source: bbc.com

Is workplace surveillance about improving productivity or simply a way to control staff and weed out poor performers?

Courtney Hagen Ford, 34, left her job working as a bank teller because she found the surveillance she was under was "dehumanising".

Her employer logged her keystrokes and used software to monitor how many of the customers she helped went on to take out loans and fee-paying accounts.

"The sales pressure was relentless," she recalls. "The totality was horrible."

She decided selling fast food would be better, but ironically, left the bank to do a doctorate in surveillance technology.

Courtney is not alone in her dislike of this kind of surveillance, but it's on the rise around the world as firms look to squeeze more productivity from their workers and become more efficient.

More than half of companies with over $750m (£574m) in annual revenue used "non-traditional" monitoring techniques on staff last year, says Brian Kropp, vice-president of research firm Gartner.

These include tools to analyse e-mails, conversations, computer usage, and employee movements around the office. Some firms are also monitoring heart rates and sleep patterns to see how these affect performance.

In 2015, 30% used such tools. Next year, Mr Kropp expects 80% will.

And workforce analytics will be a $1.87bn industry by 2025, says San Francisco's Grand Review Research.

So why is business so keen?

  source: military.com

The U.S. Army will soon field more pocket-sized drones to its squads and platoons under a recent $39.6 million contract award to FLIR Systems Inc. to support small-unit reconnaissance efforts.

The FLIR Black Hornet Personal Reconnaissance System, or PRS, resembles a tiny helicopter and flies almost silently. Soldiers can use the onboard camera to look around corners in urban areas or recon unfamiliar terrain.

 

"The highly capable nano-unmanned aerial vehicle (UAV) systems delivered under this contract will support platoon and small-unit level surveillance and reconnaissance capabilities as part of the Soldier Borne Sensor (SBS) Program," according to a recent FLIR press release.

The Army awarded the first SBS phase contract to FLIR for an initial batch of Black Hornets in June, the release states. This latest contract will expand the use of FLIR's Black Hornet for the SBS effort.

 source: technewsworld.com

A new year means a fresh start, but it doesn't mean that old threats will go away. In fact, in the world of cybersecurity things could get far worse before they get better. Cybercrime continues to increase, as it allows nefarious actors to operate at a safe distance from victims -- and more importantly, law enforcement.

Because it rarely is violent in nature, cybercrime often doesn't get the same response from international law enforcement as other types of crimes. It is far from victimless, however. It is a threat of enormous magnitude, with the potential to affect nearly every company in the world. It even ranks as one of the biggest problems plaguing mankind.

On a global basis, cybercrime will cost US$6 trillion annually by 2021, double the toll of 2015, according to the Official 2019 Annual Cybercrime Report from Cybersecurity Ventures.

This is the largest amount of money generated by illicit means, and it could represent the greatest transfer of economic wealth in history. Cybercrime soon will be more profitable than the global trade of all major illegal drugs combined!

Cybercrime is not one thing. It is many -- and fighting it requires understanding the various shapes it comes in. Following is a look at the various types of cybercrime, and things that can be done to fight it.

One of the original cybersecurity threats hardly has evolved, but it is unlikely to go away anytime soon.

 source: darkreading.com

Lookout Phishing AI, which discovered the attack, says it has been going on since late November.

Verizon is warning customers about a phishing campaign that is going specifically after mobile users.

Mobile devices have emerged as an effective attack vector, according to Jeremy Richards, principal security researcher at Lookout Phishing AI, which discovered the phishing kit. 

"Since many mobile devices lack traditional security, I expect we will continue to see these attacks increase alongside mobile device usage," Richards wrote in a blog post earlier this week. "These attacks, when opened on a desktop, clearly look like a poorly made phishing domain, but on a mobile device, they look legitimate."

When users open the phishing email on a mobile device, it looks like it's from Verizon customer support, according to Richards. The campaign has, in fact, been going on since late November; to date, the attackers have registered some 51 Verizon customer phishing domains. Verizon has been made aware of the issue, Richards wrote, and has been suspending 

Aaron Higbee, chief technology officer and co-founder at Cofense, says while it's true that mobile phishing attacks are on the rise, he believes the attack Lookout reported largely focuses on consumer-side attacks.