Table of Contents What is deepfake?Black PR of deepfakesFrom Reddit to TiktokThreats beyond the borders of cyberspaceHow to detect a deepfake? Experts at the World Economic Forum are sounding the alarm: deepfake technology is spreading at a dizzying pace. The estimated number of fake videos ...

Table of Contents The condition of Russia’s intelligence servicesLarge-scale intelligence operationsIdentity of illegals – who are Russian spies?Pavel Buczka – a reserve general in the Slovak defense ministrySergei Vladimirovich Cherkasov – trainee at the Hague TribunalOlga Kolobova – a businesswoman at the NATO command in ...

Table of Contents Required two-factor authentication vs. online securitySecurity questions – effectivenessWhy are security questions not always secure?Security question – good practicesSecurity questions – FAQWhat is two-factor authentication?What is a security question?Is two-step verification secure? You enable two-factor authentication when logging in, or you forgot ...

Table of Contents Children of political youth at the service of the KGB, or how the Russians installed a wiretap in the American embassyElectronic music genius in a Gulag laboratory“The Thing” – a precursor to RFID technologyMutual espionage and confrontationModern wireless wiretapsThe Thing/The Great Seal ...

Table of Contents What do Soviet physicists and American technology have in common? History of stealth technologyInvisible camouflage – stealth technology in practiceThe first stealth aircraftThe high price of invisibility – limitationsStealth technology – FAQHow does radar work?What is stealth technology based on?Who invented stealth ...

Table of Contents “My wife is cheating on me” – when to wiretap her phone?Discreet eavesdropping on the wife’s phone – what is it?How to set up a wiretap on your wife’s phone? 3 easy stepsWife under control. What are the benefits of phone eavesdropping?Is ...

Table of Contents Zero-day vulnerability – a threat to company securityZero-day exploit – attack targeting a weak pointHow do hackers carry out a zero-day exploit attack?Zero-day vulnerability detection and attack preventionWindows Defender Exploit GuardPatch management system and system updates(Cyber)education of company employeesZero-day vulnerabilities – FAQWhat ...

Table of Contents Casting for a nanny, or how to choose a babysitterDetermine your requirementsMeet the candidatesCheck the information obtainedUse the services of a private investigator5 ways to control a babysitter Get home faster Neighborhood monitoring Discreet eavesdropping in a toy or stroller Hidden camera ...

Table of Contents Open-source intelligence – what is it?What can be learned from open-source intelligence?How not to let yourself be invigilated?How do scammers use open-source intelligence? Techniques Your Facebook profile is an open source of knowledge. Innocent content sharing can provide valuable information to people ...

Table of Contents Monitoring in a hotel – when are cameras legal?Cameras in a hotel room – where are they hidden?Using a flashlightUsing the appUsing network scanningEffective camera detection with a professional camera detectorHidden camera in a hotel room – FAQCan there be cameras in ...

error: Content is protected !!