Home » Technology » Articoli recenti:

How to record conversations in the office, or wherever you want, hiddenly and safely

credit-card-shaped-micro-recorder

Credit card shaped micro recorder REC-CARD. A champion of discretionary and effectiveness on the field!

We know too well there are many efficient and “invisible” micro recorders available on the market. However whenever we take a look at this ultra-thin credit card shaped mini recorder we remain everytime fascinated. That’s the reason why we recommend it to the best Italian and foreign surveillance and investigation agencies. Apart from the unmistakable shape, this incredible digital recorder can start audio recordings of quality thanks to many other interesting features whose particularities you are going to read below.

For the moment we want to point out that this micro recorder has proved to be extremely effective to unmask knavish colleagues or unfaithful business partners, as well as to find out passionate partners who are used to cheat expecially in the office. Anyway, its applications in the audio surveillance field are almost infinite. Furthermore it is not necessary to place it on a desk to go on record effectively: REC-CARD works admirably even when inserted in a wallet or between the pages of a document folder, because of its microphone allowing to capture any type of sound as well as to reach a wide spectrum of audio recorded signals. But that’s not all.

Think for e.g. that the built-in li-ion battery assures up to 35 hours of power when in the recording mode and 150 hours in standby mode! It also provides a high degree of recorded file protection thanks to a password encryption system and a card reader able to connect it to the PC via USB port.

Additionally, it is also possible to record in VAS (Voice Activation Mode) mode and to use pre-programmable timers to start recording automatically. Thus you will realize you have a full voice recording system in your hands! So it has nothing to envy to other flashy and shaky devices of its kind. Moreover the microrecorder is easy to switch on: simply slip two-finger on the card and a red flashing LED, which can be disabled when you want, will alert you that the recording function is on. In short, whether for some unlucky reason the REC-CARD did not yet exist, its invention would be in any case a great idea!

Specification

Sample rate: 24 kHz / 16 kHz / 8 kHz
Bit depth: 4 / 16 / 24 bit
Audio compression: ADPCM, PCM
Dynamic gamma: 90 dB
Power: built-in Li-Pol battery
Power consumption in standby mode: not more than 0.1 mA
Power consumption in recording mode: not more than 4 mA
Battery life in recording mode: 35 hours
Thickness: 1.6mm

For further info, price inquiries or to buy the REC-CARD go here:

If you are not yet convinced watch the following descriptive video about REC-CARD.
We also recommend you to subscribe to our Youtube channel to stay up to date on our formidable audio and video surveillance devices!

How to prevent wireless data theft from your contactless credit card (and not only)

contactless-payment-card

If you are used to pay for your purchases with a contactless card, be careful: your money could be in a serious danger! The blame is on the new electronic pickpockets of contactless cards, who are skilled in money data theft from wireless card without you noticing it. Does that sound like a fake? Read the following words and judge by yourself.

That’s what usually happens: let’s see, you are in queue in a very crowded place, for e.g. at the supermarket, on the tram, at the airport… Suddenly someone approaches you. Due to habitual circumstances you would never imagine the guy behind you actually wants to steal money from your contactless card by using his RFID (Radio Frequency Identification) scanner, similar to a POS device. A scanner of this kind is really able to retrieve data from any credit or debit card when placed at a certain distance; the same case may concern those smartphones equipped with NFC (Near Field Communication) technology, more frequently used to make wireless payments. What is the result? Well, the next time you’ll draw up your account statement you will realize you have been irredeemably stolen!

If you’re still not convinced of that watch the video below.

 

At risk not only payment cards

As you have seen in the video, not only payment cards are at risk. Data fraud and identity theft can be also interest many other personal items such as passports, access control badges, digital identity cards, or coded keys. However the risk of wireless theft becomes very significant when you are in an unsafe busy place.

A practical ultimate solution

anti-rfid-protection-sleevesOne of the most effective solutions to counteract the contactless card piracy is using of special anti-RFID sleeves, such as those provided by Endoacustica Europe, the only ones working like a real Faraday cage. Just think they are able to shield the contactless card chip reading. The protection of your payment card or digital document thus becomes almost total, avoiding any anxiety or worrying. The mentioned sleeves are available in many shapes and colors and are also made of special non-foldable material, customizable with your personal or corporate logo.

