QCC is honoured to be able to announce our commitment to the Armed Forces Covenant, our pledge to those who serve or have served in the armed forces and their families. We endeavour to support members of the Armed Forces Community, to ensure that they face no disadvantage …read more
The Apple T2 chip is Apple’s 2nd generation custom security chip for Macs that provides new security features that could help prevent potential eavesdropping. The new chip has been slowly making its way to Apple’s latest devices, the most recent being the newly announced updated MacBook Air and …read more
Earlier this year, the online company Reddit announced that they had suffered a security breach in June. In the announcement, they stated some of their internal systems had been compromised and the attackers had gained ‘read-only’ access to these systems.
The site announced this breach through a post on …read more
2018 ERII Counterespionage Conference
WINNER of “The Glenn H. Whidden Award for Best Presentation”.
JASON MILES DIBLEY; Technical Director, QCC Global Ltd.
“Device Deployment – What Are We Looking For? From Quick Plant to Deep Fit”
Earlier this week a story broke stating that the European Union’s Brexit negotiators feared they were being bugged by the British secret service. These fears were allegedly raised on July 13th during a meeting in the European Council by a top member of Michel Barnier’s Brexit negotiating team.
Suspicion …read more
What’s the issue?
When looking to connect to an open Wi-Fi network at an airport lounge, local coffee shop, hotel etc, it’s important to understand the security risks involved with joining an ‘Open’ or ‘Public’ network and what can be done to help mitigate the risks to help keep …read more
Police investigators believe two eavesdropping devices found inside a Europort restaurant placed on the underside of a table, could be related to comparable bugging cases in 2014 that targeted financial executives and prominent lawyers.
The two bugs discovered were reportedly alike another found underneath a table located in …read more
On the surface, it is hard to understand how on Friday 16th December 2016 we could watch almost live video of prisoners rioting inside HMP Birmingham filmed by the prisoners themselves on illicit mobile phones.
1. Why are the prison authorities allowing illicit mobile phones in prisons?
2. Can nothing …read more
Quantifying the data theft problem is not easy to do, but the answer to the question ‘how much data actually gets stolen?’ is undoubtedly “more than we think”.
A.T. Smith, the assistant director of the United States Secret Service, estimates that in 2010, cyberthieves stole 867 terabytes of data …read more
It sounds a bit like David and Goliath, but the Indian Military Intelligence Service is alleged to be hacking into the emails of an official US commission focused on issues of cyber-security.
The Times of India reports that Indian military intelligence documents have been posted on the Internet which …read more