Surveillance+software

Showing results 1 to 20 of 30

SurveilStar

SurveilStar is a powerful and easy-to-use PC monitoring, employee monitoring software that improves productivity. It records every...

December 15, 2014 by SurveilStar

TechproSS HD Plus

**Please note that this Paid version is designed for use on iPad which have larger screens than most iPhones.Techpro iPad Surveillance...

December 15, 2014 by Techpro Security Products

AFP denies using TrapWire

The Australian Federal Police has denied that it uses TrapWire surveillance software to track Australian citizens, but the Australian Security Intelligence Organisation would not confirm nor deny if it uses the controversial software.

September 9, 2012 by

EyeLine Video Surveillance System

EyeLine Video Surveillance Software puts the power of security in your hands. This powerful system provides peace of mind whether you...

December 14, 2014 by NCH Software

Linux.conf.au 2012: planes and freedom

For security researcher, software hacker and activist Jacob Appelbaum, the equation is clear. Anyone working on surveillance or censorship technology is part of a serious global problem.

January 20, 2012

Apple took years to fix iTunes spyware vulnerability

Apple took more than three years to fix a hole in its iTunes updater that allowed the software to be used as a distribution vector for spyware.A recent Wall Street Journal report detailed off-the-shelf surveillance software used by regimes such the one that fell in Egypt earlier this year.

November 25, 2011 by

Stream your own live video to your mobile phone

HAVA is a networked appliance that can encode a video source in real-time and stream it to your mobile phone. For example, you can connect a surveillance camera to the HAVA box and you will be able to watch the surveillance video on your mobile phone, via the HAVA mobile client software.

November 19, 2008 by

Biometric IDs for African penguins?

University of Bristol researchers have developed a non-intrusive visual surveillance system for wildlife habitats. They've used their system to monitor the behavior of 20,000 African penguins on Robben Island in South Africa. By definition, conventional tagging techniques can only monitor animals which have been tagged. On the contrary, the 'Penguin Recognition Project' relies on visual recognition software. The scientists claim that they can correctly identify an individual penguin 'with around 98 per cent reliability' -- how can they measure this? They also claim that their approach could be used to monitor other endangered species, such as zebras or sharks. But read more...

June 28, 2008 by

Identifying a face from a single picture

Law enforcement officers around the world can be happy today. A computer scientist and PhD candidate from the Umeå University in Sweden has developed algorithms that give a computer the possibility of recognizing a face, even if only one picture exists in the database used to identify criminals or suspects. The software can synthesize other images of a single face using various angles, light conditions or facial expressions. This means that at a security control, a police officer should be able to compare an image taken by a surveillance camera with all the variants of the images contained in their databases. This is at the same time brilliant and frightening. But read more...

January 29, 2008 by

Smart surveillance network software for phones

Software that can turn camera phones into a rough and ready surveillance network has been developed by Swiss scientists, reports the New Scientist.Yes, the country that brought us the cuckoo clock and a handy place to store any gold teeth or conflict diamonds we may have somehow chanced upon has now brought us software to link mobile phones together in a surveillance network.

November 2, 2007 by

In China, spying on citizens moves to a new level

China Public Security Technology sounds like the R&D outfit of some nameless, faceless Communist bureaucracy. It is after all the organization that is deploying 20,000 surveillance cameras along streets in Shenzhen in southern China along with software to do facial recognition.

August 13, 2007 by

Police granted powers to install spyware and Trojans

The Australian police have been given the power to install spyware and Trojans on suspected criminals' computers under the new Surveillance Devices Act.The Surveillance Devices Act allows both Federal and State police to use keylogging and tracking software when investigating Commonwealth offences that carry a maximum sentence of three years, according to the Sydney Morning Herald.

December 14, 2004 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories