The majority of attacks on mobile devices focused on human exploitation, as found in the Proofpoint Human Factor Report.
Gil Boyd is an expert in physical security measures and warned us of the dangers of unmanned drones 4 years ago in this article he wrote for the Circuit. After the recent chaos caused by drones at Gatwick airport, London, UK, it would be worth reminding ourselves of the threat posed by this unregulated, flying […]
For those of us who use cameras in our professional work, particularly when conducting surveillance tasks you’re going to need something a bit more powerful than a compact. Choosing the best camera for surveillance can be mind-boggling.
Choosing Camera Lenses for Surveillance is equally, if not more, important than choosing the camera body. Two of the most important considerations are the focal length and the speed.
Endless new offerings on the market may seem overwhelming and daunting to customers when choosing the most efficient security system for their home’s needs.
We have done the late night research and have narrowed down the top 5 new home technologies for all homeowners, to assist with your decision making.
Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.
Placing up security cameras can be a legal battlefield if you’re proven to be violating the law. Here are the things you need to know legally when considering the placement of residential security systems around a property
You need to be aware of how criminals and terrorists operate and what they look for in their victims; if you know this, you can hopefully avoid becoming a victim yourself.
Shipbroker Clarksons confirmed its computer systems were breached in a major cyber-security attack. Today, more than ever, cyber security has to be the number one priority for the shipping industry. Naval Dome will be working with key stakeholders to establish global cyber maritime defence standards and guidelines
There is no better time than now to dive into the world of zero day vulnerabilities. This article looks at how zero days behave, assesses some of the most infamous examples of them, and perhaps most importantly, provides best practices for how to deal with these elusive threats.