Theft security & encryption - Security Discussion

I am stuck with what to do with my device when it comes to protection from theft.
On one hand I can encrypt my phone and if it's stolen I can be rest assured my data is protected.
On the other, I can leave my phone unencrypted and will be more likely to be able to track it using find my device, ceberus or similar.
I did some searching online and apparently the Police will take tracking apps seriously if it does get stolen.
On the other hand I feel like a thief is going to wipe a device if they steal it before they do anything else anyway.
Whats peoples take on this and how and why are they protecting their phone with an anti theft/encryption.
I'd be interested to hear how different people view the pros and cons.
Cheers.

Related

Theft alarm

Does any one know of a theft alarm that will give a warning when my mobile is away from the receiver (in my pocket) more than a certain distance? Maybe built on RFID technology or blue tooth?
Your question made me imagine a phone tied by a piece of string to one of your pockets, so if someone jerks it out without you noticing, it would also jerk your pants. lol
that would be the simplest solution; still, I prefer technology, a very tiny transmitter hidden in the mobile, preferably a passive RFID tag so it will not contain a battery which then will be paired to a receiver that can only detect this tag. If the mobile is out of range, a buzzer and vibrating alarm is activated in the receiver.
I know that this seems possible, however, current RFID readers are priced in Ks of $, and this will not make it feasible for every one to buy it.
There are some alarms in the market with the same idea but built on different technology, their problem is that the transmitter is noticeable and the thief can simply remove them the moment he picks the mobile.
http://www.tradekey.com/selloffer_view/id/887081.htm
ok so you are running late for work and forget to put the non mobile side of the detector on your person one morning, you get part of the way out the door up the street and your phone starts buzzing and beeping like crazy.... run back to pick up the chip???
yeah if you really want this that bad string sounds good.
cktlcmd said:
Your question made me imagine a phone tied by a piece of string to one of your pockets, so if someone jerks it out without you noticing, it would also jerk your pants. lol
Click to expand...
Click to collapse
Also, if the phone slip of your hand, the string will prevent it from drop to the floor. Not a bad idea, expecially you get two protections for the price of one.
If you carved some gooves into the side of the phone you could make a yoyo too.
come on guys, where I live, 3 out of 5 mobile owners had their mobiles theft at least once, if we use the string alarm, I imagine every one walking down the street is screaming out of pain because a thief tried to steal his mobile and had to let go when he found it stringed, this sudden release hearts I think
phones are considered disposable technology these days, i remember a few years back when insurance companies in australia use to offer insurance on phone theft but no one really bothered with it much.
if someone wants my phone badly enough to try and take it from my pocket i garentee there will be some sort of weapon involved and they will want my wallet and keys too and that being the case they can have it.
also considering that most people are aware that a phone can be tracked via the cell network who would buy it? its not like you will pay $50 down the pub for it knowing that someone would have reported it stolen and ur average thief aint smart enough to know how to change the IMEI number nor would anyone who is stupid enough to buy a $50 phone at a pub with half a string attached to it (LMAO)
st3v3 said:
phones are considered disposable technology these days, i remember a few years back when insurance companies in australia use to offer insurance on phone theft but no one really bothered with it much.
if someone wants my phone badly enough to try and take it from my pocket i garentee there will be some sort of weapon involved and they will want my wallet and keys too and that being the case they can have it.
also considering that most people are aware that a phone can be tracked via the cell network who would buy it? its not like you will pay $50 down the pub for it knowing that someone would have reported it stolen and ur average thief aint smart enough to know how to change the IMEI number nor would anyone who is stupid enough to buy a $50 phone at a pub with half a string attached to it (LMAO)
Click to expand...
Click to collapse
Obviously you have not been on any poor parts of the world, based on your opinion. But in reality, there are parts of the world where cell phones don't have insurance, and they do sell it on the nearby pub, and people actually will buy them believe it or not. Just my observation.
