Eavesdropping On Computers From Afar

When I teach Learning Tree’s Cyber Security introduction, participants are often amazed at the ways bad actors can eavesdrop on computers. Most of them are aware of software that can be planted by bad actors that can capture keystrokes, for instance, but few are aware that noises from keystrokes, the vibration of a notebook, and […]
Read More ›

Pssst, Wanna Hear a Secret – On My Mobile?

We all have secrets. We also know that if we share those secrets over our mobile devices governments can listen in. Now it seems governments and possibly hackers can take control of your phone using the phone’s own management software. I don’t think I’d use my mobile phone to communicate any secrets. But some clever […]
Read More ›

Eavesdropping On Mobile Phones And Why We Need To Keep On Our Toes

Most of us in North America, Europe and much of the rest of the world trust in the confidentiality of our conversations on our mobile phones. There are still places, though, where that’s not the case. In those areas mobile phones aren’t encrypted. When we use a phone in those areas we don’t bother to […]
Read More ›

Lookin’ Out My Backdoor

For the last two weeks or so news outlets in the US and UK (at least) have been filled with stories of government data collection. In the US this has been focused primarily on communication metadata – what numbers called what numbers when. There have been stories of tracking of Internet data and hints that […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.