tag:blogger.com,1999:blog-3798604115389836864.post1228641405220396329..comments2024-03-13T13:04:53.453+00:00Comments on IT Security Expert Blog: The Spy Next Door: Stealing your life for £44SecurityExperthttp://www.blogger.com/profile/02816379340772195492noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-3798604115389836864.post-87052908536295765922014-03-14T12:07:37.316+00:002014-03-14T12:07:37.316+00:00Everything is very open with a very clear descript...Everything is very open with a very clear description of the challenges.<br />It was truly informative. Your website is extremely helpful.<br />Many thanks for sharing!<br /><br />Feel free to surf to my page :: <a href="http://navelhunt.com/xe/?document_srl=4627" rel="nofollow">kickasstorrents</a>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-89010973916863993302014-01-17T07:13:32.931+00:002014-01-17T07:13:32.931+00:00Thanks , I have recently been searching for inform...Thanks , I have recently been searching for information approximately this <br />topic for ages and yours is the greatest I have came upon till <br />now. However, what in regards to the bottom line?<br />Are you certain in regards to the source?<br /><br />Feel free to surf to my webpage ... <a href="http://www.youtube.com/watch?v=H61PgIREOa4" rel="nofollow">windows 7 password reset</a>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-61770067004596271102013-03-12T15:59:09.677+00:002013-03-12T15:59:09.677+00:00It is almost scary what technology can do these da...It is almost scary what technology can do these days.Conniehttp://grouptravelspecialists.comnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-85072295777694158312012-06-04T16:34:20.929+01:002012-06-04T16:34:20.929+01:00Nice post which All a perpetrator needs to do is t...Nice post which All a perpetrator needs to do is to plug the Spy Cobra USB device into your PC, and return to collect your most important personal information which it has harvested from your PC at a later date, information which can be truly life stealing from an identity thieves perspective. You might think twice about allowing that friend or neighbour to use your home PC, or even leaving folk unattended in the presence of your PC while it is still logged on. Thanks a lot for posting this article.Oliviahttp://www.getgrouptravel.com/groups/missions-travel/noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-6609134854938695162011-02-18T17:03:59.832+00:002011-02-18T17:03:59.832+00:00Excellent article. Hardware key loggers can be spo...Excellent article. Hardware key loggers can be spotted (if you look) but this is a new threat. Do you consider them to be a threat to networked PC's also? I have a put a link to the story on my blog www.chatbacksecurity.comChatback Securityhttps://www.blogger.com/profile/10896866947848399334noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-84557143123287045942011-02-18T10:00:03.840+00:002011-02-18T10:00:03.840+00:00Speak of the devil and so close to home too, thank...Speak of the devil and so close to home too, thanks for the heads up with that story, linked added.<br /><br />PS OWASP are one of my favourite security communitiesSecurityExperthttps://www.blogger.com/profile/02816379340772195492noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-38690711266733261172011-02-17T23:43:00.882+00:002011-02-17T23:43:00.882+00:00Dave, you may already know but a batch of hardware...Dave, you may already know but a batch of hardware keyloggers were recently discovered attached to the public computers in a Manchester library. May be worth you adding a link to that story0waspnoreply@blogger.com