blog trackingRealtime Web Statistics phone Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘phone’

HCandroiddock: Android Phone Charger*

HCandroiddock: Android Phone Charger*

The new HCAndroidDock is the perfect accessory to for charging your phone while keeping an eye on an entire room. This simple, nondescript dock has a microUSB port that will fit most Android smartphones. While it’s charging you can record clear 720p video right to the MicroSD card (not included). Because it plugs in there is no need to worry about battery life. The motion-detection mode also means you don’t have to sift through hours of blank video. The included radio remote makes operation quick and easy.

Features

  • Designed for Samsung Galaxy smartphones*
  • Tiny pinhole camera hidden in phone dock – allows for continual power while remaining covert
  • Working charging station
  • Motion detection
  • Automatic overwrite
  • Remote control operation
  • Time/Date stamp

Technical Specs

  • Video Resolution: 1280 x 720 @ 30fps
  • Video Format: AVI (H.264)
  • Viewing Angle: 120° Wide Angle
  • Motion Detection Distance: Up to 6 meters
  • Storage: MicroSD card up to 32GB
  • Storage Consumption: ~1GB consumed every 20 minutes
  • Min Lux: 1.5 Lux
  • Working Voltage: 5V
  • PC Interface: USB 2.0
  • Main unit is 2.75″ X 2.75 ” x 1.25″ (tallest point)

Includes

  • 1 x Android phone adapter
  • 1 x microUSB cable
  • 1 x AC adapter
  • 1 x Radio Remote Control
  • 1 x instruction Manual
  • 1 x USB card reader for microSD

Compatible With

  • Windows up to Win8
  • Mac

 

*Please note the following:

  • While this dock works best with Samsung Galaxy smartphones, other phones are compatible provided they have a microUSB charging connection. Because of the variation in cellphone design, the orientation of other phones when connected to the dock may be awkward.
  • If power is interrupted, the time and date may need to be reset.

 

View full post on Become007.com

LMGSMSafe: Cell Phone Frequency Monitor

LMGSMSafe: Cell Phone Frequency Monitor

Cellphones are everywhere these days! A new, unfortunately common, kind of spying is quickly becoming easier to execute and harder to detect. Modern Smartphones are much closer to computers than phones and, just like computers, they can be compromised. This means that even if your phone is not in use or even completely turned off it is still possible to activate the microphone and transmit that data anywhere in the world.

 

That’s where the brand new LMGSMSafe works best. Simply place your cellphone in the box and the LMGSMSafe turns on and immediately starts monitoring all transmissions your phone makes and notifies you with the easy to understand LED. The LMGSMSafe will detect GSM CDMA850 3G (UMTS) and Bluetooth signals so you’ll know exactly when your phone uses any of these communication protocols.

 

In the event that a signal is detected the LED will flash the color associated with that protocol. You also have the option to create white noise and completely mask any sound the phone’s microphone may hear.

 

Features

  • Simple operation
  • White Noise Generation
  • 10 to 15 days of battery life with moderate use with 2 AAA batteries
  • Attractive wooden exterior perfect for desks

 

Technical Specs

  • Range: GSM 900/1800 CDMA850 WCDMA2100 (3G UMTS) Bluetooth
  • Battery Life: 5 – 15 days depending on use
  • Dimensions: 3.75″ x 2.875″ x 4.125″
  • Maximum internal width: 2.875″ (70 mm)

 

Includes

  • 1 x LMGSMSafe
  • 1 x Low profile screwdriver
  • 2 x AAA batteries
  • 1 x Instruction Booklet

View full post on Become007.com

9-year-old CEO warns crowd of phone hacker dangers

Source: National Cyber Security - Produced By Gregory Evans

Meet Reuben Paul. The Harmony School of Science third-grader has accomplished more in nine years than some adults accomplish in a lifetime. “He’s pretty well known in the computer security industry, you know, I think if you track computer security in general, people are going to know about Reuben, he’s been a keynote at a number of other conferences, so he definitely has the chops, ” said Richard Stephens, Organizer of “Security B-sides” Conference. Friday, he was the keynote speaker at the conference at the Wingate in Round Rock. The conference aims to make everyone more aware of hackers. “We’re looking to promote cyber security, promote computer security, to a younger generation,” said Stephens. Reuben showed guests the few steps it takes to hack into an Android phone, from an effort to download what looks to be a “real” game. After taking a quick break he was right back at it. The crowd couldn’t believe how easy he made the task look simple. His parents say they knew at the tender age of five , his child was special. “He’d use the words like “firewall” and things like that and repeat them back to me. First I was totally surprised. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 9-year-old CEO warns crowd of phone hacker dangers appeared first on National Cyber Security.

