Blog
Explore our news and advice related to security, protection, and our expertise as private investigators.How to spot the software that could be spying on you
Testimonial from *Maria *, victim of cyber-stalking ( source: BBC) When she met her husband in her early twenties, it felt like love. But romance quickly soured, turning in to a 25-year tale of abuse and control. First there was the name-calling. Then, complete...
Cybertheft protection: Why you might want to wrap your car key fob in foil
Given that the best way to store your car keys at night is by putting them in a coffee can, what's an ex-FBI agent's advice to protect cars from theft during the day? Wrap car fobs in aluminum foil.The original article has been published recently...
Beware of unknown QR codes—they could contain malware
Thanks to the pandemic, QR codes have popped up on ad posters, restaurant tables, and billboards around the world, inviting people to scan them in order to view menus and marketing information without having to type a web address into their phones, according to a...
PART 2: Meta will continue to use facial recognition technology, actually
Earlier this week, Facebook made the somewhat shocking announcement that it would be shutting down its facial recognition systems. But now, Facebook’s parent company, Meta, has walked that promise back a bit. A lot, really, according to a recent article published in...
Facebook is shutting down its facial recognition software
Facebook said Tuesday it plans to stop using facial-recognition software that could automatically recognize people in photos and videos posted on the social network, marking a massive shift both for the tech industry and for a company known for collecting vast amounts...
Leaked Facebook document reveals blacklist of dangerous organizations, individuals
Facebook's blacklist of dangerous individuals and organizations has been leaked to the public according to a recent article published in Fox Business @ A reproduced snapshot, published by The Intercept on Tuesday, features 100 pages of more than 4,000 groups...
Fake COVID vaccine card sales are ramping up online
As more schools, businesses and travel destinations require proof of vaccination, there are growing concerns about fake COVID-19 vaccination cards, according to a recent article published in ABC7NEWS.com Offers to purchase fake COVID-19 vaccination cards are on apps...
The ‘Joker’ Virus Has Returned to Android: It Can Empty Your Bank Accounts Without You Noticing It and It Is Hidden in These Apps in the Google Play Store
The Belgian Police warned about the return of the 'Joker' virus , which attacks Android devices and hides itself in various applications on the Google Play Store . This malware is capable of subscribing the user to...
Apple plans to scan US iPhones for child abuse imagery
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices....
US companies hit by ‘colossal’ cyber-attack
About 200 US businesses have been hit by a "colossal" ransomware attack, according to a cyber-security firm. Huntress Labs said the hack targeted Florida-based IT company Kaseya before spreading through corporate networks that use its software according to a...
Ransomware gangs’ slow decryptors prompt victims to seek alternatives
Recently, two highly publicized ransomware victims received a decryptor that was too slow to make it effective in quickly restoring the victim's network, according to a recent article published in Bleeping Computer. The first was Colonial Pipeline, which paid a $4.4...
How to secure your banking transactions from cyber frauds
The growing volume of online transactions and the absence of stringent cybersecurity systems give fraudsters the space to commit malicious acts. Technology is almost everywhere. All necessary activities like shopping, grocery orders, bill payments, etc have shifted to...