720-891-1663

Ya Know Those Stories About People Listening in on Your Microphone? Yup!

We often hear stories about people listening to you (eavesdropping) using your phone or PC’s microphone even when you think they are not. We usually attribute that to the “tin foil hat” crowd, but, apparently, that might be a bit optimistic. Researchers at U Wisconsin Madison and Loyola Chicago say that they tested the top […]

Continue reading → [DISPLAY_ACURAX_ICONS]

That App You Just Installed – It Might Be Listening To You

If you were not paranoid before, you may be now.  According to a lawsuit filed last month, the Golden State Warrior’s app turns on your phone’s microphone in order to figure out where the owner is, in order to serve ads to the user. The suit names the NBA team, Yinzcam, Inc., which developed the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Cop Accused Of Spying On Breastfeeding Mom

A Michigan woman is suing a police officer who used the baby monitor app on her fiance’s cell phone that he confiscated when the fiance was arrested, to spy on her while she was nude and breastfeeding her son. Note that nothing has been proved yet, so this is only claims and allegations, but it points […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Supreme Court Gives FBI Hacking Permission Via “Rule Change”

The Supreme Court, last week, gave the FBI permission to hack into any computer anywhere in the world with the stroke of a single pen. Ignoring, for the moment, whether other countries are going to think this gives them permission to hack into any computer in the U.S., this could be problematic. What is at […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researchers Discover Flaws That Allow Eavesdropping Of Cell Calls

Signalling System 7 or SS7 has long known to be vulnerable to hackers.  SS7 is the control system protocol that telephone companies use to route and transfer calls between companies and, in the cellular world, between towers. Since SS7 was designed in the early 1980s, no one was terribly concerned about security.  Hackers – or […]

Continue reading → [DISPLAY_ACURAX_ICONS]