---
where I live, it is exactly as what cktlcmd described, a phone may cost the salary of several months to some people, police can not track all of them and they get stolen only when you loose your attention for one moment (it takes less than 30 seconds of not paying attention to loose your mobile as per statistics), so may be a theft alarm does not sound feasible where st3v3 lives, but here, it sure is. Besides, loosing the data and having someone looking at your personal data is what hearts more.
hatamata said:
where I live, it is exactly as what cktlcmd described, a phone may cost the salary of several months to some people, police can not track all of them and they get stolen only when you loose your attention for one moment (it takes less than 30 seconds of not paying attention to loose your mobile as per statistics), so may be a theft alarm does not sound feasible where st3v3 lives, but here, it sure is. Besides, loosing the data and having someone looking at your personal data is what hearts more.
Click to expand...
Click to collapse
point taken but having the phone vibrate and beep still isnt going to act as much of a deterant, a running thief will just keep running!
hatamata said:
Besides, loosing the data and having someone looking at your personal data is what hearts more.
Click to expand...
Click to collapse
Backup frequently (automatically - see my Backup Bible at http://www.pocketpcmag.com/blogs/index.php?blog=3&p=1270&more=1&c=1&tb=1&pb=1 ) and use a Secure Information Manager. The four best are:
CodeWallet Pro (Developer One, Inc., www.developerone.com)
eWallet Professional (Ilium Software, www.iliumsoft.com)
FlexWallet (WebIS, Inc., www.webis.net)
Spb Wallet (Spb Software House, www.spbsoftwarehouse.com)
st3v3 said:
point taken but having the phone vibrate and beep still isnt going to act as much of a deterant, a running thief will just keep running!
Click to expand...
Click to collapse
Not the phone that will vibrate, it is the receiver which should be in my pocket
As for Menneisyys's back up idea, it sure will save most data but not all of it, still, it will not prevent others from seeing my sensitive data stored on the phone.
hatamata said:
where I live, it is exactly as what cktlcmd described, a phone may cost the salary of several months to some people, police can not track all of them and they get stolen only when you loose your attention for one moment (it takes less than 30 seconds of not paying attention to loose your mobile as per statistics)...
Click to expand...
Click to collapse
I know that there are countries where a phone cost a few months of salary.. but I'm pretty sure that in those countries, there are always cheaper alternatives. E.g. India's gazillion-aire may buy an A380 as private jet.. build a tower as his own house.. but they do have pretty cheap cars (as I heard, £1,000+). Hence, I don't really understand when people are willing to spend several month of salary on a phone. If that's the case, then probably that's a risk they have to take. E.g., you don't get a convertible car in China unless you are prepared to hire body guards.
AND, if that phone is going to cost the person buying the phone x months of salary, I would think it would cost y (where y > x) months of salary for the person who is stealing it, and some beeping gadgets will not do the job. The beeping gadget will probably make a `theft` to a `robbery`, I think.
Anyway, cute beeping gadget .
hatamata said:
Not the phone that will vibrate, it is the receiver which should be in my pocket
As for Menneisyys's back up idea, it sure will save most data but not all of it, still, it will not prevent others from seeing my sensitive data stored on the phone.
Click to expand...
Click to collapse
You can encrypt everything on, say, your card in the background - WM6 already supports this. Also, there already are Remote Wipe solutions.

Who's Developing for "Square" MagStripe CreditCard Reader & Touchscreen Payment Systm

Who's Developing for "Square" MagStripe CreditCard Reader & Touchscreen Payment Systm
When I first saw a display ad here on XDA for this gizmo around beginning of April, I thought it was an Fool's joke because the gadget was so small, and it seemed "too smart" to be true.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
... but many of you know it's been out for quite a while. Threads here go back to I think September 2010, (though there was zero traction then)...
Website: https://squareup.com/media
FAQ: https://help.squareup.com/customer/portal/topics/4139-frequently-asked-questions/articles
It works on Android phones and iphones...
Then, by the end of April, having poked around a bit, following links, asking questions on their twitter feed and at facebook, I come to find out that SQUARE, the name of this device, new company and payment system, is the brainchild of Twitter founder Jack Dorsey, a real visionary, who's been ahead of the curve before, regarding the ways people, and groups of people, interact, and where technology can play a role there.
With this new knowledge -- which is significant -- it completely reframes the way I looked at this device: from a QUESTION MARK about
"who's using it and what do you think of its viability?"
