A Kit Kat for your life?

July 2009 News & Events

In next month’s issue you will see a review I am writing about a new surveillance product from Space TV, as well as a potential review of a couple of IP cameras from other companies. I say potential as the person doing the camera review is having too much fun with the products to actually write something, but we will get there eventually.

The product I am reviewing is a watch. Not just any watch, it has the capacity to record hours of video surreptitiously as well as take pictures and simply copy the results to a computer at a later time via a USB cable. I was initially sceptical that the device would record anything that was usable, but I was wrong. More in the next issue.

The first point of mentioning the watch here is to highlight the amazing things that can be done in the security market by anyone. This watch can record a strategy plan, take pictures of contact lists and almost any kind of industrial espionage. Once you get the hang of it, you can get relatively good images without anyone knowing. I even told some people about the watch and showed it off while proceeding to ‘spy’ on them and record conversations and computer screens without their being in the slightest bit suspicious – perhaps I have an innocent face.

The second point to mentioning this now is to highlight how easy it is to steal information from a company without anyone being the wiser. If I can do an amateur job minutes after getting the device, imagine how simple it is for a skilled person with a budget to get any information they want.

How often do people walk away from computer screens with customer lists or invoices on the screen? How often do executives have loud conversations on cellphones or sit in the business lounge of any airport with sensitive data on their laptop screens available to anyone looking over their shoulder? Sure they look important to themselves, but they are suckers for information crooks.

The common comeback to this point of view is to question who will be following you around to get a little bit of data displayed on your screen or to find out when your next strategy meeting is as you scream it over your cellphone. Very true, but when collecting information, little bits collected here and there make a damaging whole when it is customers you are losing because a competitor suddenly knows your margins and undercuts you at every turn.

Of course, the idea of espionage may be a little farfetched and I may simply have raised it as a result of my playing with the watch. Why should I buy gadgets and follow you around or even hack into your server when a five-minute conversation with one of your staff members will get me their username, password and access to all I need. Social engineering works, almost every time.

There was a study in the UK a couple of years ago in which male commuters on London’s tubes gave a pretty woman their usernames and passwords just because they asked. The hard cases had to be bribed with a chocolate. A similar survey done more recently showed times have changed. Today you need to offer a slap-up dinner instead of a Kit Kat. Do not miss the next issue.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.