How to Find Hidden Cameras and Spy Bugs (The Professional Way)

How to Find Hidden Cameras and Spy Bugs (The Professional Way)

Sweeping For Hidden Cameras & Devices Is Becoming A Necessity Just in the past couple of years, we have seen a rise in hidden cameras and spy gear being used in nefarious ways, targeting guests that stay on cruise lines, in hotel rooms, Airbnb houses, the list goes on.

Project Alias Prevents Alexa And Google From Eavesdropping On You

Project Alias Prevents Alexa And Google From Eavesdropping On You

There have always been concerns about smart speakers such as Amazon Echo and Google Home, listening to your private conversations at home or offices, all the time.

Researcher shows how popular app ES File Explorer exposes Android device data

Researcher shows how popular app ES File Explorer exposes Android device data

Using a simple script he wrote, Robert demonstrated how he could pull pictures, videos and app names — or even grab a file from the memory card — from another device on the same network.

A brief history of wi-fi privacy vulnerabilities

A brief history of wi-fi privacy vulnerabilities

Tracking devices by the SSIDs in their probe requests It’s not just a device’s MAC address that can give away its identity. Tracking devices by their IE fingerprints When the privacy implications of targeted request probes became widely appreciated, most new mobile devices stopped sending them altogether.

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

(Raybaby did not respond immediately to a request for comment.) Here are some of the newest technologies to track and care for your infant: Video and audio monitors The classic audio-based baby monitor has been upgraded through enhanced sound quality and range.

“Alexa, play some music” isn’t the only time Amazon is listening to you.

“Alexa, play some music” isn’t the only time Amazon is listening to you.

Now that you know that your voice recordings are being sent via the internet to a centralized location, you may have assumed Amazon will need to store that data for some period of time — for example, to use its Natural Language Processing algorithms to interpret your request for a weather report (or to buy a pizza), gather that information, and then send it back to your device for it to speak the response.

Testing your web browser for cryptojacking

Testing your web browser for cryptojacking

With the rise of cryptocurrency, cryptojacking has become very popular and many websites employ the use of scripts to use your computing device to mine for cryptocurrency. To take the free cryptojacking test visit

Reminder: All those “smart” devices are a growing security threat

Reminder: All those “smart” devices are a growing security threat

But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.

Privacy and elementary OS

Privacy and elementary OS

Some people coming from this world of vacuuming up data ask us: how does elementary know what features to develop, which areas to focus on, how many daily active users we have? Is elementary against responsible, privacy-first collection of useful data?

Package tracking app turns users’ devices into a bot farm, violates user privacy

Package tracking app turns users’ devices into a bot farm, violates user privacy

The app will then perform the tracking by sending a request to the courier’s API or website as specified by the instruction it received from the server, sending the results to the app’s server so it can display them to the user who’s actually registered that package for tracking.

State of mobile operating systems privacy in early 2019

State of mobile operating systems privacy in early 2019

Device IDs and targeting options Starting with the basics we have to take a look at how can advertisers, marketing platforms and app developers identify and target the users or their devices.

App Privacy Policy Generator

Link to privacy policy of third party service providers used by the app Log Data {{iOrWe | capitalize }} want to inform you that whenever you use {{myOrOur}} Service, in a case of an error in the app {{iOrWe}} collect data and information (through third party products) on your phone called Log Data.

App Analysis: Air Canada

App Analysis: Air Canada

Air Canada screenshots showing both passwords and credit card information Transparent black boxes By attempting to implement the black boxes, Air Canada implicitly acknowledges that various fields within their app will contain sensitive data and that this data should not be captured in screenshots.

This data-stealing Android malware infiltrated the Google Play Store, infecting users in 196 countries

This data-stealing Android malware infiltrated the Google Play Store, infecting users in 196 countries

Powerful Android malware capable of snooping on user location, communications logs, and stealing files and account credentials has been downloaded by at least 100,000 users around the world after successfully infiltrating the Google Play app store.

Changing Your DNS Settings on Windows 10

Changing Your DNS Settings on Windows 10

It’s really easy to change the DNS server and by doing so, you can enhance the privacy and security (and speed, to some extent) of your device.

Is FIDO the future instrument to prove our identity?

Is FIDO the future instrument to prove our identity?

Posted: by Pieter Arntz FIDO, short for Fast IDentity Online, is an industry consortium started in 2013 to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords.

