Table of Contents Toggle What is deepfake?Black PR of deepfakesFrom Reddit to TiktokThreats beyond the borders of cyberspaceHow to detect a deepfake? Experts at the World Economic Forum are sounding the alarm: deepfake technology is spreading at a dizzying pace. The estimated number of fake ...
Table of Contents Toggle The condition of Russia's intelligence servicesLarge-scale intelligence operationsIdentity of illegals - who are Russian spies?Pavel Buczka – a reserve general in the Slovak defense ministrySergei Vladimirovich Cherkasov – trainee at the Hague TribunalOlga Kolobova – a businesswoman at the NATO command ...
Table of Contents Toggle Required two-factor authentication vs. online securitySecurity questions - effectivenessWhy are security questions not always secure?Security question - good practicesSecurity questions - FAQWhat is two-factor authentication?What is a security question?Is two-step verification secure? You enable two-factor authentication when logging in, or you ...
Table of Contents Toggle Children of political youth at the service of the KGB, or how the Russians installed a wiretap in the American embassyElectronic music genius in a Gulag laboratory"The Thing" - a precursor to RFID technologyMutual espionage and confrontationModern wireless wiretapsThe Thing/The Great ...
Table of Contents Toggle What do Soviet physicists and American technology have in common? History of stealth technologyInvisible camouflage - stealth technology in practiceThe first stealth aircraftThe high price of invisibility – limitationsStealth technology - FAQHow does radar work?What is stealth technology based on?Who invented ...
Table of Contents Toggle "My wife is cheating on me" - when to wiretap her phone?Discreet eavesdropping on the wife's phone - what is it?How to set up a wiretap on your wife's phone? 3 easy stepsWife under control. What are the benefits of phone ...
Table of Contents Toggle Zero-day vulnerability - a threat to company securityZero-day exploit - attack targeting a weak pointHow do hackers carry out a zero-day exploit attack?Zero-day vulnerability detection and attack preventionWindows Defender Exploit GuardPatch management system and system updates(Cyber)education of company employeesZero-day vulnerabilities - ...
Table of Contents Toggle Casting for a nanny, or how to choose a babysitterDetermine your requirementsMeet the candidatesCheck the information obtainedUse the services of a private investigator5 ways to control a babysitter Get home faster Neighborhood monitoring Discreet eavesdropping in a toy or stroller Hidden ...
Table of Contents Toggle Open-source intelligence - what is it?What can be learned from open-source intelligence?How not to let yourself be invigilated?How do scammers use open-source intelligence? Techniques Your Facebook profile is an open source of knowledge. Innocent content sharing can provide valuable information to ...
Table of Contents Toggle Monitoring in a hotel - when are cameras legal?Cameras in a hotel room - where are they hidden?Using a flashlightUsing the appUsing network scanningEffective camera detection with a professional camera detectorHidden camera in a hotel room - FAQCan there be cameras ...
Welcome to our blog!
In daily life we often encounter difficult and delicate problems. This blog was designed with proper and accessible solutions to these problems in mind. The experience we gathered during 7 years of running Detective Store chain makes us experts in the field of security.
Detective Store is a chain of detective shops operating on the market since 2007. Our aim is to provide our customers with high-quality equipment and professional technical service. Trained staff guarantees individual approach to our customers’ needs. Every year, more and more customers put trust in our products.