View full post on National Cyber Security

Hotel My Telephone Temporarily Moves Your Quantity to A different Phone

Source: National Cyber Security - Produced By Gregory Evans

iOS/Android: It happens to the most effective of us: you neglect your telephone when you go out, or it runs out of juice. Hotel My Phone lets you use a friend’s telephone, but still use your phone quantity. When you want to borrow a person else’s phone, all you do is log in to your Hotel My Telephone account on their phone. You’ll commence receiving SMS messages and telephone calls on that phone. They’ll also shop your speak to list on their server (study the privacy policy initial), but that’s optional. Each phones require to have Hotel My Phone installed in advance, so it isn’t fantastic in just about every predicament, of course. It is unlikely you’ll randomly locate a stranger willing to install this app to enable you out. It’s great for you and your spouse, or when you have a perform and a private phone. When you are in a bind, you can switch numbers devoid of possessing to switch phones. I tried this with a spare pay-as-you-go phone and it worked fantastic when my iPhone was getting repaired. Calls inside your “friend network”—people you’ve pre-authorized—are no cost. Otherwise it’s $1.00 every single time you use an individual […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hotel My Telephone Temporarily Moves Your Quantity to A different Phone appeared first on National Cyber Security.

View full post on National Cyber Security

Detective ‘cell siting places phone near crime scene’

Source: National Cyber Security - Produced By Gregory Evans

A detective has told how cell siting technology has placed the mobile phone of a man accused of murder in the vicinity of the scene on the night, a court heard. Jason Taylor, 21, of Westfield, Lostock Hall, denies murdering Adam Wilson, 25, in a knife attack at his ex-girlfriend Jodie Emery’s home on September 22 last year. Preston Crown Court previously heard he left his phone at her house on Albrighton Crescent – but returned after the alleged attack and asked for it. DC Paul Hope, of Lancashire Police, told Preston Crown Court cell siting was his area of expertise. He explained his interpretation of the findings of a survey of ingoing and outgoing calls and texts to and from Taylor’s mobile on the night in question, as well as 
wi-fi hotspot connections. The court heard the evidence, which involves pinpointing the phone’s location by using data from mobile phone masts, indicated Taylor’s phone was in the vicinity of Greenfield Drive, where his mother lives, earlier in the evening. However, a 40-second phone call made from his phone to Jodie Emery’s, at 10.46pm, showed his phone had moved to the direction of her home at Albrighton Crescent, where the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Detective ‘cell siting places phone near crime scene’ appeared first on National Cyber Security.

View full post on National Cyber Security

Sunday Mirror reporter apologised to two victims of his phone hacking

Source: National Cyber Security - Produced By Gregory Evans

The Sunday Mirror’s former in-house phone hacker met the BBC executive Alan Yentob and actor Lucy Taggart to express his regret at snooping on their voicemails, the high court in London has heard. Dan Evans revealed that he met the pair to apologise for hacking their phones on a near-daily basis when he worked for the Sunday tabloid between April 2003 and December 2004. “I’ve had a face-to-face meeting with two of the individuals concerned where I was able to express my deep, deep regret. I would be happy to speak to anybody who wanted to speak to me,” he told the court on Thursday. Evans, 39, was handed a 10-month suspended prison sentence last July after pleading guilty to intercepting voicemails. The journalist, who left the Sunday Mirror to work for the News of the World in early 2005, said that he met Yentob and Taggart, a former EastEnders actor, on separate occasions. On meeting Yentob, Evans said it was “a case of meeting the gentleman, being able to look him in the eye and say I’m very sorry”. Giving evidence in a clear, calm voice from the witness box of court 15 at the Royal Courts of Justice […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Sunday Mirror reporter apologised to two victims of his phone hacking appeared first on National Cyber Security.

