enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Covert listening device - Wikipedia

    en.wikipedia.org/wiki/Covert_listening_device

    During World War II, the Nazis took over a Berlin brothel, Salon Kitty, and used concealed microphones to spy on patrons. Also during the war, the British used covert listening devices to monitor captured German fighter pilots being held at Trent Park. In the late 1970s, a bug was discovered in a meeting room at the OPEC headquarters in Vienna.

  3. The Thing (listening device) - Wikipedia

    en.wikipedia.org/wiki/The_Thing_(listening_device)

    The device, embedded in a carved wooden plaque of the Great Seal of the United States, was used by the Soviet government to spy on the US. On August 4, 1945, several weeks before the end of World War II , a delegation from the Young Pioneer Organization of the Soviet Union presented the bugged carving to Ambassador Harriman, as a "gesture of ...

  4. How often are parents spying on their kids online? - AOL

    www.aol.com/often-parents-spying-kids-online...

    All About Cookies surveyed U.S. parents to learn how many track their children's online activities and physical location, and what the most popular methods are.

  5. Internet-connected toys accused of spying on kids - AOL

    www.aol.com/news/2016-12-06-internet-connected...

    Over 18 privacy groups are filing complaints with both the US' Federal Trade Commission and the European Union alleging that Genesis Toys and its tech partner Nuance are violating deceptive ...

  6. OLPC XO - Wikipedia

    en.wikipedia.org/wiki/OLPC_XO

    The XO-1 is designed to be low-cost, small, durable, and efficient. It is shipped with a slimmed-down version of Fedora Linux and a custom GUI named Sugar that is intended to help young children collaborate. The XO-1 includes a video camera, a microphone, long-range Wi-Fi, and a hybrid stylus and touchpad. Along with a standard plug-in power ...

  7. Shoulder surfing (computer security) - Wikipedia

    en.wikipedia.org/wiki/Shoulder_surfing_(computer...

    However, the advent of modern-day technologies like hidden cameras and secret microphones makes shoulder surfing easier and gives the attacker more scope to perform long-range shoulder surfing. A hidden camera allows the attacker to capture the whole login process and other confidential data of the victim, which ultimately could lead to ...

  8. Nabaztag - Wikipedia

    en.wikipedia.org/wiki/Nabaztag

    Out of the box, the Nabaztag rabbit is 23 cm (9.1 in) in height and weighs 418 g (14.7 oz). It can send and receive MP3s and messages that are read out loud as well as perform the following services (by either speaking the information out loud or using indicative lights): weather forecast, stock market report, news headlines, alarm clock, e-mail alerts, RSS-Feeds, MP3-Streams and others.

  9. Cellphone surveillance - Wikipedia

    en.wikipedia.org/wiki/Cellphone_surveillance

    Cellphone spying software enables the monitoring or stalking of a target cellphone from a remote location with some of the following techniques: [14] Allowing remote observation of the target cellphone position in real-time on a map; Remotely enabling microphones to capture and forward conversations. Microphones can be activated during a call ...