
How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…
Kevin D. MurrayAugust 6, 2024

(PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…
Kevin D. MurrayJune 27, 2024

IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…
Kevin D. MurrayJune 27, 2024

(PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…
Kevin D. MurrayJune 27, 2024

Detecting Apple AirTags, Tile Tags, and More Location tags, products like Apple AirTags and Tile…
Kevin D. MurrayJune 27, 2024

This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…
Kevin D. MurrayJune 27, 2024

Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…
Kevin D. MurrayJune 27, 2024

Guess what all these superheroes have in common. Superman Wolverine Supergirl Power Girl Green Lantern…
Kevin D. MurrayJune 27, 2024

A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…
Kevin D. MurrayJune 17, 2023

What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…
Kevin D. MurrayMarch 15, 2023

When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…
Kevin D. MurrayJanuary 18, 2023

Never let your wireless key fob out of your control. Wireless key fobs are useful.…
Kevin D. MurrayJanuary 17, 2023

(PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…
Kevin D. MurrayNovember 13, 2022

The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…
Kevin D. MurrayNovember 13, 2022

(PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…
Kevin D. MurrayNovember 13, 2022

(VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is any cable…
Kevin D. MurraySeptember 26, 2024

(pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…
Kevin D. MurrayNovember 15, 2022

(PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…
Kevin D. MurrayNovember 15, 2022

(PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…
Kevin D. MurrayNovember 13, 2022

Spyware Detection Tips Mobile phones have secret lives. When we are not using them, they…
Kevin D. MurrayJuly 11, 2024

Evolution of the Spy Generation Spying as a method of getting ahead in business, was…
Kevin D. MurrayNovember 13, 2022

What happens when you lose your smartphone? Chances are, your lost smartphone screen will look…
Kevin D. MurrayNovember 13, 2022

USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…
Kevin D. MurrayNovember 13, 2022