10 Notable Things That Hackers Can Hack Into

At the start of the century it would have been unthinkable that public safety could be compromised by criminals sitting in their own living room. However, with the rapid increase in internet-connected devices, hackers can cause havoc on many different fronts. Consequently, IFSEC Global have highlighted 10 things that hackers could gain control of, or, already have done so. Here’s a list […]

Read more

Crime Bytes: Fighting Festival Crime – the new high tech techniques introduced by police this festival season

In the run up to festival season, this article provides a quick insight into the new high tech crime fighting techniques that are being employed by police forces this year, in a bid to tackle organised theft across the country. In Leicestershire a cashless payment system has been introduced for Download festival, in an effort to reduce the amount of […]

Read more

ASIS 2014 Book of the Year nomination: The Handbook of Security – Edited by Martin Gill

The second edition of The Handbook of Security has been nominated as one of the titles considered for the ASIS 2014 Book of the Year Award. The fully revised second edition of The Handbook of Security includes chapters from the world’s leading authorities with contributions from US, Canada, Europe, Australia and Asia. It provides what is probably the most comprehensive […]

Read more

IFSEC International, 16-18th June 2015, ExCel, London

Taking place on 16-18th June 2015 at the ExCeL London, IFSEC International is the largest event for the security industry, bringing together the entire security buying chain in one place. For more than 40 years we’ve been at the centre of the security industry, ensuring excellence and innovation at each ground breaking event. This event will attract more than 30,000 visitors, and […]

Read more

Crime Scene Investigation in the Virtual World

virtual reality

With the upcoming release of the Oculus Rift and Microsoft Hololens, virtual reality is set to explode into the mainstream market. Using a headset with special stereoscopic displays, the wearer is immersed into an interactive computer-generated 3D environment, in which his/her movements are tracked and displayed back to the user – creating the illusion that they are inside a virtual world. […]

Read more

Solving Crime with Only a Hum: The Power of the National Grid

Audio recordings can sometimes be crucial evidence in criminal investigations – footage of a suspected terrorist planning an attack, CCTV footage of a crime, or a secret recording capturing an admission of guilt – but how can the police ensure that recordings are genuine and haven’t been tampered with? Incredibly, forensic scientists have created a technique that can analyse the […]

Read more

Interviewing Burglars Research Findings featured in The Times

In research commissioned by Churchill Home Insurance, Perpetuity Research interviewed 15 convicted burglars to help understand what factors motivate burglary. Burglars reported enjoying the ‘thrill of the chase’ or the ‘buzz’ of breaking into peoples homes. However the findings revealed that the need for money to fund drug addictions was a major motivation for many burglars, who would steal goods […]

Read more

New Handbook of Security – Edited by Martin Gill -Out Now! Exclusive 20% discount!

Extensively updated, expanded and reorganised, this new edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. Informed by a range of disciplines, including environmental science, criminology, politics and economics, it brings together contributions from some of the world’s leading scholars to explore the most important issues impacting our understanding of […]

Read more

The Handbook of Security – Second Edition

The fully revised second edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. Including contributions from some of the world’s leading scholars, it explores a range of issues and debates that impact our understanding of how security is provided. Consisting of over forty chapters, the volume considers an array of topics such as […]

Read more
1 2 3