Blog

Explore our news and advice related to security, protection, and our expertise as private investigators.
Beware of unknown QR codes- they could contain malware

Beware of unknown QR codes- they could contain malware

Thanks to the pandemic, QR codes have popped up on ad posters, restaurant tables, and billboards around the world, inviting people to scan them in order to view menus and marketing information without having to type a web address into their phones, according to a...

How to Safely Lend your Phone to Someone You Don’t Trust

How to Safely Lend your Phone to Someone You Don’t Trust

Consider one of the following situations. 1. A stranger wants to borrow your phone to make an urgent call. But what if they start opening other apps 2. You show pictures of your recent vacation to a friend, but they start swiping to other pictures. 3. You lend your...

Threats & extortion, arrest or other

Threats & extortion, arrest or other

Threats to life, arrest or other involve demands by scammers to pay money that you supposedly owe and threats if you do not cooperate, according to a recent article published in the website Scam Watch provided by the Australian governement. How this scam works These...

8 Places You Didn’t Know Had Hidden Cameras

8 Places You Didn’t Know Had Hidden Cameras

ATMs You probably know your bank’s branch has security cameras watching to make sure thieves don’t steal your account information, but not all cameras are used for good. Thieves can hide cameras under fake covers that have tiny holes to record through, like the...

Useful tips against ‘ice-fishing’ scammers

Useful tips against ‘ice-fishing’ scammers

Ice fishing involves cutting a hole in a frozen body of water in order to catch fish. Ice phishing, as Microsoft describes it, is a clickjacking, or a user interface redress attack, that tricks a user into signing a transaction that delegates approval of the user’s...

5 Reasons Why Background Checks are Crucial for Recruitment

5 Reasons Why Background Checks are Crucial for Recruitment

Background checks have become an essential part of the hiring process. As a member of the recruitment team, it is your job to make intelligent and effective hiring decisions that will ensure the best possible outcome for the company. Hiring someone based on a cursory...

Are Apple AirTags Being Used to Track People and Steal Cars?

Are Apple AirTags Being Used to Track People and Steal Cars?

On a Sunday night in September, Ashley Estrada was at a friend’s home in Los Angeles when she received a strange notification on her iPhone: “AirTag Detected Near You.” An AirTag is a 1.26-inch disc with location-tracking capabilities that Apple started selling...

Contact us discreetly and with no obligation