Click to expand...
Click to collapse
to
"who's using it and WHAT KINDS OF APPS do you see developing around this system for use by small businesses -- delivering them customized apps with physical credit card transaction systems?
Click to expand...
Click to collapse
Very different perception about the entire product and viability as you see in the 3 short posts I made in this thread, how it quickly progresses
So, has anyone here....
• used one? If so, how did the transaction go? Is it smooth sailing, does the card reader work the first time? (if so, it's better than most checkout stands at grocery or drug store)
• bought one? if so, have you used it for a business, or just to try out, or to write an app for?
• developed custom software for it?
From the looks of it, if this works half as well as it appears, it seems pretty darn revolutionary.
Curious to see if there is any feedback.
To be honest it's not something that i would trust.
matt.blackwood said:
To be honest it's not something that i would trust.
Click to expand...
Click to collapse
Explain more please. Do you mean as a card holder making a transaction? You mean you would not trust ...
(a) the security of the system to properly authenticate with the credit card company and approve the transaction
(b) the card reader's and software's inherent reliability to firewall your credit card data and isolate just that single transaction, without grabbing your credit card info?
(c) the vendor using the credit card reader and who knows what software has been tied to the reader to grab and suck down all your credit card data, nicely stored for vendor to use another time, another place -- or sell off to some third party?
(d) or the vendor is acting in good faith but someone makes an app for his particular business and sells to him and he is legit, but unbeknownst to him the app is "phoning home" to app maker or some third party with credit card data?
-------- Please explain , don't just pick a, b, c, d .... I'd really like to understand. And these just sprang off the top of my head once you said that.
I've been eyeing them as a company and as a mobile PoS system solution for a while... I signed up today, guess we'll see in a month how it goes.
RADRaze2KX said:
I've been eyeing them as a company and as a mobile PoS system solution for a while... I signed up today, guess we'll see in a month how it goes.
Click to expand...
Click to collapse
Great! I hope you'll give us some feedback.
My first impression, as mentioned, upon seeing just the top image, was "what a clever joke" -- because I hadn't really thought something so small was realistic.
Then when I'd clicked through and saw it was tied together thru the headphone jack, I thought: wow, this is clever: Immediately flipped my thinking from joke -- to -- very clever engineering -- with a very smart snap/snug, stable external device mounting method, plus the critical input/output connection.
Then, seeing nothing more my mind wondered but what's the quality of the mag-stripe reader? ---- that's impossible to know... But upon seeing the device was actually in use and had history, I knew it had to work-- and -- my mind instantly flipped again to: How many times had I been to a major chain grocery store or "big-box" store, or ATM machine or parking lot checkout reader, and have my credit card rejected because "not readable" -- only to then have the same card work perfectly fine 10-feet away at another ATM machine? ... Answer: Very often.... And the cashier ends up taking the card and either swiping it in another device, or manually entering the numbers, so, my thought was: hey if it works 75% of the time, it's as good as most industrial strength systems i encounter in every day life... SERIOUSLY.
My mind tumbled out all of these reactive thoughts all in a split second -- like, what about signatures -- and of course, touchscreens, just like in stores. I didn't check to see if they provide a capactive stylus, but i have used about 3 brands of capactive stylusus on my various devices, and they are not bad ---- Put it this way, They are EASILY as good as controlling my signature as the crappy pens provided with almost every touchscreen signature system I have used at grocery stores, drug stores, etc, where my signatures is wildly uncontrolled and yet the system accepts it.
(NOSTALGIA NOTE: The argument has long been had about resistive vs capacitive screens -- I've been in on those for several years. The feature I miss the most on my post-windows-mobile phones is stylus-based drawing and handwriting and character recognition and "handwriting to text"... The entire industry took a giant 10-year step backwards with capacitive screens when that incredible advancement -- poof - just went away, got buried -- and most post-iphone-world consumers today don;'t even know that it was ever possible... oh.well. .... )
So, when I posted this thread, I was pretty psyched.
THEN came the first reply -- and his was the only reply before yours -- saying
To be honest it's not something that i would trust.
Click to expand...
