Home » Countersurveillance » Articoli recenti:

Clusit warns: dangerous escalation of cyber attacks all over the world!

cybercrime

In the newest 2018 report of Clusit, the Italian Association dealing with information security, it appears a really worrying state of affairs: between 2011 and 2017 have been occurred almost 7,000 serious cyber attacks all over the world, 1,100 of which only in the past year. Furthermore, also in 2017, we have seen an intensification of cyber attacks that we can define as important from a qualitative point of view, so much to push rapporteurs into asserting that “the 2017 has been the year of Malware triumph as well as of those industrialized attacks realized on a planetary scale against multiple targets “.

The attacks against companies, institutions, or people in general, have suddenly jumped from 11% of 2016 to 28% of 2017, totally about 240% more than those ones occurred in 2011, the first year of Clusit’s studies. Even Italy, usually considered at a low risk of cyber hacking, has risen to the headlines for hacking incidents, like the attack made on Foreign Ministry, the one that hit the Department for Public Administration, the malware phishing which involved over 200thousand people or the theft of almost 200million cryptocurrencies from an Italian Exchange.

In general, the main victims of the mentioned cyber attacks have been banks, financial institutions, health, education, hardware/software industry and governments, in this latter case straddling the American and French presidential elections. About economic impact the global costs generated by cybercrime have gone indeed from 100billion dollars of 2011 to over 500billion of 2017. So what about the types of viral attacks? On this point it is worth stressing the huge increase of Malware (over 94% more than those occured in the last year if compared to 2016), Account Cracking (+13% approximately), Phishing and Social Engineering (+34% approximately), and Multiple Technique / APT (almost 7% more on average). Clearly in the report there will be found other important informations you can read by downloading it from the Clusit website.

Actually what we would outline here is a worrying picture that comes out of the phenomenon, so much to force ourselves to consider the anti-hacking defense tools a top priority for the years to come. In other words, you can’t turn a blind eye to problem anymore! Maybe the vast majority of cyber security tools put in place so far by companies or institutions have not been as efficient as we thought. For the same reason we will never insist enough on matter reaffirming that actually the right solution is on hand. Perhaps, what is needed is just a little more technological “literacy” so that to identify the right instruments to achieve our security objectives.

Cryptocurrency: beware of mobile security threats!

febbraio 14, 2018 Countersurveillance No Commenti
secure-mobile-phone-cryptocurrency

The past year has been one of the worst ever affected by mobile piracy, especially in financial and cryptocurrency fields. Well, no wonder, cause the creation of new financial products is often accompanied by frauding behaviour.

A new survey can help us understand the emerging “cybercrime” phenomenon

According to a survey involving 410 participants (mostly security managers) conducted by Check Point Software Technology, a leader company in cybersecurity market, in the last year 2 companies out of 10 have been hit by hacker attacks of some kind against smartphones or other mobile communication systems. Not only. More than half of the respondents have been forced themselves to admit to being aware of the preponderance of data theft risk from mobile devices compared to desktop or laptop systems. A 60% of them have also raised doubts about the effectiveness of their security systems in preventing this kind of threat, either due to lack of budget or to not actually experienced personnel. In principle it has been emerged the need to use security tools, as well as more financial resources and qualified personnel to eradicate mobile hacking phenomena once and for all.

Cryptocurrency. Mobile security is not properly its strength!

Let’s go back to talking about the sectors most affected by cybercrime, namely financial and cryptocurrency in particular. Well, on January 26 of this year, the japanese cryptocurrency exchange platform, Coincheck, revealed to the world they had been robbed of 523 million in NEM by hackers. This says a lot about dangers deriving from the incautious use of smartphones and tablets used in this kind of operations, aren’t you agree?

Don’t be concerned, the solution is at your fingertips

In order to low the risk of data theft from mobile devices, we have developed some encrypted smartphones for avoiding mobile hacking also in financial field. In particular Crypto CP-500 and Zimmermann Mobile have been proved to be effective in preventing fraud exploits coming along the management of cryptocurrency wallets, besides to ensure secure calls and messages. Put simply, we are finally in presence of two very effective devices, able to provide a total protection against the most common threats in mobile data theft.

