cellphone spyware

No One is Ever Going to Hear My Conversations, Or are They?

Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was taken or rejected.

In the written form, usually by e-mail, text, or some form of social media, it is derived from a device, a cell phone, a tablet, a laptop or a tower computer. Your personal information is stored in these devices, and sometimes the cloud…and no matter what you write, text, post somebody somewhere that you don’t even know may have access it. That’s the chance we take when [...]

  • Permalink Gallery

    Cell Phones Are Compact Computers with the ability to be “Hacked”

Cell Phones Are Compact Computers with the ability to be “Hacked”

Remember when your “Mobile Phone” was in a case as big as a small brief case and each call cost you a couple of dollars per minute and not cents? You were among a very elite if you had a “Mobile Phone” back in the day. Today, it is reported that more than 91% of adults in a survey of over 2,500 people own cell phones. They are replacing landlines, GPS Devices and tablets and many times every member in the family is linked to their own cellular device. A cell phone allows the user to make calls, send text message and emails, surf the web, schedule to wake you up, remind you of appointments and even goggle answers to questions when in a [...]