October 2016

  1. Encryption Devices - How They Work And When You Might Need To Use One

    Encryption Devices - How They Work And When You Might Need To Use One
    Online and cyber security are absolutely crucial nowadays, especially considering just how much personal and professional data people choose to share online through social networks. You may think that only certain people can see your data, and that your devices are protected through firewalls and anti-virus software – but these could be virtually useless defences against a very determined hacker...
  2. Planning A High Profile Event Or In The Public Eye? Why It's Not Paranoid To Check For Audio Bugs

    Planning A High Profile Event Or In The Public Eye? Why It's Not Paranoid To Check For Audio Bugs
    In the modern world, when technology is so advanced, it’s not that unusual to encounter bugging devices. If you happen to be famous or in the public eye, or you’re organising a high profile or even a top secret event, it’s actually very likely that someone may be using technology to listen in or plant a camera or two. These...
  3. Self Surveillance - The Rising Use Of The In-Car Dashcam

    Self Surveillance - The Rising Use Of The In-Car Dashcam
    In Russia, the epicentre of ‘dashcam culture’, police corruption and insurance fraud scams have led to the installation of over one million dash-mounted cameras in private vehicles. In the 21st century, cameras have become more user-friendly, easily mountable and crucially; inexpensive, with dash mountable cameras available from £200 upwards. The days of pedestrians faking being run over or pre-damaged cars...

3 Item(s)