How to Know if You’re Being Tracked on the Internet

How to Know if You’re Being Tracked on the Internet

How to stop my device from listening to my conversations Visit the app permission section on your phone and revoke mic permissions. Once you’ve updated the software, install a good anti-spyware app on your device.

4 Top Tips for Secure Web Browsing

4 Top Tips for Secure Web Browsing

When you log into your bank account from a mobile device or exchange personal information via email, it’s all browsing activity that needs to be – but isn’t always – secure.

Taking a Look at MicroG

Taking a Look at MicroG

I found a well-written guide by a user on the XDA Developers forum for those who want MicroG on their non-LineageOS devices. MicroG is a replacement for the proprietary Google Services found on most Android devices.

Google wants to spy on everything you do at home, in every room (including the bathroom), to help “improve” your family

Google wants to spy on everything you do at home, in every room (including the bathroom), to help “improve” your family

Today’s “smart speakers” monitor and analyze only sounds, while Google’s futuristic automation system wants to measure everything: “acceleration, temperature, humidity, water, supplied power, proximity, external motion, device motion, sound signals, ultrasound signals, light signals, fire, smoke, carbon monoxide or other gas, global-positioning-satellite (GPS) signals, radio-frequency (RF), other electromagnetic signals or fields, or the like.” The patent helpfully walks us through various applications of all this technology.

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

The GZ501W model camera contains a shared, hard-coded Amazon S3 credential used for storing saved video data in the Amazon cloud – so all users of the Guardzilla All-In-One Video Security System have the same password, and thus can access each other’s saved home video.

Security flaws let anyone snoop on Guardzilla smart camera video recordings

Security flaws let anyone snoop on Guardzilla smart camera video recordings

Guardzilla were given three months to fix the security lapse and roll out new firmware to affected devices after the researchers privately reached out, but the company neither acknowledged nor patched the issue, prompting the researchers to go public with their findings.

The official release of AdGuard DNS — a new unique approach to privacy-oriented DNS

The official release of AdGuard DNS — a new unique approach to privacy-oriented DNS

And if there is a difference for you, you probably know the answer anyway :) AdGuard DNS recently added DoH support, which brings our service to the forefront of privacy protection.

We’re Suing the Government to Learn Its Rules for When It Hacks Into People’s Devices

We’re Suing the Government to Learn Its Rules for When It Hacks Into People’s Devices

Given the serious issues at stake, the public has a right to know the nature and extent of the government’s hacking activities and, importantly, the rules that govern these powerful surveillance tools.

Apple received over 32,000 user data requests in six months

Apple received over 32,000 user data requests in six months

According to the report, which covers the first half of this year, Apple received 32,342 demands for user data from governments -- up 9 percent from the previous period -- spanning access to 163,823 devices.

On Ghost Users and Messaging Backdoors

On Ghost Users and Messaging Backdoors

Indeed, Levy and Robinson make a concrete proposal in the article above: they offer a new solution designed to surveil both encrypted messaging and phone calls. Due to this need for extensive server and client modifications, the GCHQ proposal actually represents a very significant change to the design of messaging systems.

Sick of the NSA Tracking You? Burn Them with a Burner Phone

Sick of the NSA Tracking You? Burn Them with a Burner Phone

Third parties can still geolocate burner users by accessing a phone’s GPS and WiFi. Prepaid phones can also be tracked using the traditional, albeit less-accurate, method of cellular triangulation. The actual phone number for a GSM mobile device is attached to the SIM card.

How To Secure Your Devices Before Travelling

How To Secure Your Devices Before Travelling

Wipe the phone clean and throw it away BEFORE you come home, so you don’t bring any spyware back with you. Take a backup of important documents and wipe the devices clean when you come back.

On Ghost Users and Messaging Backdoors

On Ghost Users and Messaging Backdoors

(Certain designs like Signal are already hardened against these changes, because group chat setup is handled in an end-to-end encrypted/authenticated fashion by clients, and the server can’t just insert users.

How to Purify Your Device After Clicking a Phishing Link

How to Purify Your Device After Clicking a Phishing Link

Once you’ve realized that you clicked on a phishing link, the first thing you should do is disconnect from the internet. Next, install it on your suspicious device, ignoring any prompts to connect to the internet to update the program.

More