Homemade TEMPEST Receiver

Tom’s Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest programs and listen to what their own — and their neighbors’ — electronic devices are doing. Elliott, a researcher at Boston-based security company Veracode, showed that an inexpensive USB dongle TV tuner costing about $10… Continue reading Homemade TEMPEST Receiver

Alexa and Google Home phishing apps demonstrated by researchers

The researchers’ “Smart Spies” apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping. Continue reading Alexa and Google Home phishing apps demonstrated by researchers

Alexa and Google Home devices can be exploited to eavesdrop on users, phish passwords

Researchers have shown just how easy it is for third-parties to exploit the so-called “smart” speakers that many home owners have purchased to eavesdrop on conversations and even steal passwords and credit card details.
Read more in my arti… Continue reading Alexa and Google Home devices can be exploited to eavesdrop on users, phish passwords

I’m Back!

Dear blog readers – it’s been a while since I’ve last posted a quality update following my disappearance and possible kidnapping attempt circa 2010 but as many of you have noticed I’ve recently published a variety of research and CYBERINT type of artic… Continue reading I’m Back!

Facebook got humans to listen in on some Messenger voice chats

Facebook says it’s paused the practice of collecting voice clips and sending them to employees to transcribe and analyze. Continue reading Facebook got humans to listen in on some Messenger voice chats

Critical RCE Bug Found Lurking in Avaya VoIP Phones

The vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant’s most popular models. Continue reading Critical RCE Bug Found Lurking in Avaya VoIP Phones

Assessing the Recently Leaked FSB Contractor Data – A Peek Inside Russia’s Understanding of Social Network Analysis and Tailored Access Operations

I’ve recently managed to obtain a copy of the recently leaked FSB contractor data courtesy of 0v1ru$ and “Digital Revolution” and I’ve decided to take a closer look including an in-depth overview and discussion of the leaked data in the context of toda… Continue reading Assessing the Recently Leaked FSB Contractor Data – A Peek Inside Russia’s Understanding of Social Network Analysis and Tailored Access Operations