David Canton - May 3rd, 2010
Internet cafes in the United Kingdom are the latest victims of privacy invasive counter terrorism measures. Scotland Yard recently asked Internet cafe owners to monitor customers’ use of public computers. The authorities are encouraging owners to check activity on their computers and keep an eye on any suspicious activity.
Yet police say it’s not about asking Internet cafe owners to spy on their customers.
David Canton - April 22nd, 2010
There is a lawsuit and a criminal investigation underway resulting from a school outside of Philadelphia that secretly took pictures of students with webcams on laptops supplied by the school.
The idea was to use the webcams only in cases where a laptop was reported stolen. It is alleged however that school officials turned on the webcams simply to spy on the students for their own curiosity.
GetConnected - April 13th, 2010
You may have seen it already, there is a hoax floating around the BlackBerry network.
They are using BBM (BlackBerry Messenger) to pass on a note suggesting that you must forward it on to your whole contact list. The message is not from Research In Motion (manufacturer of BlackBerry) and you should not forward it on to anyone if you do get it.
Greg Gazin - March 19th, 2010
While Vancouver 2010 brings up vision of Olympic Gold, for those in the field applied digital security it means something totally different. CanSecWest 2010 is a security and training conference that brings together industry speakers and luminaries for 3 days of leading edge presentations, an insight into emerging technologies and a look at some of the industries’ best practices.
Greg Gazin - March 8th, 2010
A downloaded Windows application that allows you to view the status of a battery being charged through Energizer’s Duo USB Battery Charger, Model CHUSB, contains a Trojan horse that creates a backdoor that can leave a Windows PC vulnerable to intrusions.
According to Symantec, the Trojan dubbed Trojan.Arugizer compromises a computer by allowing port 7777 to be left open inviting in potential hackers.
The file “Arucer.dll” created, during the installation process makes this access possible. It’s added to the registry run key, so every time you boot up the port is left open to possible unauthorized remote access.