Click to collapse
And that lead me to immediately examine everything I'd ignored while I marveled at the technology. I never got a reply back from matt.blackwood
which is a real drag
because he raised the issue, and at the very least I wanted to know if the factors I then took apart were the factors bothering him -- or if it was just an overall intuition he hadn't really examined in the detail I did.
In the end, there is NO WAY THIS CONCEPT CAN FAIL ultimately... whether this particular company solves all the problems of security or someone else does... whether they get bought out by paypal, or whatever may happen. It's TOO SMART TO FAIL and I would consider investing money in the company.
Let's face it, the Apple Store uses clunky mobile credit card transaction devices, and they swipe the cards -- and the whole thing is very smart... But I recall asking a guy at Apple store in San Francisco a year ago
"Hey, how come you guys haven't hooked up an external card reader device to an iphone to do this same function? It seems kind of foolish to be touting the iphone's "there's an app for that" only to then have this dedicated terminal that seems way bigger than it needs to be to perform its function"
And the guy looks at me... You know that semi smug look you get with their cool blue t-shirts and tags around neck with the general attitude of "I know all" and "there's nothing you can possibly know that apple hasn't altready thought of" ...
And he starts to speak about "well I am sure they are working on..."
And I pull out my HTC Desire and say "But I'm just saying.. it's a pretty simple concept, anyone could do it, it's not that hard, they could do it to THIS phone, right?...So I'm just kind of surprised it's not even in prototype stage"
And the smug look has evaporated with no place to go... I wasn't being smug at all. I was just being correct. And he says "You're right. We should have that by now" ....
Click to expand...
Click to collapse
So, *I* had envisioned an add on that was, of course, credit card sized, and was flat, and would butt-up flat to the bottom of a touchscreen device. That seemed so obvious.
Which is why I was initially baffled by this gizmo and thought it was a joke, because it seemed so unrealistic .... Until I clicked through and saw --- wow, *I* was wrong. Very very smart product design. They should change the external design to look less plastic and cheap, so as to convey a more durable and serious, secure product.
Please let us know what you think.
I think the main issues are definitely B, C and D on your previous post. I'm sure A has been solved by now, otherwise this wouldn't even be a product.
People are very paranoid about their credit cards, and with good reason. Anything remotely "new" will have a tough period of adaptation and the fact that this is portable and so ad-hoc (clever though it is) will only fuel people's doubts. It's great from an engineering perspective but its more of a risky bet when you take marketting into account. But not to worry, there's a lot of places that could pioneer these devices. Cyber cafe's with iphone-armed waitresses and such would be ideal. From there on it would spread. (I would NEVER use it on a hot dog stand like the ad photo suggests though, no way XD)
The signature thing caught my eye as well. Its gonna be really awkward to sign with your fingers. They should DEFINITELY package an iphone-compatible stylus with each reader.
Wow, didn't know SQUARE is from inventor of Twitter, his next "vision"
This quadruples my interest in this gizmo and belief in its destiny to take over the credit card terminal business:
http://www.vanityfair.com/business/features/2011/04/jack-dorsey-201104
Frankly, now with this information, I'm really surprised XDA-devs is so slow to get onboard with this. My god, people are dragging their heels on this? It's completely nuts. This is a homerun. If someone has an app to develop for android or windows7, or even iphone, or vendor-by-vendor custom apps, this is going to be a huge huge money maker for app developers customizing apps for SMALL BUSINESSES.
He or she who drags feet will be like Microsoft dragging feet after the iphone flipped the UI for touchscreens to finger-based navigation.
CptAJ said:
I think the main issues are definitely B, C and D on your previous post. I'm sure A has been solved by now, otherwise this wouldn't even be a product.
Click to expand...
Click to collapse
Thanks for replying. Here's what their site says about security. I would love to see the XDA-dev security experts scrutinize every aspect of the security issues, and pick apart any shortcomings -- simply for identification purposes. I want to see this succeed, and as you can see in the way I have reframed the way I see the product, I am certain it will. I can't see it failing to gain significant traction in X years' time. It will probably be way faster than it took paypal to build user trust -- because that was a different time in the internet curve of adoption by consumers.
https://squareup.com/security | VeriSign Secured seal | PCI Compliant link
Physical & Network Security
Sensitive data is encrypted using industry-standard methods when stored on disk or transmitted over public networks.
