LinkedIn Tracking
24 Sep 2019

Increased use of Spyware and Hi-Tech bugs to stalk and terrorise partners

More than ever, abusive spouses are turning to spyware and hi-tech bugs to stalk and terrorise their former partners By: Claude Khoury Spousal abuse comes in many forms including verbal, psychological, emotional, […]
19 Jul 2019

Can mobile phone data be recovered after a reset?

Can mobile phone data be recovered after a factory reset? By: Navid Sobbi and Claude Khoury Yes, data can be recovered utilising a forensic data recovery process after a factory reset. In […]
21 May 2019

How to recover Facebook messages?

How to recover Facebook messages. Can you get back deleted messages on Messenger? By: Navid Sobbi This is a question our technicians are asked on a daily basis. Facebook Messenger messages may […]
19 May 2019

Is it possible to retrieve deleted text messages?

Is it possible to retrieve deleted text messages? By: Navid Sobbi If you have ever accidentally deleted a text message from your mobile phone and wanted to get it back, the answer […]
14 May 2019

WhatsApp call exploit: Human rights lawyer among the targets

The levels of industrial and economic espionage have been on the rise in recent years with the advent of readily available equipment that can be purchased online. Devices such as electronic bugs, listening devices, hidden cameras, Cellular interception, Bluetooth interception, laser microphones...
9 Oct 2018

The Benefits of Conducting a TSCM Bug Sweep

The levels of industrial and economic espionage have been on the rise in recent years with the advent of readily available equipment that can be purchased online. Devices such as electronic bugs, listening devices, hidden cameras, Cellular interception, Bluetooth interception, laser microphones...
28 Aug 2018

The Threat of Laser Microphones

The Espionage Threat Many organisations have implemented sophisticated multi-million dollar cyber security architectures yet forget to think like an attacker! If an adversary can harm you or profit from sidestepping your cybersecurity protocols they will. One of the easiest targets for competitive......
30 Jul 2018
service cat post bg

The Dangers of using Data Recovery Software

The Dangers of using data recovery software – Don’t even attempt it before reading this! Historically the Christmas and New Year period sees demand for data recovery skyrocket. Digital devices mixed with […]
14 Jul 2018

Mobile phone users at risk of being Bugged, Hacked and Tracked

Mobile phone users at risk of being Bugged, Hacked and Tracked By: Claude Khoury NSI consulted with Ross Coulthard of 60 Minutes on this Special Investigation back in 2015. Currently, every commonly […]
Contact