First time on my blog "Trend Internet Security?" Want to know more about Internet Security? Need some cool advices and modern Trend Internet Security tips&tricks?

Subscribe to blog updates by Email or RSS

Each week you will get a new post with a fresh tip concerning Trend Internet Security. I promise you, my dear reader! Or you will unsubscribe :-)

Tuesday, May 25, 2010

U.S. CyberCom launches with first commander

With Army Gen. Keith Alexander named as its first commander, U.S. Cyber Command has a challenging mission and Alexander a demanding job.

New head of U.S. CyberCom Gen. Keith Alexander.

Army Gen. Keith Alexander, the new commander of U.S. CyberCom.

(Credit: National Security Agency)

Receiving a promotion to four-star general, Alexander on Friday was officially given the reins of U.S. Cyber Command by Defense Secretary Robert Gates during a ceremony in Fort Meade, Md. That signaled the initial launch of the division, which won't be up to full capability until October 1.

The mission of U.S. Cyber Command, or CyberCom, is to synchronize the Defense Department's various networks and cyberspace operations to better defend them against the onslaught of cyberattacks.

"Given our increasing dependency on cyberspace, this new command will bring together the resources of the department to address vulnerabilities and meet the ever-growing array of cyberthreats to our military systems," Gates said in a statement.

Last June, Gates approved the birth of Cyber Command as a unified, subdivision of U.S. Strategic Command to manage the Defense Department's resources of 15,000 computer networks across 4,000 military bases in 88 countries. The launching of U.S. CyberCom had been stalled, awaiting Senate confirmation of Alexander. But with Senate approval having been cleared on May 7, CyberCom is now free to open for business.

About 1,000 people will work at CyberCom at Fort Meade, with most of them moving over from existing jobs.

Concerns have been raised, notably by Air Force Gen. Kevin Chilton--the commander of U.S. Strategic Command--over the segregation that currently exists among the different cybernetworks and information resources across the military.

"This segregation detracts from natural synergies and ignores our experience in organizing to operate in the air, land, sea, and space domains," Gates said before the House Armed Services Committee in March. "The establishment of U.S. CyberCom will remedy this problem in the cyberdomain."

To integrate the military's vast cyber-resources, Deputy Defense Secretary William Lynn III has spearheaded the effort to launch CyberCom. With the U.S. military more dependent on information technology than forces in other countries, Lynn believes the military must be able to safeguard its own networks and be free to utilize them across the world.

"We want to be able to maintain those advantages and protect the military missions, and that is the main mission of Cyber Command; it is to protect the military networks," Lynn said in a statement. "It will have a role, though, in protecting the government's networks and critical infrastructure."

"We didn't see Desert Storm coming. We didn't see the series of events that led to Afghanistan. Foreseeing the threats in cyberspace is harder. With Cyber Command, I think we need to be prepared for the unexpected."
--Deputy Defense Secretary William Lynn III

Coordinating all of the disparate agencies with a role in cyberdefense has been a huge challenge, as different groups in government have struggled to map out their own agendas. But Lynn seems optimistic that CyberCom can also help clean up some of the bureaucratic snafus and turf wars.

"It will be the place where the Department of Homeland Security will come to on cybersecurity matters," Lynn said. "And it will help rationalize the interagency process."

Since the initial inception of CyberCom almost a year ago, the military has been busy prepping it for launch, according to Lynn. People have been trained, task forces have been set up, investments have been made. Officials from the DOD have also worked with defense companies to focus on both cyberthreats and best practices. Lynn himself has traveled to Great Britain and Australia and will go to Canada to discuss how best to share common threats and technologies.

Questions still remain about the muddy legal waters of cybersecurity. What is considered a cyberattack? How do countries respond to them?

"We're in the midst of a series of meetings the White House is leading to work through a lot of those legal issues," Lynn said. "We've made progress organizationally, industrially, and internationally, but the legal regime in particular is an area we need to tackle further."

But other challenges await the new Cyber Command, especially with the growing threat of cyberattacks.

