Apple’s T2 Chip Could Help to Prevent Eavesdropping

November 13th, 2018|

The Apple T2 chip is Apple’s 2nd generation custom security chip for Macs that provides new security features that could help prevent potential eavesdropping. The new chip has been slowly making its way to Apple’s latest devices, the most recent being the newly announced updated MacBook Air and Mac Mini.

The official ‘Security Overview’ document was recently released by Apple here and provides a comprehensive insight into the specifications and functionality of the new T2 chip. …read more

Not all Two Factor Authentication is Secure

October 18th, 2018|

Earlier this year, the online company Reddit announced that they had suffered a security breach in June. In the announcement, they stated some of their internal systems had been compromised and the attackers had gained ‘read-only’ access to these systems.

The site announced this breach through a post on their platform. They stated that they discovered the attack on June 19th and concluded it had taken place between June 14th and June 18th. In the post …read more

ERII Conference Award Winner: Best Presentation

October 2nd, 2018|

2018 ERII Counterespionage Conference

WINNER of “The Glenn H. Whidden Award for Best Presentation”.

JASON MILES DIBLEY; Technical Director, QCC Global Ltd.

“Device Deployment – What Are We Looking For? From Quick Plant to Deep Fit”

Are Fears Over Brexit Talks Being Bugged Warranted?

August 16th, 2018|

Earlier this week a story broke stating that the European Union’s Brexit negotiators feared they were being bugged by the British secret service. These fears were allegedly raised on July 13th during a meeting in the European Council by a top member of Michel Barnier’s Brexit negotiating team.

Suspicion arose after British negotiators supposedly attained the contents of a politically explosive slide presentation within hours of it being presented to a meeting of EU officials last …read more

Are Open Wi-Fi Networks Secure?

July 31st, 2018|

What’s the issue?

When looking to connect to an open Wi-Fi network at an airport lounge, local coffee shop, hotel etc, it’s important to understand the security risks involved with joining an ‘Open’ or ‘Public’ network and what can be done to help mitigate the risks to help keep your information safe. The WPA2 encryption standard used on most modern Wi-Fi networks has been exposed with a fundamental flaw that if exploited can allow an attacker …read more

Eavesdropping Devices Found in Restaurant

May 16th, 2018|

Police investigators believe two eavesdropping devices found inside a Europort restaurant placed on the underside of a table, could be related to comparable bugging cases in 2014 that targeted financial executives and prominent lawyers.

Past Devices

The two bugs discovered were reportedly alike another found underneath a table located in a boardroom in Atlantic Suites on Europort Avenue at the Gibraltar Financial Services Commission several years ago. The Eavesdropping devices were allegedly crude devices that could be …read more

Why are Illicit mobile phones rife in prisons?

December 19th, 2016|

On the surface, it is hard to understand how on Friday 16th December 2016 we could watch almost live video of prisoners rioting inside HMP Birmingham filmed by the prisoners themselves on illicit mobile phones.

1. Why are the prison authorities allowing illicit mobile phones in prisons?

2. Can nothing be done to find and remove illicit mobile phones from prisons?

There are simple answers to these questions, but ironically the simple answers are not easy to find …read more

Data Theft Problem

September 27th, 2016|

Quantifying the data theft problem is not easy to do, but the answer to the question ‘how much data actually gets stolen?’ is undoubtedly “more than we think”.

A.T. Smith, the assistant director of the United States Secret Service, estimates that in 2010, cyberthieves stole 867 terabytes of data from the United States, or nearly four times the amount of data that is held in the entire Library of Congress.

The US government is quick to point …read more

India vs. USA

August 19th, 2016|

It sounds a bit like David and Goliath, but the Indian Military Intelligence Service is alleged to be hacking into the emails of an official US commission focused on issues of cyber-security.

The Times of India reports that Indian military intelligence documents have been posted on the Internet which discuss plans to target the US-China Economic and Security Review Commission. The document alleges this is to be done using technical back-door hacks provided by mobile phone …read more

UK caught spying on Russia

July 10th, 2016|

The British have finally come clean regarding the ‘Spy scandal that rocked Russia’.

In January 2006 Russian television ran a report showing how a plastic fake rock containing electronic equipment had been used by British diplomats to receive and transmit information.

The Russians had alleged that officials from the UK embassy in Moscow were seen downloading classified data from a transmitter hidden in the fake rock, onto their palm-top computers.

The television report included hidden camera footage of …read more