Your cart is currently empty!
Our Blog
-

Securing Our Ports of Entry
If this most recent presidential election has taught us anything about national priorities, it has told us that border security is atop that list. President Trump’s mass deportation and aggressive…
-

Frozen Secrets: Cold Boot Attacks Unlock RAM’s Hidden Data
In cybersecurity, we often treat RAM—random access memory—as ephemeral. It’s volatile, fleeting, and supposedly erased the moment a device loses power. But what if that assumption doesn’t hold up under…
-

The Silent Fear: Why Women Hesitate to Report Stalking and How Technology Enables It
Stalking is a crime that leaves victims feeling powerless, exposed, and constantly on edge. For many women, the experience is not just about the fear of physical harm but also…
-

Card skimmers beyond skim-deep
In the ongoing battle between fraudsters and security professionals, criminals have once again evolved their tactics. Traditional methods of detecting credit card skimmers at gas pumps and ATMs are becoming…
-

When wireless PEDs go full IED
We might not all be carrying a tiny bomb capable of killing us and others nearby, but before the terrorist events in Lebanon on September 17th, I would’ve laughed off…
-

Stalking threats still very real for TV actress
Whether it’s Sports Illustrated swimsuit model Brooks Nader or Elon Musk and his private jet, celebrities have the public’s attention which sometimes becomes obsession. And obsession can be fed through both legal and…
-

EBT skimmer gangs are equal opportunity criminals
Card skimmers don’t generally discriminate between their victims, but we do tend to see a certain pattern. American middle class individuals are hard targets for most card skimming schemes because…
-

CrowdStuck thanks to CrowdStrike
In an era where technology permeates every aspect of our lives, the travel industry stands as one of the most heavily reliant sectors. From booking tickets to navigating airports, technology…
-

Drones, weapons and drugs are the least worry inside prisons
Hawks have been known to viciously take down the largest of consumer drones in mid-flight. Perhaps this fact played a role into the naming of Georgia’s largest prison and gang-related…
-

Behind the Great Skim
Cybersecurity expert and BVS, Inc. CEO, Scott Schober, bags another hidden skimmer into evidence Massive Ponzi schemes created by the likes of a Bernie Madoff or Sam Bankman Fried get…
Have questions?
Berkeley sales and engineering staff will answer all of your technical, delivery and pricing questions. Contact us today.