"It doesn't take the resources of a nation state to launch cyberwar, "noted Lynn. "Nations still have the best capabilities, but you can do very threatening and damaging things with modest investments...Our ability to predict where the threats are coming [from], even in conventional threats, is remarkably poor. We didn't see Desert Storm coming. We didn't see the series of events that led to Afghanistan. Foreseeing the threats in cyberspace is harder. With Cyber Command, I think we need to be prepared for the unexpected."

Source: news.cnet.com


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

An ultimate solution to Data Security: Unified Threat Management

Unified threat management (UTM) is a step above the conventional firewall features as it embraces the pooled features of e-mail spam filtering, IDS (Intrusion Detection System), anti-virus capability and World Wide Web content filtering. This is a novel trend which is emerging in IT world slowly. The multiple functionality of the Unified Threat Management appliance can be the justification for replacing older more basic firewalls with the new system. In simpler words, UTM is just like a blanket security cover for Internet-based threats.

Security is the biggest threat or in other words, the utmost requirement for internet users, as the virus attack incidents are growing in corporate information system environment and the end user is always recognized as most targeted obsession for security attacks.

The principal advantages of UTM are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently. Some other advantages include

• Reduced Complexity: Single security solution for a couple of security threat along with single vendor.

• Reduced training: require less technical training.

• Multi-Core processor : for balancing speed and performance

• Easy Troubleshoot: Single point of contact makes troubleshooting easy

• Easy management: Web based GUI environment for easy management

• Availability: Ensure uninterrupted access by providing protection against malicious contents

• Identity based security: Identifies ‘who is doing what”

• Improved performance: Zero hour protection without interrupting network performance

UTM Implementation: The usage of UTM system is increasing in the corporate world and many companies are launching their respective products. The promise of the UTM application can be observed in the e-governance sector too. Recently, In India the Jharkhand Government’s state information and communication network has installed a UTM device to embark multiple security threats to the sensitive data like treasury information, Commercial tax information, financial information etc.

Another UTM program implemented by IBM is, the IBM Unified Threat Management (UTM) Service, part of the IBM Managed Security Services “umbrella’ provides a comprehensive protection against all security threats. The IBM setup for security is named as IBM Internet Security Systems (ISS).

Market watch for UTM: The UTM market is growing with the growing needs of security. According to a recent market report, the threat management security appliance market will grew at annual growth rate of 17 percent from 2007 to 2008 which is equal to the global market of $3.45 billion.

UTM vendors in India include LokTek, Cyberoam, Secure Computing Corporation and Symantec, NetScreen (acquired by Juniper Networks), Symantec, NetScaler, WatchGuard Technologies and Elitecore Technologies.

UTM Products: Some significant UTM products in the market are IBM Proventia Network Multi-function Security System, MX5010, IBM Proventia Network Multi-function Security System, MX3006, Fortinet FortiGate-3810A UTM, Fortinet FortiGate-3600, ISS Proventia M50, Fortinet FortiGate-1000A V3.00 and TippingPoint X505 V2.2.4, AccessEnforcer All-in-One Security Appliance by Calyptix Security Corporation and Cyberoam 1000i, 100i, 500i, 1500i by Elitecore Technologies Ltd.



Satinder Kaur/ITVoir Network


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Human behaviour key to cyber-security: Scott McIntyre

CYBER-GEDDON has been overhyped, but IT security professionals need to find new ways of dealing with the never-ending threats, says Scott McIntyre, chief security officer for Amsterdam-based ISP XS4ALL Internet.

"The sky is not falling, the situation is not as bad as many make out, but we need to accept that the internet has been 'pwned' (compromised or controlled by rivals)," he told the AusCERT 2010 conference on the Gold Coast last week.

"We need to maintain a sense of proportion and adjust our expectations about internet security,"' he said.

"Not everything that happens is a major crisis, you don't need huge cyber bunkers because there's a worm on the network -- this should be your daily routine by now."

Mr McIntyre, who is also a member of the Dutch computer security incident response team KPN-CERT, said the industry was stuck in "a weird loop of going backwards and forwards" on the same issues.

"Too many people are focused on the minutiae of internet security, but security professionals are being trained to sit and wait for the alerts to pop up," he said.

"We look at patterns of data and try to find a signature to fix it, while firewalls and other devices all work really well for the things they know about.

"There's all sorts of evidence of the evil that's out there, but we can't see it and certainly can't respond.

"We are doing a very bad job of anticipating new problems and should be better at expecting the unexpected."

Instead of worrying about the explosion of malware, Mr McIntyre said the industry needed to address human behaviour and provide technologies people would actually use.

Passwords were a failure because people still chose user name and "password", and people continued to click on phishing links.

"A lot of the approaches we're using now have failed," he said. "We need to change how we deal with these problems, as the incidents are not stopping."

Mr McIntyre said industry also needed to take more responsibility in relation to the "Chicken Little" scenario.

"We need to be careful about statements to the press.

"Security researchers go out and say, 'I found this amazing bug, and with a click of the button I can rape the internet'.

"But if you're going to release source code or proof of concept for an exploit you've found, have you already found a defence for it, have you done something responsible, or are you just out for glory?"


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

New ZoneAlarm is quietly effective (review)

The changes made to improve the default firewall in Windows 7 are impressive, but the newest version of the free ZoneAlarm Firewall argues that Microsoft still has a long way to go. ZoneAlarm 9.2 introduces multiple new features to one of the world's oldest computer security programs including quieter outbound protection, behavioral detection from the ZoneAlarm Internet security suite, automatic Wi-Fi security setting activation, antiphishing protection, an overhauled ZoneAlarm toolbar, and 2GB of online storage for free.

Installation

Program installation was largely a smooth experience, taking about 5 minutes. Users will have to reboot their computers after its done. Prior users of ZoneAlarm's paid security suites might encounter some odd behavior if the uninstallation process of one of those programs left remnants, but this should be the rare exception and not the rule.

ZoneAlarm Firewall Free (screenshots)

Interface

ZoneAlarm has unified its security interfaces, so users familiar with one program won't see dramatic changes in another. The left side contains navigation links; the center window is where all the action happens. As noted in the review of ZoneAlarm Extreme Security, it's not a bad design but it doesn't pop visually. The text links can be hard to read because of font choice, and although the center buttons are big, the details within could be easier to read.

Features and support

Designed to be used in conjunction with an antivirus program, the strongest tool in ZoneAlarm's belt is the outbound firewall. Though Windows does offer some outbound protection, it's not activated by default. Most users tend to leave it off because they either don't know about it, or when they do turn it on it regularly interrupts their workflow with pop-up security warnings. Older versions of ZoneAlarm used to be noisy with pop-ups as well, but the new version has been set to be quieter without changing the level of protection. If you prefer, this can be changed in the program settings.

The main window of ZoneAlarm Firewall Free.

(Credit: Screenshot by Seth Rosenblatt/CNET)

During a half-day of testing the default ZoneAlarm Firewall settings, the only pop-ups encountered were those blocking new software installations. The pop-ups for the three programs tested went away and allowed the installation to proceed with one click. More than just a low rate of interference, only encountering pop-ups for program installations is precisely the kind of warning that keeps you aware of what's occurring on your computer without distracting you simply for surfing the Web.

The benefits of an outbound firewall might not be readily apparent. An inbound firewall blocks threats coming in from the outside, but an outbound firewall does more than prevent your computer from spreading viruses and malware to others. If your computer has been compromised by a botnet, for example, outbound protection will stop it from sending your data back to its host servers. It can also stop program spoofing, which is when a malicious program pretends to be a good one, and IP spoofing, which is when harmful network transmissions dress up as safe ones.

This update includes DefenseNet, ZoneAlarm's behavioral detection system of anonymously contributed data that's used to verify and block threats. Previously, it had only been present in ZoneAlarm's antivirus programs. You can opt out from it when you install, but contributing doesn't negatively affect your system's performance.

The ZoneAlarm toolbar has also been given more than a simple spit-shine. You can opt out of installing it when you run the main installer, and install it later if you wish, but ZoneAlarm was quick to point out that it without it key security features are not activated. Hiding the toolbar after it's been installed won't disable its protections, which include the aforementioned signature and heuristic-based antiphishing protections.

It also adds a site check option that can be used to reveal the date founded and physical location of the site and has customizable safe site buttons for launching regularly visited sites such as Facebook or your banking site. The e-mail checker built into the toolbar is compatible with Hotmail, Gmail, Yahoo, RR, Univision, and POP3 accounts. Unfortunately, there's no IMAP support. Finally, the toolbar links to ZoneAlarm's free 2GB of online backup space, courtesy IDrive, and six months free identity theft protection from IdentityGuard.

One of the more annoying limitations of the toolbar is that it only works with Firefox and Internet Explorer, even though Chrome has supported extensions for a year. Given the instability that toolbars contribute to IE, and the clutter that they add to the browser interface, ZoneAlarm would probably get more mileage out of the feature if it was reduced to a single button that opened a new window or expanded a set of buttons.

ZoneAlarm's toolbar revamp includes new, useful features, but it's still a toolbar.

(Credit: Screenshot by Seth Rosenblatt/CNET)

The Help link in the bottom left of the interface only links to the program's Help file. The only in-program access to the online help Web site, in the form of the free knowledge base and forums or paid telephone support during business hours, comes as a link under the Product Info sub-option under Overview on the left nav.

Performance

ZoneAlarm's performance was notable simply for how unnoticeable it was. Shutdown time did not appear to be affected at all, and neither did starting up cold nor rebooting. Changing the antivirus program that it was partnered with didn't affect the firewall's behavior, either. These are big changes from previous versions of ZoneAlarm, and obviously, they're welcome ones, too.

Conclusion

This update of ZoneAlarm Firewall Free should make people do a double-take because of the features and low interference level from the program. It also should do wonders for ZoneAlarm's reputation, but that has more to do with whether years of substandard updates can be erased by a firewall that is the strong, silent type that users need.


Resource: download.cnet.com



Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Establishment of US cyber command may start online arms race

The U.S. Department of Defense declared on May 21 that the Army Forces Cyber Command was launched that day to defend U.S. Internet security. Each department of the U.S. Army has fought against Internet attacks separately for a long time, and now the command will integrate all forces and come up with more powerful countermeasures to hacker attacks.


According to the schedule, the cyber command will be fully operational in October. In an interview, Professor Meng Xiangqing from the National University of Defense said that the newly-launched cyber command in the United States may provoke an arms race on the Internet. It will bring new implications for the world’s safety and stability.

Reporter: The United States Department of Defense recently declared that the cyber command was established. What is the purpose of this cyber command?

Meng: We know that the United States Department of Defense submitted a four-year defense assessment report to Congress on February 1st this year. The report analyzed the new security situation, pointing out that the Internet threat had become more and more serious, and the Internet war might become one of the major tasks that the U.S. Army would be facing.

The Internet, as a public area, would be a major concern to the United States. Actually, the cyber command had already been founded last June. The declaration of the establishment now and the full operation in October was just a part of the cyber command plan last year.

Source: http://english.people.com.cn


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Trend Micro Bundles Consumer Internet Security With Identity Protection and Laptop Theft Recovery Services

Trend Micro teams with IdentityTruth and Absolute Software to deliver computer protection for consumers in one retail package.

CUPERTINO, Calif., May 24 /PRNewswire/ -- Trend Micro announced today a new retail consumer bundle that includes identity protection and laptop theft recovery services for a comprehensive set of consumer security products in one package. The security bundle will offer:

* A one-year subscription of Trend Micro™ Internet Security Standard, which guards against viruses, spyware, spam, Trojans, rootkits, and emerging online security threats.
* A one-year subscription of Computrace® LoJack® for Laptops by Absolute® Software, a provider of firmware-based, patented, computer theft recovery, data protection and secure computer lifecycle management solutions.
* A one-year subscription of identity theft prevention and identity protection monitoring services from identityTruth®, including certified specialist assistance with replacing lost or stolen identification and the remediation of a stolen or compromised identity.


Computrace LoJack for Laptops is powered by the patented Computrace technology from Absolute Software. LoJack for Laptops is virtually undetectable and calls home to the Absolute Monitoring Center with location information. If a computer is reported stolen, the Absolute Theft Recovery Team can gather evidence from the computer to identify the thief's location and works with local police to recover the computer. As an added layer of security, Premium customers can remotely delete data from the stolen computer to help protect their personal information.

