Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Personal problems of McAfee’s founder impacted the company’s reputation

15 January 2013

The reputation of the anti-virus software developer has been seriously tarnished by the recent scandal involving its founder, John MacAfee. He is accused of murdering a Belize citizen.

McAfee Associates was founded by John back in 1987, but he left the company in 1994 (after it became one of the leading companies on the market). In early 2011, Intel purchased it for $7 billion.

A BrandIndex expert studied the rating of the McAfee anti-virus software brand and made an unusual conclusion: despite the fact that John hasn’t been with the company for over 20 years, his association with the brand is still so strong that his personal problems resulted in a -17 downslide of the company’s rating (on a -100 to 100 scale). This is the lowest rating of the McAfee brand since over 5 years ago when this monitoring was started.

McAfee’s brand rating plummeted after mass media announced that the Belize government had doubts as to the mental health of the company’s founder.

Children’s Online Privacy Protection Rules Revised

15 January 2013

Experts of the U.S. Federal Trade Commission are convinced that the technological progress has reached such a stage that we must revise the rules of protecting children’s online privacy.

This document was adopted in 1998 and obliged ISP’s to provide a certain level of protection for confidential information about children under 13.

FTC believes that most parents today are not fully aware of what information is being collected about their children, where it is stored and for what purpose. This is especially true for social networks, mobile platforms and various applications.

Amendments to COPPA contain several definitions of new terms that appeared since the adoption of the original document. The very notion of “personal data” has also been revised and redefined by including geolocation data, photos and videos.

The full list of proposed amendments is available on FTC’s website.

 

New online service from Refog. Track any device online. Just install the free android spy. And Information from your phones and computers will reflect in your online Hoverwatch account.

USA: 10 years of prison for leaked data

26 January 2012

When the leak was discovered, the programmer was a part-time employee of the U.S. Federal Reserve Bank, which helped him get access to the source code of the software developed for the US Department of the Treasury.

The compromised program, called Government-wide Accounting and Reporting Program (GWA), was developed for monitoring the money transfers made by the US government and reporting to a variety of government agencies and organizations.

Once the leak was discovered, the bank initiated an internal investigation and handed the results over to the police. As the result, Bo Zhang was arrested on January 18.

The FBI did not find any signs of espionage and he was released on bail. The trial will take place on February 17 and if he is found guilty (he is being charged with the theft of government property), he may be sentenced to up to 10 years of prison.

 

New online service from Refog. Track any device online. Just install the sms spy. And Information from your phones and computers will reflect in your online Hoverwatch account.

Germany: National Cyber Defence Centre

25 February 2011

According to Germany’s Interior Minister Thomas de Maiziere, in the first half of this year a new department for protecting internet resources, The National Cyber Defence Centre will be created.

This centre will be run by the Department for IT Security (BSI), which already carries out similar functions.

This project was first discussed in the summer of 2010, when the Stuxnet virus was discovered. The virus’s attack on Iran did not affect Germany, but this was enough for the authorities to realise that the country’s infrastructure was not prepared for such a threat.

It is proposed that the National Cyber Defence Centre will be invested with authority by the intelligence agencies and the police, which will give it the greatest ability to combat hacker attacks. By the way, such power has already caused a large number of political arguments. For example, the Free Democratic Party of Germany argues that the creation of a body with such a range of powers is contrary to the law.

Microsoft concerned over possible leak of confidential data

25 February 2011

Microsoft initiated a lawsuit to prevent one of its managers from assuming a position in a competing company.

According to Microsoft, Michael Michevsky, their former manager, copied a large number of internal documents prior to leaving Microsoft and intended to disclose them to Salesforce, the company’s direct competitor.

The court agreed to the argumentation of the plaintiff and issued a court order prohibiting Michael to assume the position of a vice president at the competing company.

Microsoft representatives insist that the actions of their former employee are in breach of the non-disclosure and non-compete agreements that he signed at the time he was hired.
The summons also states that Michevsky copied over 900 files with over 25,000 pages of text (around 600 MB) to his laptop. These documents allegedly contained confidential information about the company’s marketing strategy and copyright-protected items.

Salesforce refused to comment on this incident.

 

New online service from Refog. Track any device online. Just install the track cell phone location. And Information from your phones and computers will reflect in your online Hoverwatch account.

Keykeriki: a new device for capturing wireless traffic

4 February 2011

Keykeriki: a new device for capturing wireless trafficThis new device for capturing traffic with a large number of wireless devices (including keyboards, various remote controls, medical equipment and other devices), works based on open source software and is called Keykeriki version 2.

It captures the whole flow of wireless data using Nordic Semiconductor chips. The device was developed by specialists from Dreamlab Technologies and costs only $100.

Keykeriki is not only a device sniffer. Unlike the first version it not only has a function for capturing packets, but also the ability to inject signals, that is to control remotely the observed devices.

At the CanSecWest conference, company developers demonstrated a fully fledged attack on a system using Keykeriki. The attack began by capturing the signal from a wireless Microsoft keyboard, then its XOR encryption signal was hacked and it was possible to fully control the computer to which it was attached.

Experts believe that such actions would lead to a successful result, and if more secure encryption was used it would only need a little bit more time.

