Table of Contents Toggle What is deepfake?Black PR of deepfakesFrom Reddit to TiktokThreats beyond the borders of cyberspaceHow to detect a deepfake? Experts at the World Economic Forum are sounding the alarm: deepfake technology is spreading at a dizzying pace. The estimated number of fake ...

Table of Contents Toggle The condition of Russia's intelligence servicesLarge-scale intelligence operationsIdentity of illegals - who are Russian spies?Pavel Buczka – a reserve general in the Slovak defense ministrySergei Vladimirovich Cherkasov – trainee at the Hague TribunalOlga Kolobova – a businesswoman at the NATO command ...

Table of Contents Toggle Required two-factor authentication vs. online securitySecurity questions - effectivenessWhy are security questions not always secure?Security question - good practicesSecurity questions - FAQWhat is two-factor authentication?What is a security question?Is two-step verification secure? You enable two-factor authentication when logging in, or you ...

Table of Contents Toggle Children of political youth at the service of the KGB, or how the Russians installed a wiretap in the American embassyElectronic music genius in a Gulag laboratory"The Thing" - a precursor to RFID technologyMutual espionage and confrontationModern wireless wiretapsThe Thing/The Great ...

Table of Contents Toggle What do Soviet physicists and American technology have in common? History of stealth technologyInvisible camouflage - stealth technology in practiceThe first stealth aircraftThe high price of invisibility – limitationsStealth technology - FAQHow does radar work?What is stealth technology based on?Who invented ...

Table of Contents Toggle "My wife is cheating on me" - when to wiretap her phone?Discreet eavesdropping on the wife's phone - what is it?How to set up a wiretap on your wife's phone? 3 easy stepsWife under control. What are the benefits of phone ...

Table of Contents Toggle Zero-day vulnerability - a threat to company securityZero-day exploit - attack targeting a weak pointHow do hackers carry out a zero-day exploit attack?Zero-day vulnerability detection and attack preventionWindows Defender Exploit GuardPatch management system and system updates(Cyber)education of company employeesZero-day vulnerabilities - ...

Table of Contents Toggle Casting for a nanny, or how to choose a babysitterDetermine your requirementsMeet the candidatesCheck the information obtainedUse the services of a private investigator5 ways to control a babysitter Get home faster Neighborhood monitoring Discreet eavesdropping in a toy or stroller Hidden ...

Table of Contents Toggle Open-source intelligence - what is it?What can be learned from open-source intelligence?How not to let yourself be invigilated?How do scammers use open-source intelligence? Techniques Your Facebook profile is an open source of knowledge. Innocent content sharing can provide valuable information to ...

Table of Contents Toggle Monitoring in a hotel - when are cameras legal?Cameras in a hotel room - where are they hidden?Using a flashlightUsing the appUsing network scanningEffective camera detection with a professional camera detectorHidden camera in a hotel room - FAQCan there be cameras ...

error: Content is protected !!