Blog
Explore our news and advice related to security, protection, and our expertise as private investigators.Beware of unknown QR codes- they could contain malware
Thanks to the pandemic, QR codes have popped up on ad posters, restaurant tables, and billboards around the world, inviting people to scan them in order to view menus and marketing information without having to type a web address into their phones, according to a...
Forget ‘quiet quitting’: Employers are doing ‘shocking’ things to monitor your productivity
Get back to work. Workplace surveillance methods have become significantly more common and sophisticated in recent years, and the shocking spylike practices are something far more routine that most realize, experts warn in a recent article published in the NY...
How to Safely Lend your Phone to Someone You Don’t Trust
Consider one of the following situations. 1. A stranger wants to borrow your phone to make an urgent call. But what if they start opening other apps 2. You show pictures of your recent vacation to a friend, but they start swiping to other pictures. 3. You lend your...
Threats & extortion, arrest or other
Threats to life, arrest or other involve demands by scammers to pay money that you supposedly owe and threats if you do not cooperate, according to a recent article published in the website Scam Watch provided by the Australian governement. How this scam works These...
A quick peek into the world of Biometric and behavioral mass surveillance
A study into the use of biometric and behavioral mass surveillance, particularly in public spaces, examines whether, generally in the name of security, the European Union is heading beyond the rule of law towards the ending of liberal democracy as citizens’ rights are...
UK spy agencies sharing bulk personal data with foreign allies was legal, says court
A privacy rights org this week lost an appeal in a case about the sharing of Bulk Personal Datasets (BPDs) of UK residents by MI5, MI6, and GCHQ with foreign intelligence agencies, according to a recent article published in The Register. The British agencies have...
8 Places You Didn’t Know Had Hidden Cameras
ATMs You probably know your bank’s branch has security cameras watching to make sure thieves don’t steal your account information, but not all cameras are used for good. Thieves can hide cameras under fake covers that have tiny holes to record through, like the...
Useful tips against ‘ice-fishing’ scammers
Ice fishing involves cutting a hole in a frozen body of water in order to catch fish. Ice phishing, as Microsoft describes it, is a clickjacking, or a user interface redress attack, that tricks a user into signing a transaction that delegates approval of the user’s...
5 Reasons Why Background Checks are Crucial for Recruitment
Background checks have become an essential part of the hiring process. As a member of the recruitment team, it is your job to make intelligent and effective hiring decisions that will ensure the best possible outcome for the company. Hiring someone based on a cursory...
Parents warned over ‘crafty’ WhatsApp scam that starts ‘hey mum, it’s me’
There has been a lot of different scams hitting WhatsApp users over the past year, with recent attempts by fraudsters to extort money from users becoming even more convincing, according to a recent article published in the Dublins Q102. WhatsApp users are being warned...
Are Apple AirTags Being Used to Track People and Steal Cars?
On a Sunday night in September, Ashley Estrada was at a friend’s home in Los Angeles when she received a strange notification on her iPhone: “AirTag Detected Near You.” An AirTag is a 1.26-inch disc with location-tracking capabilities that Apple started selling...
What is ‘simjacking’? Here’s how the mobile phone sim card scam works
SIM hijacking, or ‘SIM-jacking’, is a dangerous new way that fraudsters can steal from people by secretly taking control of their phones, according to an article published in Inews.Co.Uk In a growing trend, thieves are exploiting the ability of mobile service...