Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 17 January 2013

Man Sends His Computer Security Token to China...

Posted on 13:12 by Unknown
...so he can outsource his job!

A security audit of a US critical infrastructure company last year revealed that its star developer had outsourced his own job to a Chinese subcontractor and was spending all his work time playing around on the internet.
 

Verizon investigators found that he had hired a software consultancy in Shenyang to do his programming work for him, and had FedExed them his two-factor authentication token so they could log into his account. He was paying them a fifth of his six-figure salary to do the work and spent the rest of his time on other activities...

Further investigation found that the enterprising Bob had actually taken jobs with other firms and had outsourced that work too, netting him hundreds of thousands of dollars in profit as well as lots of time to hang around on internet messaging boards and checking for a new Detective Mittens video. (more)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in business, dumb, employee, humor, password, weird | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • Digital Cameras Easily Turned into Spying Devices
    Newer cameras increasingly sport built-in Wi-Fi capabilities or allow users to add SD cards to achieve them in order to be able to upload a...
  • How secure is the Merkel-Phone?
    (Latest update: October 28, 2013) In an article by the German magazine Der Spiegel it was said that the NSA probably also eavesdropped on t...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Highly secure mobile phones
    (Updated: June 5, 2013) In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Theref...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ▼  January (40)
      • Dutch queen Beatrix' phone
      • Free Stuff Alert: Encryption / Compression Program
      • Who's Watching Your Webcam
      • FutureWatch: Dual Personality Smartphones
      • Security Director Alert: Free Anti-Theft Tracking ...
      • Today in Telephone History
      • Flip Phones Keep Japanese Wives from Flipping Out
      • If a tree falls in the forest, and nobody hears it...
      • Audio Steganography - SkyDe, as in Skype Hide
      • Who Is Tracking You On-Line - Infographic
      • Need an "I'm not here" outfit to go with the Myste...
      • The Mysterians and Question Mark...or viceversa?
      • Mr. Kiss Kiss Bang Bang and other Cold War Spy Toys
      • The Israeli prime minister's red phone
      • Foreign and Economic Espionage Penalty Enhancement...
      • Book: Britian's Brilliant Bugs Bomb Nazis
      • Man Sends His Computer Security Token to China...
      • The Suspected Fly on the Wall was a Horse
      • What Happens When You Lose A Cell Phone?
      • Cautionary Tale - Unsafe Sex, USB Style
      • Business Espionage: AMD v. Ex-employees
      • One in Four Android Apps Pose "High Risk" to Security
      • A White House staff phone
      • Stingray - Clandestine Cellphone Tracking Tool - F...
      • Van Eck Grown Up - Time to look at eavesdropping o...
      • 'Spy News from New York' shows off NYC
      • Business Espionage Alert: China Now Blocking VPNs
      • "1984" Gets a New Look
      • Investigative Journalist Finds Electronic Listenin...
      • Book Review - A Cybercop's Guide to Internet Child...
      • From those wonderful folks who brought you Godzill...
      • Larry Ellison's Sailing Team Gets Caught Spying - ...
      • Spies & SpyCams at the Supermarket
      • Computer Anti-Virus King Becomes a Spy?!?! ...you ...
      • Trakdot - Smart Baggage Surveillance
      • Apps for Investigators - Takes the legwork out of ...
      • Released: SpyWarn - Android Smartphone Anti-Spywar...
      • Security Director Alert - VoIP Phone Eavesdropping
      • Once upon a time... privacy was the norm.
      • Private Spy Drone Prompts Criminal Indictments
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile