dissident artist captioned one photo of a bug on Instagram with “There will always be surprises”. His friend Liu Xiaoyuan confirmed the bugs were found after the artist returned from a trip to […]

Read More

Chinese hackers put iOS in the crosshairs with novel attack angles

October 6, 2015

Exploits use Apple’s enterprise app distribution model and ‘private APIs’ to seed adware on iPhones, sidestepping App Store inspections For almost a year, Chinese hackers have leveraged a novel one-two punch to compromise iOS devices, including non-jailbroken iPhones, then seed them with adware, a security company said today. The malware, dubbed “YiSpecter,” was written in […]

Read More

Ousted Maldives’ president bugged Amal Clooney during prison meeting with her husband.

September 21, 2015

Amal Clooney and a fellow human rights lawyer have accused Maldives’ officials of eavesdropping on confidential meeting during mission to troubled Indian Ocean islands Human rights lawyer Amal Clooney (R) speaks as co-counsel Jared Genser looks on at a press conference at the Kurumba Maldives resort on the Maldives island of Vihamanafushi  Photo: AFP   […]

Read More

Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers

September 10, 2015

A group of Russian hackers, most notably the Turla APT (Advanced Persistent Threat) is hijacking commercial satellites to hide command-and-control operations, a security firm said today. Turla APT group, which was named after its notorious software Epic Turla, is abusing satellite-based Internet connections in order to: Siphon sensitive data from government, military, diplomatic, research and […]

Read More

U.S., Tech industry fight over email privacy heads to appeals court

September 9, 2015

NEW YORK A U.S. appeals court on Wednesday will consider whether U.S. law enforcement can make American technology companies hand over customers’ emails held overseas, in a case closely watched by privacy advocates, news organizations and business groups. Microsoft Corp is challenging a U.S. search warrant seeking the emails of an individual stored on a […]

Read More

Uber hires the Jeep Cherokee hackers

August 31, 2015

The hack of a Jeep Cherokee was the most significant car hacking story to break recently. Now the guys responsible will work for Uber. Uber snatched up Charlie Miller and Chris Valasek, the hackers who exposed a serious security vulnerability in Fiat Chrysler (FCA) vehicles, which resulted in the first ever recall for potential car […]

Read More

Russia’s Greatest Weapon May Be Its Hackers

May 7, 2015

Newsweek In hacker jargon, it’s called a “cyber-to-physical effect.” It’s when a hacker reaches out from the virtual world into the real one—often with catastrophic consequences. The Americans and Israelis pioneered the technique back in 2009 when the Stuxnet program infiltrated Iranian computer systems and wrecked thousands of uranium-enriching centrifuges. But now other players—especially the […]

Read More

Woman arrested for Spying through webcams

May 2, 2015

The Royal Canadian Mounted Police has arrested a Canadian woman accused of remotely taking over victims’ PCs and spying on them using webcams. Canadian Federal police has arrested a woman last week that was accused to have hacked several computers to take over their webcams. The suspect is a 27-year-old woman that is the allegedly administrator […]

Read More

A little black box makes it easy to unlock almost any iPhone even when it’s secured with your fingerprint

March 19, 2015

YouTube/eoemccIt doesn’t matter whether you added your fingerprint to your iPhone — it’s still trivially easy for anyone to get past the login screen and access your emails and photos.The International Business Times reports that for just £120, anyone on the internet can buy specialist hardware that lets them hack into even the newest iPhones. […]

Read More

March 18, 2015

How Easy Is It For Hackers To Jack The Tower? Earlier this month the Government Accountability Office issued a 46-page reportoutlining security vulnerabilities in critical Federal Aviation Administration (FAA) systems. The report concerns the national airspace system (NAS) used to track and direct public and private aircraft. Many of these issues are common in all […]

Read More

Witnesses’ homes ‘bugged’ without authorisation

The former gardaí have also written to the Garda Commissioner Two former gardaí have told the Fennelly Commission they witnessed the unauthorised bugging of witnesses’ homes and at other sites as far back as 1992, RTÉ’s This Week has learned. Garda Commissioner Nóirín O’Sullivan has also forwarded the men’s claims to the Garda Síochóna Ombudsman […]

Read More

Could Cybercrime become more lucrative than drugs?

March 9, 2015

Adrian Leppard, the Commissioner of the City of London Police, says at least a quarter of organised criminals in Britain are now involved in online fraud A new sophisticated malware buy Regin has been detected by Symantec Photo: Alamy 12:01AM GMT 01 Mar 2015 International gangsters are increasingly abandoning drug dealing and other high risk rackets […]

Read More

Mobile Phone Signals in L.A. Intercepting by Drones

March 2, 2015

  Even before the Federal Aviation Administration unveiled its proposed regulations for commercial drone flights in the United States last week, one company was already at work, using drones to collect data from unsuspecting citizens in Los Angeles. Using a fleet of readily available consumer drones, AdNear – a Singapore-based location-marketing firm – was able […]

Read More

Hidden cameras that film injustice in the world’s most dangerous places

Oren Yakobovich: https://www.google.ie/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CCAQtwIwAA&url=http%3A%2F%2Fwww.ted.com%2Ftalks%2Foren_yakobovich_hidden_cameras_that_film_injustice_in_the_world_s_most_dangerous_places%3Flanguage%3Den&ei=2p30VNbFNqaQ7Absu4Eg&usg=AFQjCNGMkqKTusrlqvbRqaZuOp-ZFAsUqQ&sig2=Pwhz1H-P5LTTiR-t3Xdr2g Oren Yakobovich Human-rights activist Videre co-founder Oren Yakobovich wields the latest covert recording technology to expose and subvert violent oppression. Full bio This talk was presented at an official TED conference, and was featured by our editors on the home page.  

Read More

New Report Highlights China’s Cybersecurity Nightmare

February 22, 2015

The world is abuzz with reports that the U.S. government (specifically the National Security Agency or NSA) has found a way to embed its espionage programs within hard drives – making these programs undetectable to anti-virus programs and virtually irremovable even if detected. My colleague Franz-Stefan Gady has the details of the report over at […]

Read More

Employees smartphones bugged when traveling abroad

Officials at the departments of Justice and Homeland Security typically expect employees’ smartphones will be bugged when they travel overseas. So, they are experimenting with various ways to neutralize foreign spy gear. For years, the FBI has warned government and corporate executives not to use hotel Wi-Fi connections, because of reports that foreign travelers were […]

Read More

Banking trojan Dyreza generating ‘tens of thousands’ of malicious emails a day

February 19, 2015

Security firm warns that customers of NatWest, Barclays, HSBC and other British banks are being targeted by JavaScript malware The Dyreza banking Trojan generated 30,000 malicious emails in a single day. Photograph: Dominic Lipinski/PA British customers of banks including NatWest, Barclays and HSBC are being targeted by a wave of malicious emails attempting to install […]

Read More

The value of personal data in the criminal underground

February 15, 2015

Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the cashout process? What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these […]

Read More

Unauthorized workplace covert recording becoming a growing organizational threat

February 14, 2015

The growth of electronic and mobile listening devices has created a new threat to corporate data and trade secrets. Someone secretly records in your workplace. It could be an employee, a visitor, or an unknown with espionage or voyeurism in mind. Their tool could be a smartphone app, a recorder in a USB stick[i], or an […]

Read More

Cybercrime Statistics for Ireland

February 13, 2015

Hot on the heels of Safer Internet Day a new European wide survey conducted by Eurobarometer was released today. The survey asked various questions of people from across the EU on how cybercrime has impacted on their lives. The survey makes for interesting reading, in particular in relation to the data focusing on Ireland. One […]

Read More