IdentityTruth's unique Faster than Fraud™ technology combines data from many different sources -- going beyond simple credit-based protection to deliver a more complete picture of an individual's identity risk. The service continuously combines and analyzes any and all information that is discovered specific to an individual to detect, predict, and alert consumers to suspicious activities, identifying potential identity fraud patterns before fraud happens and providing concrete next-steps to resolve a problem that may arise.

Trend Micro Internet Security provides simplicity and speed when it comes to powerful online protection. It leverages the Trend Micro™ Smart Protection Network™ infrastructure, which works in the background, correlating threat intelligence, protecting in the Internet cloud, and giving consumers -- wherever they are -- immediate, real-time protection competitive products don't offer.

"In today's mobile and connected world, our computers become an extension of our lives. We must protect these valuable assets from internet threats and from data and device theft," said Mark Grace, vice president of consumer business at Absolute Software. "We're excited to be bundled in this offering, and at an attractive price, it provides consumers with the critical security features needed to confidently embrace the power of their mobile devices."

"Financial transactions are no longer limited to the personal desktop computer. Today's consumers use laptops and mobile communication devices for online banking and shopping, to store financial documents, tax returns and more – all of which can put consumers at greater risk of identity theft," said Steven Domenikos, CEO of IdentityTruth "Our partnership with Trend Micro is bringing best-in-class protection to consumers in one retail package."

Pricing and Availability

The retail bundle of one-year subscriptions of Trend Micro Internet Security Standard, IdentityTruth's proactive identity monitoring services, Computrace® LoJack® for Laptops by Absolute® Software is available at Best Buy and www.bestbuy.com for MSRP US $89.99.

About IdentityTruth

IdentityTruth is the leading provider of a new breed of service to help consumers safeguard their Privacy and Identity. IdentityTruth's proprietary technology provides subscribers with advance notice of potential identity fraud so they can take better control to stop it before it becomes costly. IdentityTruth not only detects -- but can actually predict -- possible problems, and that is what makes IdentityTruth Faster than Fraud™. IdentityTruth is a privately-held, VC-funded company headquartered in Waltham, Massachusetts. Investors include Argonaut Ventures and Stata Venture Partners. For more information, go to www.IdentityTruth.com or call 781-684-1300.

About Absolute Software

Absolute Software Corporation (TSX: ABT) is the leader in tracking, managing and protecting computers and mobile devices. The Company's Computrace, Absolute Manage and LoJack® for Laptops solutions provide theft recovery, data protection and computer lifecycle management capabilities to organizations and consumers. The Company's software agent is embedded in the firmware of computers by global leaders, including Acer, ASUS, Dell, Fujitsu, General Dynamics Itronix, HP, Lenovo, Motion, Panasonic and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com and http://blog.absolute.com.

About Trend Micro:

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro™ Smart Protection Network™ infrastructure, a next-generation cloud-client innovation that combines sophisticated cloud-based reputation technology, feedback loops, and the expertise of TrendLabs(SM) researchers to deliver real-time protection from emerging threats. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

Computrace and Absolute are registered trademarks of Absolute Software Corporation. LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein.


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Saturday, May 1, 2010

Symantec confirms acquisition of PGP, winner of SC Magazine's information security vendor of the year

Symantec has made major moves this week to strengthen its product portfolio with the acquisition of both PGP and GuardianEdge.

Under the terms of the agreements, Symantec will acquire PGP for a purchase price of approximately $300 million in cash and GuardianEdge for a purchase price of approximately $70 million in cash. Earlier this week PGP was named as information security vendor of the year at the SC awards, and also won best encryption solution for PGP Whole Disk Encryption and the innovation award for PGP Portable.



The agreements are subject to customary closing conditions, including regulatory approvals, and are expected to be completed during the June quarter. Upon close of the acquisitions, PGP and GuardianEdge will join the Symantec Enterprise Security Group led by senior vice president Francis deSouza.

The acquisitions will see Symantec establish itself firmly in the encryption sector. It claimed that by bringing together PGP and GuardianEdge's standards-based encryption capabilities for full-disk, removable media, email, file, folder and smartphone, with Symantec's endpoint security, data loss prevention and gateway security offerings, Symantec will have the broadest set of integrated data protection solutions.