Only standard, well-reviewed cryptographic protocols and message formats (such as SSL and PGP) are used when transferring data.
Symmetric cryptographic keys are required to be at least 128 bits long. Asymmetric keys must be at least 2048 bits long.
Security updates and patches are installed on servers and equipment in a timely fashion.
Security settings of applications and devices are tuned to ensure appropriate levels of protection.
Square’s website and API are accessible via 128-bit, extended-validation SSL certificates issued by VeriSign.
Networks are strictly segregated according to security level. Modern, restrictive firewalls protect all connections between networks.
Card-processing systems adhere to PCI Data Security Standard (PCI-DSS), Level 1.
Click to expand...
Click to collapse
Web and Client Application Security
Card numbers, magnetic stripe data, or security codes are not stored on Square client devices.
Applications developed in-house are subject to strict quality testing and security review. Web development follows industry-standard secure coding guidelines, such as those recommended by OWASP.
Card-processing applications adhere to the PCI Data Security Standard (PCI-DSS), Level 1.
Click to expand...
Click to collapse
Organizational Security
Access to sensitive data, including application data and cryptographic keys, is strictly controlled on a need-to-know basis.
Two-factor authentication and strong password controls are required for administrative access to systems.
Security systems and processes are tested on a regular basis by qualified internal and external teams.
All access to secure services and data is strictly logged, and audit logs are reviewed on a regular basis.
Security policies and procedures are carefully documented, and are reviewed on a regular basis.
Detailed incident response plans have been prepared to ensure proper protection of data in an emergency.
Click to expand...
Click to collapse
Research and Disclosure
We want to encourage responsible reporting of problems with our service. If you believe you have discovered a problem with our service, please contact us at [email protected].
Square will respond to all reasonable reports of potential security problems, usually within 24 hours. If you report a problem, we will:
Acknowledge your report, and provide you with contact information for our team as we investigate;
Work with you to ensure that we understand the issue, and consult with you about the best way to address it;
Work with other organizations, if necessary, to ensure that other services are protected too;
Keep you informed as all of this takes place; and
Give you credit, if you wish, for helping us.
Security is critical to Square. By reporting problems to us in a responsible manner you enable us to address issues and protect our users in a timely fashion. We also recognize that legitimate and well-intentioned researchers are sometimes blamed for the problems they disclose. In order to encourage responsible reporting practices, we promise not to bring legal action against researchers in response to a disclosure, provided they:
Share the full details of any problems found with us.
Do not disclose the issue publicly or to others until we have had a reasonable amount of time to address it. We will try to act quickly, but some aspects of our system are complicated and may take time to patch and test.
Do not intentionally harm the experience or usefulness of the service to others.
Never attempt to view, modify, or damage data belonging to others.
Do not seek compensation or reward for the report, either from Square or a third party.
This pledge is intended to balance the protections and guarantees necessary to encourage responsible disclosure against our own requirements and responsibilities for data security. It is not an invitation to test the security of our service without authorization. If you have any questions about this, or have any doubts about whether your tests are appropriate, please contact us before proceeding.
Click to expand...
Click to collapse
***
*** I want to actually respond to your post's points that I can respond to in next post. This was to isolate the security info into one post.
I have one of these and have used it, the transactions have gone smoothly. I haven't used it often, but I've had it since they first launched (I was one of the first people to get one of them), and it works great as a swipe card reader as well as a manual input card device if you need to take a credit card number over the internet or phone. I'm not planning on using it in place a normal merchant account (I'm in the process of getting one set up for online transactions), but for in-person transactions I'd feel just as comfortable using this as I would any other card-swiping solution.
Just my two cents.
FORGET ABOUT ALL DOUBTS in Square payment system: VISA investing in Square
http://www.cnbc.com/id/42783124
For all those who were marginalizing SQUARE with a "wait and see" approach, you might as well sprint ahead and get into adoption mode, and start developing for it. With this VISA partnership, hard to see SQUARE needing any more validation. It's going to clean up big time.