How to protect your smartphone from being tapped using encryption tools

encryption-cell-phone-tools

Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to talk about all those security programs and devices which have proven a substantial effectiveness in mobile data protection: encrypted calls and text messages, safe virtual spaces, security apps, and many other defense tools that can really help you, provided you turn to competent companies which have been on the countersurveillance market for years. So our advice is always the same: beware of those unreliable vendors on the net!

Kind of data encryption softwares and anti-tapping mobile phones

Protection from illegal mobile phone data theft essentially moves in two directions:

  1. implementation of security apps running with data encryption algorithm;
  2. special mobile phones able to protect the phone from active and passive eavesdropping systems (i.e. GSM interceptor, IMSI catcher etc.).

The first group includes those kind of software/devices (eg encrypted cell phones) using an encryption system for secure sending and receiving of calls, email, SMS, and so on. In the second case we mean anti-tapping cell phones, also called stealth phones, able to protect the user by alerting him to possible interception attempts.

A defense helpful to anyone, even to optimistic people or occasional communicators!

At this point some of you maybe might reply: “Actually I don’t have important data to protect!” or: “Why do I have to use this software if I do not spend much time on cellphone?” Well, let’s just say that even when you surf the net via smartphone you are exposed to very high risks, especially if you attend social networks or visit on line shopping web sites. So again what about  mail messages affected by malicious viruses able to crash a whole mobile operating system?

In short, both whether you install them for defense or just ’cause you never know’, a security software or an anti-tapping mobile phone will help you to keep yourself away from many risky situations. To know more about the effectiveness of this incredible kind of products take a look at this page.

Protect yourself from illegal cell phone tapping!

safe-antitapping-cell-phone-stealth

If you are used to networking in search of easy solutions against the unauthorized phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one which concerns mobile network, has long since exceeded the limits, so much to induce public opinion to wonder whether it is still correct to talk about data confidentiality today. However, until to spy on each other are the world’s governments, it might not bother you at all, but what if you suddenly realize that the interceptor is the same fellow you cordially greets every morning with your best smile ever?

Maybe we are going a little bit too far. However, concerning business world, sometimes the problem proves to be dramatically real. Actually it is not uncommon to find glaring examples of unauthorized cell phone tapping in case of entrepreneurs spied on by evil competitors or business partners, as well as politicians tapped during electoral campaigns, or even manufacturing executives robbed of industrial, military or government secrets. Then you have been warned! Out there hidden in the ocean of bits and voice data, someone could be listening to your mobile conversations!

How does a mobile phone tapping operation carry out?

In intelligence field there are some equipments, such as the GSM Interceptor, which simply pretend to look like a GSM cell phone bridge, so that your cell phone will connect through the spy device instead of directly connect itself to the cell phone bridge operator. In other words, you come true the condition technically called “man in the middle”.

Untraceable anti-tapping mobile Stealth Phone: the real solution to finally get rid of these dangerous individuals

The undetectable mobile Stealth Phone is a normal GSM cell phone specially designed to protect you from any physical onsite mobile tapping. Not only. It also allows you to send or receive encrypted SMS available between two or more Stealth Phones, providing the user with a full-fledged defense against the pirates of phone privacy.

A Stealth Phone basically works on three levels:

  1. Checking and verification of connection between the cell phone and the network operator used
  2. Change of IMEI code (the univocal identification code of every mobile phones). When the IMEI changes actually it is as if you have got a new cell phone in your hands!
  3. Sending and receiving of encrypted text messages. This really provides a secure SMS communication channel.

In the light of what we just said, you should not be surprised that this awesome mobile phone has quickly become a standard in security of corporate, military, political or private mobile communications. So what more do you want from a smart device wich also warns you in time to block any cell phone tapping attempt?

Find out more on the untreaceable/undetectable mobile Stealth Phone!

Watch the video of STEALTH PHONE or sign up for
our Youtube channel in order to see all other product clips!

Calendar

agosto: 2018
L M M G V S D
« Giu    
 12345
6789101112
13141516171819
20212223242526
2728293031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018

gps-gprs-tracking-system

Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …