Skip to content

Blog

STAGING TSCM ACTIVITY

In this article, I would like to separately touch on two topics – the preliminary or preparatory stage when searching for bugs, unauthorized channels for information risks, countering unauthorized receipt of information, and also possible ways to identify installations for reconnaissance equipment. Preliminary stage As I wrote above,… Read More »STAGING TSCM ACTIVITY

IS IT POSSIBLE TO BE A TSCM SPECIALIST WITHOUT TECHNICAL EQUIPMENT

From the common name it follows that TSCM professional must have a combination of professional skills and technical equipment to conduct a high-quality inspection and identify, minimize the use of identified vulnerabilities for potentially unauthorized information risks. Professional skills and experience As strange as it may sound, our… Read More »IS IT POSSIBLE TO BE A TSCM SPECIALIST WITHOUT TECHNICAL EQUIPMENT

YORKIE-PRO

GSM-WIFI-Bluetooth RF search system From Berkeley Varitronics Systems (BVS), a company that designs and manufactures world-class wireless security products for TSCM specialists and government organizations to manage the wireless security of secure facilities. The system serves to locate modern wireless, Wi-Fi, Bluetooth and 3G / 4G / 5G… Read More »YORKIE-PRO

Airtags follow you

I have been using Apple AirTags for some time to follow objects that I could lose or that could be stolen, this technology is comparable to a real GPS, years ago I found that by disassembling them they can be inserted into any object, especially if we move… Read More »Airtags follow you

Forensic reports and the utc

How to correctly read dates and times on Cellebrite UFED forensic reports General information about the time Everything is based on the meridian of Greenwich, in Great Britain, which is the starting point, the so-called meridian Zero, where zero is the longitude. It crosses the Astronomical Observatory located in the… Read More »Forensic reports and the utc

FORENSIC FIELD

Computer forensics is the discipline of forensic science related to the acquisition of evidence from computers or other digital devices. The aim is to examine the electronic material following forensic analysis processes (guidelines, shared practices) in order to identify, preserve, acquire, recover, analyze and present evidence in a… Read More »FORENSIC FIELD

HACK5

The hacking swiss-tools bazar Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong. WWW.HAK5.ORG WIFI PENTESTING Automate WiFi auditing with all new campaigns and get actionable results… Read More »HACK5

Hacker

When you hear “hacker” word, what comes to your mind? Is the popular image of an unknown shady hooded figure from a basement stealing your digital identity? The truth is, hacking, just like technology, has morphed into a different, negative topic, but how were hackers born? It all… Read More »Hacker