iPhone SPY Data Recovery Stick

The iPhone Spy Data Recovery Stick is the ultimate recovery tool for anyone who wants to capture deleted information from any iPhone (running iOS to 3.x). The iPhone Spy Data Recovery Stick makes it easy to recover deleted text messages, contacts, call and web history, as well as photos, voice memos and calendar appointments — giving you a unique look into exactly what the user has been searching for, who they’ve been talking to, and even the types of pictures they’ve taken. With features like saved map search history, web searches, and text messages, the iPhone Data Recovery Stick is the only tool you need to catch a cheating spouse, monitor your kids, or backup your own iPhone data.

via iPhone SPY Data Recovery Stick | Read ALL Her Deleted Texts & MORE…?.

  • Download information like:
    • Text messages
    • Phonebook contacts
    • Call history
    • Calendar appointments and reminders
    • Notes / voice memos
    • Graphics / photos
    • Multimedia files
    • Internet search and web history
    • Map history
    • Dynamic text (learned words like people’s names, restaurants, etc.)
    • Phone properties such as model, serial number, OS version, and more
    • And all other user data that can normally be backed up
  • Deleted data types that can be recovered:
    • Text messages
    • Phonebook contacts
    • Call history
    • Calendar entries and reminders
  • Speed of scan: approx 20 minutes per Gb of storage space
  • Supported operating systems: Windows XP, Windows Vista, Windows 7
  • The iPhone Spy Stick software recovers deleted data only from iPhones running iOS 3.2.1 and earlier

And only $199,-

Haystack: masks Iranian activist traffic as being innocuous

Haystack. The anti-censorship software is built on a sophisticated mathematical formula that conceals someone’s real online destinations inside a stream of innocuous traffic. You may be browsing an opposition Web site, but to the censors it will appear you are visiting, say, weather.com. Heap tends to hide users in content that is popular in Tehran, sometimes the regime’s own government mouthpieces. Haystack is a step forward for activists working in repressive environments. Other anti-censorship programs—such as Tor, Psiphon, or Freegate—can successfully hide someone’s identity, but censors are able to detect that these programs are being run and then work to disable the communication. With Haystack, the censors aren’t even aware the software is in use. “Haystack captures all outgoing connections, encrypts them, and then masquerades the data as something else,” explains Heap. “If you want to block Haystack, you are gonna block yourself.”

via Computer Programmer Takes On the World’s Despots – Newsweek.

Adobe behind best selling iPad app

The Apple / Adobe Flash spat has reached a new level, with Adobe having a good laugh: The best selling iPad  App, Wired’s June Edition, it turns out, was built using Adobe’s new Adobe Digital Publishing Technologies.

“Bwahaha!” says Adobe. “We Were Behind Wired’s iPad Magazine All Along!”.

The Digital Publishing Platform being developed by Adobe allows publishers and advertisers to create immersive onscreen experiences that combine the visual impact of print design, the immediacy of touch interaction, and the engagement of interactive elements such as video, audio, animated infographics, 360° views, and more. Because this platform builds on the foundation of Creative Suite 5, it lets magazine design, editorial, and production teams use familiar tools and skills to efficiently create versions for print and a wide range of screens. Integrated analytics will enable publishers to plan editorial content and provide advertisers with accurate, detailed insight into how readers are interacting with stories and ads.

Digital Publishing Platform for magazines, books, newspapers and retail catalogs

Of course, the platform Adobe used, incorporates Flash.

Mainly they used InDesign CS5 and will be releasing the technology later.

GSM Locations and name / number combinations easy to get at

A pair of security researchers has discovered a number of new attack vectors that give them the ability to not only locate any GSM mobile handset anywhere in the world, but also find the name of the subscriber associated with virtually any cellular phone number, raising serious privacy and security concerns for customers of all of the major mobile providers.

via Researchers Hijack Cell Phone Data, GSM Locations | threatpost.

They use the caller ID database which is pretty much open to everyone, because all the providers need to get at it.

Gerald Blanchard: Masterthief

This guy started stealing at 6 and never looked back. Banks, jewelry, skimming, scamming, he’s done it all. Using high-tech gadgets and doing parachuting in or using air ducts, he got in anywhere. A gripping read of a real life Pink Panther style master thief, who made a few too many mistakes and got caught.

Art of the Steal: On the Trail of World’s Most Ingenious Thief | Magazine.

Foil impressioning lockpicking

The way the tool works is that you first take some aluminum foil and make a ‘U shaped’ form using the special tool to do so and make small incisions on pre-determined positions. Next thing you do is put the foil over a special blank that already has the profile of your target lock. The clever thing about this tool is that the ‘U shaped foil tube’ is wrapped around some sort of needle, and the foil can not be pushed in when entering the lock! Once the key is inserted, the needle is taken out from the back of the tool, and the pins are now resting on the foil. Because of the cuts in the foil, each pin will stand on it’s own ‘island’ of foil, and when it is pushed in will not disturb the neighboring pin!

This technique will open most locks and you can buy a kit for around $58,- or a simpler model for $21,-

via Advanced foil impressioning « Blackbag, Barry’s weblog.

US Army takes down CIA / Saudi extremist website

Showing there is little unity and policy when it comes to cyber warfare in the US, the military took down a website used to gather intelligence on extremists. In the process of doing so they took down around 300 servers around the world and pissed off all the other intelligence gathering agencies that were covertly monitoring the site to gain information on the identities and plans of terrorist extremists.

Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies.

Chip and PIN broken

Cambridge University security researchers have demonstrated how it might be possible to trick the card into thinking it’s doing a chip-and-signature transaction while the terminal thinks it’s authorised by chip-and-PIN. The flaw creates a means to make transactions that are “Verified by PIN” using a stolen uncancelled card without knowing the PIN number. Fraudsters would insert a “wedge” between the stolen card and terminal tricking the terminal into believing that the PIN was correctly verified

via Chip and PIN security busted • The Register.

Predator UAV feeds unencrypted

It looks like the Iranians have found out that the video feeds  from Predator drones are in some cases unencrypted and can be tapped into using a $26,- program called Skygrabber.

FOXNews.com – Iranian-Backed Insurgents Hack U.S. Drones.

Now it turns out that the ROVER system, a hand held video system for infantry, also recieves unencrypted video from all kinds of airborne sources, from U2’s to Harriers, Tornado’s, F-15’s, F-16’s, etc. And can be tapped in the same way.

Gizmodo

Now this is nothing new – some guy was tapping into unencrypted military satellite feeds during the Iraqi wars – and is due in part to bandwidth limitations: the militaries are huge bandwidth hogs and there just isn’t enough to go around for all the tasks they’d like to use, let alone if it was all encrypted.

The question is, can Skygrabber tap targetted drones or is it a haphazard affair?