Square Partners with Visa, Gaining Advantage in Mobile Payments Race
Source: squareup.com​
Startup Square just secured a major advantage competitive mobile payments space — a strategic investment from Visa which will put one of its executives on the company's advisory board.
This isn't about the cash — earlier this year Square raised $27.7 million in financing, led by Sequoia capital — this is about validation from Visa, a leader in credit card payments.
Considering that all of Square's rivals, including Quicken and PayPal, have been looking to partner with a giant like Visa, this gives Square a huge advantage in getting merchants to adopt its service.
Click to expand...
Click to collapse
more in link: http://www.cnbc.com/id/42783124
And from GigaOm:
Visa is making a strategic investment in mobile payment provider Square, providing the start-up with an undisclosed sum of money as well as a new advisory board member. It’s a nice boost for Square, which is on a roll as it tries to ramp up payments via a smartphone. But it also highlights the growing role of credit card companies as they try to prepare for the growing mobile payments boom.
Click to expand...
Click to collapse
Kaessa said:
I have one of these and have used it, the transactions have gone smoothly. I haven't used it often, but I've had it since they first launched (I was one of the first people to get one of them), and it works great as a swipe card reader as well as a manual input card device if you need to take a credit card number over the internet or phone. I'm not planning on using it in place a normal merchant account (I'm in the process of getting one set up for online transactions), but for in-person transactions I'd feel just as comfortable using this as I would any other card-swiping solution.
Just my two cents.
Click to expand...
Click to collapse
Kaessa, would love to get more anecdotal information about how customers are responding to this form of payment -- what questions do they ask... and even procedurally -- walk me through it, do you in fact hold the phone in your hand, as pictured, and they swipe it? Or do you turn phone sideways (90-degrees) so they can swipe card more like at cashier terminals?
Then what, do you keep the reader plugged in and flip phone around for people to sign?
Do people have an okay time with finger?
Is there a reset/ try signature again?
Just curious! Thank you.
I really want to get one of these to play with, but they are not available outside of the US. I don't want to use it for payments, just as a mag-stripe reader.
I was wondering if anyone in the US would be willing to buy one and send it over? I heard you can buy them over the counter from apple stores...
crazy stuff
MOD note: After going through the thread, indeed it's related to phones and shall be moved back to general shortly.
It might have been misinterpreted by ORB, even we moderators are humans and can make mistakes.
So, I suggest OP and everyone relax.
Also, if OP you have any further issues address them to me via PM ( not rant threads - like the one I shut ).
That is correct, initially it seemed to be an iphone only related thread, now OP edited and included other OS´s.
@OP, Next time please contact Moderator instead of creating rant threads please
orb3000 said:
That is correct, initially it seemed to be an iphone only related thread, now OP edited and included other OS´s.
@OP, Next time please contact Moderator instead of creating rant threads please
Click to expand...
Click to collapse
OP only edited it to make it more apparent that it was about phones. No image was changed. No information was changed re OS. It was about Android from Day 1.
quicksite said:
Kaessa, would love to get more anecdotal information about how customers are responding to this form of payment -- what questions do they ask... and even procedurally -- walk me through it, do you in fact hold the phone in your hand, as pictured, and they swipe it? Or do you turn phone sideways (90-degrees) so they can swipe card more like at cashier terminals?
Then what, do you keep the reader plugged in and flip phone around for people to sign?
Do people have an okay time with finger?
Is there a reset/ try signature again?
Just curious! Thank you.
Click to expand...
Click to collapse
I've only done it a couple of times, so I'm probably not the best one to ask. One was online, as an eBay transaction... PayPal had screwed up his account so I just took his Visa over the phone. There is a "card not present" option, just like with any other credit card machine.
As far as swiping the card, I would take the card from them and swipe it. It's a fairly delicate device, not like a grocery store card reader, and someone getting over-enthusiastic with it could break it or your phone's headphone jack. I don't worry about breaking it myself... I carry it around in my purse in the same pouch I carry my headphones in.
