Feeds

Epsionage gadgets spied online

Keep it under your hat

Choosing a cloud hosting partner with confidence

The kind of gadgets created by Q in the James Bond films are coming to consumers. Online retailer Brando has begun selling devices for listening in on and blocking other people's telephone calls, helping every wannabe 007 get a little closer to MI5.

Sim_Card_Spy_Ear
Sim Card Spy Ear: the phone that listens in

Slot your SIM card into the Sim Card Spy Ear, for example, and then discretely position it near to the conversation you'd like to listen in on, such as your colleagues' salary negotiations. Once the discussions kick off, dial the SIM card's number on another phone and the Spy Ear's three microphones will relay the conversation for you.

Sim_Card_Spy_Ear_2
Sim Card Spy Ear: what's he saying about you?

It measures 7 x 4 x 2cm, or about the size of a small block of Semtex, weighs 55g and is charged via USB.

And if you get caught using it, don't blame us.

Phone_Jammer
Phone Jammer: stop the conversation dead

If you'd rather block a conversation altogether, then the Phone Jammer does just that. It operates over quad-band GSM frequencies - 850, 900, 1800 and 1900MHz - and only requires you to be within 5-10m of a conversation for you to jam it.

Phone Jammer measures 6 x 7 x 2cm, so should fit easily into the palm of your hand, and is powered by an internal rechargeable battery pack. Be careful about which conversations you block though, as the emergency services won't be too pleased if you obstruct their communications.

Both the Sim Card Spy Ear and Phone Jammer are available now from Brando's website for $85 (£43/€65) and $166 (£83/€115) respectively. Please send payment in unmarked American Dollar bills to PO Box...

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.