Following the close of these transactions, Symantec intends to bring together key features and functionality from each company's offerings and standardise on the PGP key management platform in order to deliver centralised policy and key management capabilities across the entire suite of encryption solutions.

Symantec also confirmed that it intends to integrate the PGP key management platform into its Symantec Protection Center, which simplifies security information management by providing customers consolidated access to threat, security and operational dashboards and reporting.

It also said that integrating the PGP key management platform into the Symantec Protection Center will further enhance the management of endpoint security, data loss prevention and gateway security products, which are also integrated with Symantec Protection Center, allowing customers to more seamlessly protect information.

DeSouza said: “As information becomes increasingly mobile, it's essential to take an information-centric approach to security. With these acquisitions we can further protect information by using encryption in an intelligent and policy-driven way to give the right users access to the right information, enabling the trust that individuals and organisations need to operate confidently in an information-driven world.”

Source: scmagazineuk.com


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Thursday, January 28, 2010

Zamzom




Like this post?

Why not to Subscribe to Trend Internet Security news by Email for FREE

What Is Your Opinion About Spy Camera?

Hidden camera is very common is modern life.
If you are planning to fit a supervision camera in your residence or in your working area it is wise to study your states privacy rule & regulations and consider area where you may possibly be in violation, which might consequence in huge fines and/or a prison sentence. It is illegal to set up secret or hidden security cameras in part which is considered to be a confidential place.



United States privacy rules classify a secretive place as everyplace one is capable of is assumed to be out of harm's way from unlawful surveillance. This comprises of areas such as locker rooms, changing stalls, restrooms, bedrooms and lodge rooms. This means that you cannot put in a hidden security camera or voice recording or hearing devices in these areas without prior written down authorization from the person. State regulation regarding security cameras is not standardized across the board. Merely a very few in number of them have regulation concerning hidden camera setting up. Some places like California, Delaware, Georgia, Hawaii, Alabama, Arkansas, Maine, Michigan, Minnesota, New Hampshire, South Dakota, Kansas and Utah.

In nearly all cases facts collected by means of hidden video cameras will still be permissible in a law court if a offense is committed whether authorization was approved or not. Whereas it might be against the law to install a security camera in a vend store dressing room, video recording capturing shoplifters in these areas is still often used to act against unlawful acts. The two circumstances hidden watching is measured against the law are when the possessor of the place has not approved surveillance, or the recorded video/audio is use for banned means.



Privacy law and the utilization of out of sight security cameras is at this time an area of most important argument. This technology has enhanced rapidly in a period of last 10 years and regulations are still being advanced to deal with its execution. Tools that were previously merely obtainable to high end rule enforcement and government spy and are now capable to be buy by everyone. A completely well-designed wireless security camera setup together with transmitter, receiver, or built in records storage can be acquire for as little as $50. This twofold edged sword has permitted persons and business an intelligence of security beforehand unfeasible, but the trouble-free installation of wireless security cameras have also set way to noteworthy mistreatment. Investigation has exposed that even a large portion of legalized security cameras are often used for voyeuristic purpose.

Regrettably they manner it sits at once there is extremely little that can be made to stop people from setting up unlawful spy camera. As a business or proprietor you can remain yourself out of problem by scrutiny your state laws or consulting a private researcher or public prosecutor about your security system association.
It might not be the smallest camera we've ever seen, but the Fake Car Key Spy Camera definitely would be a nice stocking stuffer for an Inspector Gadget in training. The camera is designed to look like a remote device that unlocks a car, shoots video at 29-frames-per-second, snaps photos at a resolution of 1600 x 1200 pixels and records sound, too. There's also a slot for a MicroSD card so you can share your voyeuristic, er... spy vids with buddies. All for $63, and Brando even throws in an 8 gigabyte card for the extra paranoid.

Could you really get away with sneaking pics and videos with this thing? The pinhole-sized lens might not be noticeable, but subjects might wonder why you're pointing a car key remote at them. The only place you'll be able to use this unsuspectingly is in a parking garage. Even then, how long could a person pretend to forget where he parked his car?



Like this post?

Why not to Subscribe to Trend Internet Security news by Email for FREE