View full post on National Cyber Security

Sadie Frost: phone hacking wrecked my life

Source: National Cyber Security - Produced By Gregory Evans

The actor Sadie Frost has described how phone hacking by journalists wrecked her life, causing her to fall out with her best friend, Kate Moss, and suspect her mother of selling stories to the press. Giving evidence at the high court in London, Frost said she became a nervous wreck and was afraid to leave the house for fear of being pursued by photographers. “It is difficult to explain the damage this has done to me. For many years, I was in a living hell,” she said in a witness statement. “I was suffering from depression, anxiety and regular panic attacks. I found it hard to leave the house and, if I finally made myself, I was followed … or they [the photographers] would turn up where I was going. This made my anxiety even worse.” Frost is one of eight phone-hacking victims, including the ex-footballer Paul Gascoigne, suing the Daily Mirror, Sunday Mirror and the People publisher Mirror Group Newspapers (MGN) for damages. Frost said she had lost three or four years of her children’s lives due to being hounded by the paparazzi every time she left the house. Maintaining her composure in the witness box, she said in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Sadie Frost: phone hacking wrecked my life appeared first on National Cyber Security.

View full post on National Cyber Security

Fairfield communities use mobile phone app to help fight crime

People in Fairfield are taking action to keep their families out of danger. When they use their cellphones, they’re doing much more than texting. Neighborhood watch-groups are turning-to ‘technology’ to fight crime. You’ve heard it before, “there’s an app for that!” People living Fairfield’s Fair Oaks, Glen Oaks, Forest Hills and Cambridge communities are using an app called Group Me. The app allows users to post messages, upload pictures and alert each other when bad guys roam their neighborhoods. “We get complaints all the time about people running these stop signs, said Forest Hills Neighborhood President Charita Cadenhead. Outside the zooming of cars, Cadenhead considers her neighborhood quiet. “In Forest Hills, it’s still very aesthetically pleasing. I like that about it,” added Cadenhead. But, she’s seen an uptick in crime. “So we are doing what we can to get to know one another. When neighbors get to know one another, we communicate more about what’s going on in the neighborhoods,” added Cadenhead. Cadenhead, and three other neighborhood watch presidents, put Group Me in the hands of homeowners concerned about crime. “They actually track it from block to block and say it’s over here now or I just saw it there […]

View full post on National Cyber Security

The NSA failed to hack your phone

nsa

Source: National Cyber Security - Produced By Gregory Evans

Gemalto, the world’s largest manufacturer of SIM cards, said it believes it was jointly hacked by U.S. and U.K. spy agencies. At the time of the attacks in 2010 and 2011, Gemalto was unable to identify the perpetrator, “but we now think that they could be related to the NSA and GCHQ.” However, the attack “could not have resulted in a massive theft,” the company said in a statement. Gemalto released on Wednesday the results of an internal investigation after media reports last week claimed the NSA and its U.K. counterpart hacked into the company to get hold of encryption keys that allowed access to SIM cards around the globe. Related: Super-sneaky malware found in companies worldwide The attacks breached Gemalto’s office networks and attempted to intercept the encryption keys. But it ultimately failed, due to a secure transfer system Gemalto had in place. Plus, the company said that even if the encryption keys had been stolen, the spy agencies would only have the ability to spy on communications over 2G mobile networks, as 3G and 4G networks “are not vulnerable to this type of attack.” Based in the Netherlands, Gemalto reportedly makes two billion SIM cards per year. Clients […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The NSA failed to hack your phone appeared first on National Cyber Security.

View full post on National Cyber Security

US wants to hack your phone because it doesn’t have real spies it needs

index

Source: National Cyber Security - Produced By Gregory Evans

 Powered by Max Banner Ads  As Google’s Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of “Loozfon” and “FinFisher,” the FBI’s Internet Crime Complaint Center issued an alert to help defend against the threat. “Depending on the type of phone,” the FBI said, “the operating system may have encryption available. This can be used to protect the user’s personal data.” How times have changed. Last fall, when Apple and Google announced they were cleaning up their operating systems to ensure that their users’ information was encrypted to prevent hacking and potential data loss, FBI Director James Comey attacked both companies. He claimed the encryption would cause the users to “place themselves above the law.” The tech community fired back. “The only actions that have undermined the rule of law,” Ken Gude wrote in “Wired,” “are the government’s deceptive and secret mass-surveillance programs.” The battle resumed in February 2015. Michael Steinbach, FBI assistant director for counterterrorism, said it is “irresponsible” for companies like Google and Apple to use software that denies the FBI lawful means to intercept data. Yet the FBI does have a lawful means to intercept it: the Foreign Intelligence […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post US wants to hack your phone because it doesn’t have real spies it needs appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 2412345»1020...Last »

My Twitter

Gregory D. Evans On Facebook

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!