For more info and details you can call the no. +39 080-3026530 or fill out the form on the product page.

Worrying escalation of cyber crime around the world. Which are the most affected economical sectors?

cyber-crime

According to the Global Threat Intelligence Report 2017 of NTT Security Group, dealing with the cybercrime trend analysis, in recent years the cyber piracy concerning companies has been increased somewhat. Which are the most affected economical sectors? First of all finance and public administration with a 14% per head of total. Then we find manufacturing companies (13%), retail (11%), education and business (10%), non-profit (7%) technology, health and gaming (5%), transport and insurance (2%). In the end, hospitality and recreation with the 1%.

The report in question is related on the monitoring of thousands of business companies owned by the group which detected over 3.5 trillion logs and 6.2 billion attacks led against companies. The three most affected nations are the United States (63%), Britain (4%), and China (3%), hit by attacks of phishing, email fraud, DDoS and social engineering operations. However the most worrying thing is the total number of attacks: 6 billion a year, which would be roughly 16 million and over daily! A foolish situation which would destabilize even the most pessimistic security analyst.

Thus anyone should reflect on the importance of protecting its own company. But CEOs and business executives are not only worried about computer security. Let’s consider for instance the case of the unauthorized mobile phone tapping. In fact this practice is equally growing all over the world and is used to steal very important corporate informations. Anyway there are some special mobile phones able to protect calls and messages by means of call encryption, or by attempting alarm tapping notices as well as to change IMEI code, as effectively happens about the untraceable GSM and undetectable mobile phone Stealth Phone.

In short, if your company is sailing in these dangerous waters, do not alarm: you can always get out of it adopting effective counter-surveillance instruments. Before it’s too late.

How to find hidden transmitters and spy cameras in few minutes

spy-transmitter-detector

Did you know that home and workplace are the two most common places where you can be spied on? Well, according to statistics carried out by security professionals, they are. Hardly surprising given the extensive use of smartphones, tablets, satellites and other technological devices in todays world. Be careful: we are not talking about wiretapping operations authorized by police or courts but rather about illegal operations undertaken by individuals seeking to gain information without your consent. Business secrets, love matters, political investigations and so on: even the most secure of government and private networks are targeted on a daily basis. There currently exists a variety of counter-surveillance devices which enable you to detect GSM bugs, covert cameras, radio transmitters and so on: one of them is RIL-RF-DIR, a directional bug detector.

RIL-RF-DIR has on its side an extraordinary broadband receiver and a professional frequency meter which immediately finds the modulation of the identified radio frequency. Indeed, it is able to scan all the frequencies of many audio and video surveillance devices. It is especially able to track both analog and digital signals working on GSM900/1800, UMTS(3G), CDMA 450 (453-458 MHz), UMTS 900 networks, cordless, wireless, Bluetooth and many more. In addition, it is also a user-friendly detector: you just need to switch it on to automatically scan the area you are interested in monitoring.  An inner clock enables RIL-RF-DIR to work in surveillance mode to later return a report with all the detected transmissions.

Main advantages and features of directional bug detector RIL-RF-DIR:

  • Small size and weight (it is even smaller than a pack of cigarettes!);
  • Selective reception of radio signals;
  • High speed in data scan and analysis;
  • Detection of radio and digital signals;
  • Different search modes;
  • Audio decoding of radio signals (WFM);
  • Frequency and measuring of level signal;
  • Alarm in case of detecting;
  • Vibration on silent mode;
  • No external antenna required;
  • Long lasting and rechargeable Lithium battery.

As the most technologically advanced product of its kind available today, Directional Bug Detector RIL-RF-DIR is amongst the best of devices in terms of ease of use, practicality and efficiency. Definitely it’s the perfect device for ensuring your online safety by stopping hidden audio and video transmitters once and for all!

