Experts warn of ‘epidemic’ of bugging devices used by stalkers

[section_tc][column_tc span=’12’][h_tc type=’1′][/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] More funding and legal powers are needed for police to stop a surge of stalkers using eavesdropping devices to spy on victims, experts have warned. By[nbsp_tc]James Hockaday[nbsp_tc]for Metro.co.uk [nbsp_tc] [/text_tc][spacer_tc pixels=’15’][/spacer_tc][image_tc url=’https://www.shapestones.co.uk/wp-content/uploads/2019/06/5.png’ timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′ target=’_self’][/image_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] [nbsp_tc] Firms paid to detect the bugs say they’re finding more and more of the devices which are readily available on online…

Why Do Ordinary People Commit Acts of Espionage?

[section_tc][column_tc span=’12’][h_tc type=’2′] Political ideology and money serve as motivators for some people to commit acts of espionage, but they’re not the only factors involved. By Jerad W. ALEXANDER [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] In mid-July, 2018, Mariia Butina, a 29-year-old assistant to the Russian central bank and long-time Vladimir Putin ally Alexander Torshin, was arrested in Washington, D.C., on a charge of “conspiracy to act as an agent of…

Are millennials keeping their data safe?

[section_tc][column_tc span=’12’][h_tc type=’2′] Norton reports one in three millennials use the same password for all accounts; 53 percent have shared passwords with friends or family. By DECCAN CHRONICLE [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] While the awareness level in millennials is high about the latest trends in technology and gadgets, it is alarming to see how the knowledge is not being translated well into practice, making them an easy prey for…

Govt to stop wiretap reform – Bonafede

[section_tc][column_tc span=’12’][h_tc type=’2′] Freezing of case time-outs after 1st ruling being considered[br_tc][br_tc]Redazione ANSA [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] (ANSA) – Rome, July 11 – Justice Minister Alfonso Bonafede said Wednesday that the government will sink a reform of the use of wiretaps in investigations that was approved by the previous centre-left administration. “The wiretap reform will be stopped because the modifications introduced appear a harmful step back on the road…

Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers

[section_tc][column_tc span=’12’][h_tc type=’2′] • We assess with high confidence that the Winnti umbrella is associated with the Chinese state intelligence apparatus, with at least some elements located in the Xicheng District of Beijing. • A number of Chinese state intelligence operations from 2009 to 2018 that were previously unconnected publicly are in fact linked to the Winnti umbrella. • We assess with high confidence that multiple publicly reported threat actors…

Somebody’s watching! When cameras are more than just ‘smart’

[section_tc][column_tc span=’12’][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] Every year the number of smart devices grows. Coffee machines, bracelets, fridges, cars and loads of other useful gadgets have now gone smart. We are now seeing the emergence of smart streets, roads and even cities. Devices such as smart cameras have long been part of everyday life for many, as communication devices, components in security and video surveillance systems, to keep an eye…

New LTE attacks open users to eavesdropping, fake messages, location spoofing

[section_tc][column_tc span=’12’][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit design flaws in the communications protocol and unsafe practices employed by the stakeholders and can be used to achieve things like impersonating existing users, spoofing the location of the victim device, delivering fake emergency and warning messages, eavesdropping…

Copyright © 2019 Shapestones Ltd. All Rights Reserved