We take a look a the NSA’s recently released document that covers tangible risks posed by the mobile technology, from smartphones and IoT devices to wearable gadgets and privacy breaching apps.
Even military hackers make OPSEC mistakes. I bring back the APT1 story in order to outline some bad OPSEC examples that you should avoid if conducting online investigations.
Tricky Thursday focuses on keyloggers. Keyloggers come in two types – hardware and software. Essentially, both types are digital surveillance tools that capture and record anything that you type on your computer’s keyboard. Check out my methods of detecting and defending against keyloggers.
A quick glimpse at various types of concealed cameras used for breaching privacy and illegal covert recording. Disturbing as it was, some of these were trending during the recent Black Friday and Cyber Monday sales.
Osint Me interviews Stella, an online safety professional focused on the human aspect of digital privacy. She was a victim of stalking, both in the cyberspace and in real life.