 

To get more details or buy the directional bug detector RIL-RF-DIR, please visit this page.

Attention, the cat is spying on us

settembre 11, 2014 Technology No Commenti

After the Anonymous and NSA scandals, the new threat to our digital privacy may come from a sweet kitten. In this case, the spy is called WarKitteh and it’s a collar for cats: while the animal goes around the city, it reports to his master which are the wireless networks more vulnerable and easy to break. The idea, so absurd as to seem like a joke, is of an American security expert and it was created to raise public awareness on the issue of the protection of your home network. No one would think that an innocent animal could be a ruthless spy.

The collar for cats is equipped with GPS sensor and a system able to analyze the safety and protection level of the wi-fi networks. The results are sent to a computer or to a smartphone.  Although the idea may seem ridiculous, the results make you think: of the 23 wireless connections discovered from the cat in the first session, four were not protected by a password, and the same number used the standard WEP security, much easier to decipher than the more widespread standard WPA-2 (the one used by most routers on the market).

The aim is invite to reflect about the high risks that we encounter in the use of wireless networks poorly protected. We talk about privacy, to protect our lives on the web, we are horrified for the big hacker attack and then, however we don’t have the foresight to use the minimum protections for our home networks. The American engineer who developed the cat-spy is working on a smaller and lighter system, designed to be mounted on the back of a bird.

In the market there are numerous systems to crack, powerful and easy to use. These are mostly used by law enforcement, but it’s not excluded that might fall into the wrong hands. So it’s important to make safe the wifi networks as well as the telephone conversations. The informations is, to date, the greatest power in the world.

Australia: the face-to-face with a giant shark filmed by a waterproof camera

giugno 17, 2014 Technology No Commenti

It’s summer, outdoor adventures time. The greatest desire of those who are going to great sporting achievements or to the discovery of new places is surely capture those moments so you can relive and why not, show them to friends and family.

It’s this the case of a boy who wanted to resume its plunge from a cliff in Australia. He wore the helmet with waterproof camera and dived into the water. Just re-emerged, his friends on the cliff shouted him the presence of a shark, but he is not convinced, so he returned underwater to see the big predator. And it was right next to him. At that point are visible moments of fear, he swims toward the shore, with the giant shark around, until he emerges from the water unharmed, but very scared.

On the net there are those who doubt the authenticity of the movie, but the images speak for themselves. The guy has immortalized not only his dip-fetched, but so much more. All this thanks to powerful camera placed on the helmet that has taken clear images even in extreme movement. These are events that happen once in your life, better don’t let them get away.

World Cup in Brazil: “one of the most secure event in the history”

maggio 21, 2014 Technology No Commenti

The 2014 World Cup begins on June 12, this year it will be played in Brazil. Be ready, confident and prepared is the philosophy of Brazil that has decided to invest $7 million for the purchasing of high-tech security officers, already used in Iraq, Afghanistan and Fukushima.

At work already from May these mechanical soldiers are set to be super efficient. An example is the robot PackBot 510, very light, equipped with a mechanical arm, high resolution cameras and a GPS, drivable at distance, it can reach 10 km/h and it’s able to recognize explosive systems and dangerous material.

The Brazilian government has decided to buy about thirty specimens to ensure safety in the 12 cities in which they held football matches. They will have the task of examining suspicious areas and objects and sending images and alerts in case of danger.

This investment of about  € 5.2 million, highlighting the government’s goal of Dilma Rousseff, president of Brazil: to ensure that the World Cup is “one of the most secure in history”. But it isn’t only robots. Brazilian police, in fact, will have the glasses for very advanced facial recognition that will expose the subjects sought thanks to high-definition cameras and a database with about 13 million people registered .

They will also be used four Israeli drones equipped with camera, radar and sensors that will monitor the movement of vehicles and persons at a height between 2 and 5 Km.

And it also looks to the network and online attacks for which Brazil is providing with the necessary security measures implemented through powerful technological tools that ensure maximum security.

Fears of Brazil, in fact, for the event that draws attention from all over the world, football game passionate or not, is violent protests (already in place across the country), and terrorist actions.

