AICorporate SecurityCybersecurityEspionage AI Lip Reading: Eavesdropping Without a Microphone or Laser Eavesdropping via lip reading has been around a long time, probably since Og saw Charlie…Kevin D. MurrayOctober 2, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant: A Checklist & Tips How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayAugust 6, 2024
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyTSCM Eavesdropping with Hearing Aids: How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayJune 27, 2024
BluetoothCybersecurityPersonal PrivacyTSCM Detecting Stalking Tags Detecting Apple AirTags, Tile Tags, and More Location tags, products like Apple AirTags and Tile…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…Kevin D. MurrayJune 27, 2024
BluetoothCorporate SecurityCybersecurityEspionage Eavesdropping and Super Hearing Pucks Guess what all these superheroes have in common. Superman Wolverine Supergirl Power Girl Green Lantern…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityDroneEspionageHistorical High-Stakes Corporate Espionage A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…Kevin D. MurrayJune 17, 2023
Corporate SecurityCybersecurityTSCM Flipper Zero – Corporate Security Threat What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…Kevin D. MurrayMarch 15, 2023
Corporate SecurityCybersecurity How to Spot Counterfeit IT Gear When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…Kevin D. MurrayJanuary 18, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is any cable…Kevin D. MurraySeptember 26, 2024
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…Kevin D. MurrayNovember 13, 2022
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Detection Tips Mobile phones have secret lives. When we are not using them, they…Kevin D. MurrayJuly 11, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
CybersecuritySmartphone Security Lost Smartphone Recovery Tip What happens when you lose your smartphone? Chances are, your lost smartphone screen will look…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022