As far as the signature goes, the finger signature works fine... just turn it around and either give it to them, or put it on a flat surface and have them sign. I don't know if there's a "try again", but there probably is. It's a well developed piece of software, really slick. Looks like they thought of everything when they put it together. I haven't had anyone hesitate to use it. Now that Visa is in on it, I'm sure there won't be any problems.
I'm thinking of using it at my next yard sale. Should get all those looky-loos that "forgot to bring enough money".

Business Security: A Top Priority

One of your top priorities at your company should be your data security. No matter what you do in your line of business, there will always be people out there trying to steal information, especially if you are storing client data they can use to their advantage. You may not even realize that you could penalized if you aren’t protecting customer information as actively as the government thinks you should, so there is even more reason to ensure your security is managed properly. Fortunately, you can use a managed IT security service to take care of it for you.
Wendy’s learning the hard way
Wendy’s recently opened an investigation into a potential security threat and has hired a security firm to look into the issues to determine the problem and how to fix it. Apparently, there were cards used legitimately at Wendy’s and then later used for fraudulent charges elsewhere, according to NBC News. Wendy’s is unsure of what exactly happened and is hoping for a quick investigation, so the problem can be resolved. Rather than being reactive in situations like this, it is much better if you are proactive and protect from loss of private data in the first place.
Similar thefts have been happening at many major corporations, including a high profile one at Target and one at Home Depot. It seems that many companies that think they are protected end up being less protected than they think when it comes down to it and they have to prove themselves. Don’t be like the other guys. Set yourself apart by getting your security taken care of right now.
Staying above the law
When it comes to protecting consumer information, the government is very strict, especially when it comes to the healthcare and banking industry. It is your responsibility to know the laws associated with your industry and ensure all your information is being stored and processed as it should be, which is one way a managed IT security service can help you.
Get your business security on track
If you need to get your business security on track, the best way to go is to work with a managed IT security service. This kind of service can come in, survey your current system, look for any holes, and work with you to determine the best security possible for your line of work. This will include discussions about legalities when securing customer information as well as finding any kind of current holes in the system. A managed IT security service is a top priority and will be proactive to prevent little things from falling through the cracks that you never expected.
IT news brought to you by intrinium.com
Source: nbcnews.com/business/business-news/wendy-s-looks-possible-security-breach-after-credit-card-fraud-n505231
Great Post
Business security is extremely crucial. With emergence of BYOD and mobile apps, it is a challenge for developers to continuously provide extremely secured platform to protect sensible information.
Look at security measures that you cannot ignore:<mod snip>

Anyone interested in helping to catch an adulteress?

I need away to gain root privileges for the purposes of recovering deleted data. Unless there is another way to go about it? There are 3 phones involved all At&T carrier, Burner 1 is a Samsung S9 Plus (1st sp) , 2nd Burner is a Samsung Note 10 Plus and her everyday phone is a Apple 11 Max Pro. Apparently file recovery software is very limited without root access. When I read the guides it appears to root it is to lose everything. Is that true? Plus I dont really understand what I am reading most of the time.
Thank you for taking the time to read this. I am being gaslighted to the point I had a psychotic break, and even now everyday is a struggle to exist. May pride be her fall, she is very proud of herself. she whispered in my ear "i already won, you will look crazy. I have seen to that". Help me take her down a notch. I am also willing to pay if it is allowed on this board. I need to prove she has done some this to our kids too. She would rather them think they saw or heard something incorrectly than be found out. Evil. But I digress, Sorry for airing my dirty laundry, but I am desperate.
I am open to any and all suggestions. to include recommendations for hiring someone/a company.
All 3 phones are legally mine. The 1st 2 are my old phones that were supposedly discarded and the iPhone 11 is on my account, under my name and the loan related to the phone is in my name too. I could provide AT&T documentation as proof of ownership to prove legitimacy .
Thanks
Steven Beau ********
you say you want to retrieve data on the phones but what exactly are you trying to get back (calls/txts or photos/videos) ???
Xceeder said:
you say you want to retrieve data on the phones but what exactly are you trying to get back (calls/txts or photos/videos) ???
Click to expand...