Extraordinary growth of software to protect own family

aprile 30, 2014 Technology No Commenti

In the next few years both in Europe and in the United States we’ll see a big increase in family locator devices. These are tools that allow to a parent, for example, to track and locate his children and family, viewing, on any online map, geographic location and movements. To keep an eye on them, it’s enought a computer, a tablet or a smartphone that will operate thanks to a multifunction software which allows you to monitor in real time the subject of our interest. Very often the same program is used to find out betrayals and subterfuges.

According to a study released by research firm Berg Insight until 2016, the users of these services will increase from 16 million in 2011 to 70 million with an annual growth rate of 34%.

In the last months, many adults are downloading free or low cost apps that, most of the time, not only work badly and are easily discovered, they often carry virus and blocking problems on the device used.

There are on the market professional software able to transform a smartphone into a tracking device allowing remote control of the family members most at risk as teenagers and elderly. Among them, there has been reported in terms of high quality, the software proposed by Endoacustica Europe which allows an instant and accurate localization and not only. With the same software you can listen telephone conversations in real time, read the sms and capture clearly what is happening around the phone on which you installed the software.

How to use a voice changer?

aprile 3, 2014 Technology No Commenti

We are usual to think that a voice changer is a toy to make prank phone calls and have fun with friends. But the device has potentials much more higher and in many cases it has been of help to get out of difficult situations.

Take, for example, the story told by Elena, a 81-year old lady, who lives alone in her house. For about two months was haunted by phone calls from spiteful people intent to break into her apartment after verifying that the lady was always alone.  But Elena’s sons haven’t had afraid by the threats and have connected a voice changer to the phone. In this way, the voice of the lady who answered to the phone appeared, on the other side of the receiver, a clearly masculine voice. The result? The calls have ended in about a week. But Elena doesn’t renounce more to her voice changer.

Even more alarming is Rosaria’s story, 33-year old, stalked by her ex-husband. To ease the burden of continuous calls, she has pretended to be a man, a new partner, installing a voice changer on her cell phone and starting fake interferences during the call, again through the same device.

And there would be many other cases reported by Endoacustica Europe‘s customers after the introduction of powerful voice transformer provided by the company. Charles, who has freed himself of his mother-in-law with fake baby crying, Lucy, who spoke like a man to his employer too confidential and James that he pretended the sensual lover of himself to retake Miriam. And he succeeded!

Low cost microphones, micro bugs and micro recorder

gennaio 29, 2014 Technology No Commenti

Directional microphones as big as a pin. Micro cameras and micro bugs hidden in eyeglasses or sunglasses, common pens, keys and key rings, buttons, shirts, pillows and stuffed animals. In short, everywhere. Batteries that last for hours and turn on  from a distance or turn on/off automatically when they receive a noise. The market for  bugs and their derivatives is constantly evolving and the offer is really wide. Bargain prices and low cost solutions for products which are often throwaway. The key isn’t spending a fortune, but only knowing how to evaluate an offer. You know that it’s really difficult to have a rechargeable GSM bug, at unlimited distance, at 19.90€. But the same will be sold by companies able to guarantee it for life, spending a couple of hundred euro. And the investment is done.

If you want exaggerate, at 499 euros you can buy a software able to intercept and transfer every phone conversation and even text message. And there’s no need to be friends with CIA agents: it’s enough a visit on the site www.endoacustica.com, leader company in the field, that also sells online all type of gadgets for investigators more or less professional, from jealous husband to more experienced  agent. And the power supply is no longer a problem, just think of the bugs that find their natural habitat within the electrical outlets.

The truth is that, as many have commented, there isn’t a place not suitable to place a bug. And above all, in every corner of the planet you can pick up useful informations. A meeting room, the study or the home of a bureaucrat or a politician, but also a suspect enterprise. The operating modes are truly endless.

The reality is often much easier than it looks. Just use the right tools.

Calendar

luglio: 2017
L M M G V S D
« Giu    
 12
3456789
10111213141516
17181920212223
24252627282930
31  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …