cell phone spyware

My Device has Been Compromised and My Personal Information is no Longer Personal

Let’s say you are trying to find out if someone has installed an illegal spyware app on your cellular device, laptop, tablet or computer.  You try to conduct a search that would indicate a malware application has been installed but are unsuccessful or you get information on the legal apps that are pre-programmed on your phone or “find a friend” or something similar. The reason you cannot find it is probably due to the way the app was created and the capabilities of the app.  There is a reason why these apps are called “Spyware” or “Malware”.  They are designed to remain hidden on your phone without detection.  Spyware or Malware apps can cost as little as$19.99 and can go up in price depending on [...]

Ostriches Don’t Get a Fair Deal in a Divorce

For those of us who have been divorced, we understand the process and procedures.  We know that we either represent ourselves (which could create problems during and after the divorce) or we retain the services of a reputable law firm (which prevents the pro-se issues).  We enter into a marriage full of hope and dreams and unfortunately, we are only in control of half of that relationship.  We enter into a divorce with the expectation to right the wrongs and in many cases, there are activities that need to be investigated.  The he/said she/said of the relationship holds little weight in court.  Documented behavior and actions are required.  Not all divorces are complicated, but in relationships that end due to deceit, hiring an investigative company [...]

No One is Ever Going to Hear My Conversations, Or are They?

Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was taken or rejected. In the written form, usually by e-mail, text, or some form of social media, it is derived from a device, a cell phone, a tablet, a laptop or a tower computer. Your personal information is stored in these devices, and sometimes the cloud…and no matter what you write, text, post somebody somewhere that you don’t even know may have access it. That’s the chance we take when [...]

Insurance Beneficiaries and Forensics Data Recovery

Insurance Companies and Law Firms deal with very controversial subject matters.  And usually when we are asked to conduct an Investigation for an Insurance Company, we can be assured there is an attorney on the other side. We were contacted by a Major Insurance Company regarding an apparent suicide, the coroner and the police department both stated the insured committed suicide, but yet the family couldn’t believe he would take his own life.  There was just too much, they felt, he had to live for.  There was no suicide note, no indication that he was depressed and he was supposed to announce his engagement in less than a week.  He and his girlfriend had recently returned from a Caribbean vacation and become engaged during the [...]

Cell Phones Are Compact Computers with the ability to be “Hacked”

Remember when your “Mobile Phone” was in a case as big as a small brief case and each call cost you a couple of dollars per minute and not cents? You were among a very elite if you had a “Mobile Phone” back in the day. Today, it is reported that more than 91% of adults in a survey of over 2,500 people own cell phones. They are replacing landlines, GPS Devices and tablets and many times every member in the family is linked to their own cellular device. A cell phone allows the user to make calls, send text message and emails, surf the web, schedule to wake you up, remind you of appointments and even goggle answers to questions when in a heated [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at , we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly? Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing so, [...]

Go to Top