19 Jan: Who is Bugging Prezza? John Prescott Baffled After Finding a Tracking Device Hidden in His Jaguar

Who Is Bugging Prezza? John Prescott has launched an investigation into who has been bugging his beloved Jaguar.The former Deputy PM, dubbed 'Two Jags' for his love of the luxury model, was stunned to discover a tracker device planted under the driver's seat. The device also has a built-in microphone which means it could have been recording all of the Labour heavyweight's conversations. Lord Prescott has owned the car for several years but the bug was only discovered after he had problems starting it. He took it to a local garage and mechanics unearthed the 6-inch black box under the driver's seat. It uses mobile phone technology through a built-in SIM card to keep track of the car's every move. The 76-year-old told the Sunday Mirror: 'I've been told that whoever knows the SIM card that goes with the tracker can send out...

02 Dec: iPhone Spying: Russian Lawmakers Mull Parliamentary Alert

iPhone Spying: Russian Lawmakers Mull Parliamentary Alert Russian lawmakers having access to confidential information may be recommended no to use iPhones in their work and to switch to simple mobile phones using them only for phone calls. MOSCOW, December 2. /TASS/. Lawmakers from Russia's parliamentary lower house may be advised not to use iPhones over concerns that communications gadgets made abroad may not be secure. Instead, they would be urged to use the most basic mobile telephones. New law is being drafted to be submitted to Russia's parliament in coming days, Dmitry Gorovtsov, a State Duma deputy from the Just Russia political party, told TASS on Tuesday. Read more here.

26 Nov: Is Russia’s Cyberwar Heating Up Amid New Cold War?

Is Russia's Cyberwar Heating Up Amid New Cold War? A recent influx of reports about Russian electronic espionage activity has prompted fresh concerns that the Kremlin may be gunning for a cyberwar with the West. Not everyone is convinced: Russian IT analysts interviewed by The Moscow Times were more inclined to blame the spike in attack reports on media hype and cybersecurity companies exploiting clients' fears. But Russia's leading expert on domestic security services, Andrei Soldatov, said the pattern of the attacks indicated that the Russian government may be mounting a covert Internet offensive. Experts could not say, however, whether heavy guns with the FSB electronic espionage agencies have been deployed. "All government-linked attacks so far have been carried out by people on the market: the cyber-mercenaries," Soldatov, editor-in-chief of the Agentura.ru website, said Wednesday. Read more here.

24 Sep: FBI Warns of Rise in Disgruntled Employees Stealing Data

FBI Warns of Rise in Disgruntled Employees Stealing Data Wall Street Journal (09/23/14) Barrett, Devlin The FBI said Tuesday that it has seen a spike in the number of disgruntled employees who steal company information, sometimes as part of an effort to extort money from previous employers.  There have been cases in which individuals used their access to destroy data, steal software, obtain customer data, make unauthorized purchases, and gain a competitive edge at a new job, the FBI said. A common way to steal information, the FBI noted, is to use cloud storage accounts and personal e-mail. Sometimes, terminated employees still have remote access to the company's system. Organizations that have recently been victimized by data theft have suffered losses of $5,000 to $3 million. The FBI reports that some employees have attempted to extort their employer by restricting access to company...

01 Jul: Cyber TSCM – A Vital Part of Your Overall IT Espionage Prevention Plan

Cyber TSCM – A Vital Part of Your Overall IT Espionage Prevention Plan Corporate espionage is one of the most rapidly growing challenges corporations of all sizes must contend with. Corporate espionage, often referred to as industrial espionage, is espionage conducted for commercial benefit. It includes all manner of confidential information collection by illicit means including electronic eavesdropping/technical surveillance, HUMINT intelligence, cyber collection and related information collection by a person(s), entity(s) or country(s) for financial or other gain. Trade secret theft costs businesses throughout the world billions of dollars each year. The loss figures are staggering particularly in consideration of the current economic climate in the US, and subsequently the world at large. And, when the economic climate is challenging, trends indicate corporate espionage increases as businesses scramble to remain viable. Challenging economic climates make it increasingly more difficult to set aside resources...