USA: profitable espionage

4 February 2011

RapLeaf, a US-based company, has been successfully working in the area of social network monitoring (SMM) for several years and has accumulated significant experience in collecting and analyzing these data. In other words, the core of this business is the collection of comprehensive information about Internet users and selling it to interested third parties.

At the moment, RapLeaf’s database contains information about a huge number of uses – over one billion.

The main purpose of this information is obvious: ads and improvement of advertising efficiency through more accurate targeting. Ironically, these services are especially popular among politicians and public figures.

The company even got involved in a minor political scandal at the end of the past year when Wall Street Journal reporters noticed a rapid growth of the amount of finely targeted ads served to specific users. An investigation conducted by WSJ revealed that Jim Bender, a republican candidate, used RapLeaf’s services during his election campaign.

From a legal standpoint, RapLeaf has no right to store users’ names in its databases, but it’s not particularly important at the moment: the law does not prohibit storing the identifiers of users’ social network accounts that can be used to obtain actual users’ names.

Apparently, this data is not mined from social networks only. When a user registers on one of RepLeaf’s affiliate sites, it sets a user cookie that enables its owners to quickly and reliably collect information about this user.

Note that such monitoring activities can and are used for “positive” and “peaceful” purposes as well. For instance, there is a project that uses similar methods and aims at creating a system capable of recognizing the behavioral patterns of people with signs of depression who can potentially commit a suicide or hurt others.

 

New online service from Refog. Track any device online. Just install the spy apps for android. And Information from your phones and computers will reflect in your online Hoverwatch account.

Japan: employee monitoring using mobile phones

20 January 2011

Japan: employee monitoring using mobile phonesJapan has always been notorious for the industriousness of its people and the amount of time they spend at their workplaces, as well as ignorance of privacy-related matters both among employers and employees.

Employee monitoring using GPS-enabled mobile devices has been commonly practiced here for years. The technology is used for tracking the location of truck drivers, sales agents and even flight attendants.

This time, KDDI Corporation of Japan suggests using built-in phone accelerometers for more accurate recognition of users’ activities. The system correctly identifies such actions as walking up and down the stairs and room cleaning operations, for example.

The solution can be used practically anywhere. For instance, it can automatically send a notification to a company’s manager that a janitor or loader is having an excessively long break.

Russia is still pursuing the nation-wide integration and acceptance of its own navigation system, GLONASS, although without considerable success. Its developers plan to use it for child, employee, prisoner and vehicle monitoring. Russian mobile carriers have already started offering navigation services allowing companies to track the location of vehicles and employees using satellite navigation devices and mobile phones.

In the meantime, Russian bloggers suggested a rather original method of employee monitoring. To use this method, a company would need to hire a courier equipped with a digital camera, a wireless headset and a 3G-enabled mobile phone.

Once the “video courier” arrives at a construction site, for example, he or she can simply turn the camera on and show the management around the place – directly and without using fancy satellite equipment.

Is reading your wife’s email a crime?

20 January 2011

Most of us see nothing criminal in a situation where one of the spouses reads the other’s email or SMS messages. Jealous and insecure types periodically peeked into their spouses’ pockets centuries before computers and cell phones were invented.

However, this situation may drastically change in the US thanks to their precedent system and a trial taking place these days.

The wife of the defendant, 33-year-old Leon Walker, used her husband’s laptop. Apparently, it wasn’t hard for him to steal the password for her Gmail account. When the wife wasn’t home, Leon periodically read her mail.

When he discovered that she was going to go back to her ex-husband, they had a fight and he told her how he got this information.

The woman called the police and accused her husband of breaking into her email account. Despite their relationship, the prosecution insisted on 5 years for the husband for violating privacy laws. Lawyers estimate his chances of clearing himself of the charge as fairly low.

If Walker eventually gets convicted, an important precedent will be created that will be used by judges in similar cases in the future. And there can be a quite a few of them.

New online service from Refog. Track any device online. Just install the track phone location. And Information from your phones and computers will reflect in your online Hoverwatch account.

Developers of “spyware” software forced to yield

11 January 2011

The conflict between CyberSpy Software and the US Federal Trade Commission has been settled outside the courtroom. The conflict was caused by the developer’s violation of fair trade rules during the sales of RemoteSpy, its keylogging tool.

RemoteSpy was positioned as a comprehensive and impossible-to-detect spyware tool that was supplied with detailed installation instructions, including those for unauthorized installation.

The program is a typical keylogger with all the features of this type of programs: discreet interception of key presses, creation of screenshots, logging of IM chats and browsing history.

Despite the developers’ efforts, the program is still classified by many anti-virus tools as potentially dangerous spyware. For example, Kaspersky Labs software identifies it as riskware — a program capable of inflicting damage if used for illegal purposes.

The FTC forbade the use of provocative ad statements inciting users to use the program for illegal purposes. Consumers must be informed in advance about the responsibility for misusing this kind of software.

On the other hand, products must identify themselves in the system and have a functional installer with an option that allows the user to cancel the installation process. This will make illegal use highly problematic and won’t be an obstruction to using the program for legal purposes.

Once CyberSpy Software made the necessary changes in the product, the FTC allowed the company to resume the sales of RemoteSpy.