Click to collapse
All of the above. I am really hoping she discussed the various ways she duped us. For example my 6 year old saw her do this: I could not find my phone I checked a 1k times in my car. She recorded herself ( at a strange angle i might add) hiding it in my car but my little one in his stealth like ninjas ways, saw what she actually did. She used her free hand and pulled it out and placed it in my passenger seat in plain view as she panned from the floorboard to the seat and low and behold there was the phone. She then spent the next hour screaming and telling me I was crazy and losing my mind again. Once she figured out I was on to her, her phone use went from a few k with of texts and 20 plus GB of data used a month down to 4-500 text 1.5GB used. She saw I was researching spyware via my browser history and told me to research commsec, though I thought she said commsex. I was expecting to find some freaky alternative lifestyle, unfortunately is was just a security term the military uses,. Its crazy this woman is using these type of terms. Anyway
I want to capture as much as I can,
If you want to find out the truth, sometimes your only choice is to spy on someone. If they’re lying to you or keeping the truth from you in some way, spying on their phone activity can help you discover critical information.
What you need is a way to spy on the target phone without them knowning. That way, the chances of you getting caught are nonexistent. Also, it’s much more convenient to spy on them remotely.
Is there a way to spy on someone’s phone remotely? You just need to use a spy app that works without target phone! It’s fast, safe, and easy, in case you’re wondering.
Many Android Spy apps exist. GIYF ...

How can I test to see if a phone was compromised by law enforcement?

Phone: Samsung S20 5G FE
Just to set a tone, this phone 'disappeared' from a hotel room occupied by an organizer of the 2022 Ottawa Canada protests, after the room was combed over by Police/RCMP, as well as other devices and documents. The phone was later 'found' back in the room and started behaving strangely with other people's photos and messages appearing randomly.
The owner of the phone contacted me and asked if I could help, but I'm not knowledgeable enough about this stuff and simply told them it would be best to reset the device and stop using it. They did that, then bought a new phone and gave this one to me, telling me "you can have it, do what ever you want, sell it or try to fix it, its yours".
Obviously I haven't used it for anything.
I would like to at least know if it is compromised and if there is any way to 'fix' it. I don't want to waste money paying to have the bootloader unlocked on it if rom flashing won't clean it. Or if I wouldn't even be able to tell.
Anyone have any suggestions? Thanks.
Reflash it to the original rom. Change Google and any other applicable account passwords.
Done.
Ok, I'll go through the unlocking process and flash a new rom to it.
Out of curiosity would this remove anything they could have used on it? Even if it was something like Pegasus? I would assume it would but I'm not sure if they have anything that works on a lower level.
Sorry if that might sound like I'm over thinking, but they spent a lot of time and money trying to track the people organizing the protests and anything is on the table. Some of the stuff I've heard about that wasn't public knowledge is pretty unbelievable.
MrCool00236 said:
Ok, I'll go through the unlocking process and flash a new rom to it.
Out of curiosity would this remove anything they could have used on it? Even if it was something like Pegasus? I would assume it would but I'm not sure if they have anything that works on a lower level.
Sorry if that might sound like I'm over thinking, but they spent a lot of time and money trying to track the people organizing the protests and anything is on the table. Some of the stuff I've heard about that wasn't public knowledge is pretty unbelievable.
Click to expand...
Click to collapse
Toss the device if really concerned.
If the DOD, FBI, etc are surveilling you in earnest, you likely won't pick off all their tiers of surveillance.
They aren't watching me, honestly, I was never involved in, at, or around any of the events, just distant buddies with one of the guys. I just have this phone, it's practically brand new, and feel it would be such a waste to toss it, I mean I could sell it I suppose.
I just, as anyone even mildly concerned about privacy, would rather not have anyone much less government officials snooping on everything I do. It would make a great phone for those rare times I need to install some scummy app to set up a device from aliexpress or otherwise. Or other similar tasks. Just rather know I cleaned it up before I go ahead and connect it to the same network as every other device in my house.
As an aside, I do see this as a good leaning opportunity. No matter how small I never pass those up. Just hope I'm not coming off as someone who's completely tinfoil hat, or hell bent on saving a device.
Rule #1- physical security is the only real security!

Categories

Resources