LinkedIn Tracking

Android Spyware & iPhone Spyware Detection

Android Malware - iPhone Virus Detection & iPhone Malware Detection

At NSI, our goal is to secure your privacy and your peace of mind. Nowadays, spyware and malware are easily purchased online and are a major threat to peoples and businesses privacy. We are specialists in zero-day attacks (attacks that have been designed not to be detected by current anti-virus tools).


Our spyware and malware forensic specialists can detect if your device is compromised using the most advanced digital forensic equipment. We do this by analysing the devices bit-for-bit memory and the behaviour of the device and its contents. Once a threat is identified, we are able to provide information about it. Information provided may include where your data is going, what type of data has been accessed, recover deleted data and more.


Spyware is a piece of software that allows an attacker to access all kinds of data from your device. It is installed in a variety of ways, such as an infected image or file that is sent to the device via Bluetooth, Email or Message, or by an infected link that is sent via SMS.


The Spyware would allow your camera and microphone to be remotely activated, your phone calls to be listened to and intercepted, your text messages be read, your passwords to be viewable, and your location tracked, just to name a few. NSI consulted with Ross Coulthard of 60 Minutes on an investigation into mobile phone’s being compromised.

If you suspect that your mobile phone is being used to track you with a mobile tracker or listen to your conversations or read your SMS or emails, we can help.

Using the latest law enforcement grade equipment we can conduct a Mobile Phone Malware and Spyware Analysis that may be installed on your device. Using a mobile phone as a tracking or eavesdropping device is a breach of the Surveillance Devices Act 2007.


Text Optin?
I agree to receive text messages sent to my mobile phone. (Message and data rates may apply.)


What are you concered about?
Spyware and MalwareInterception AttemptsSomeone tracking your movementsSomeone listening to your callsSomeone reading your messages

What is the NSI approach to detecting Spyware and Malware?

Threats are becoming more prevalent and continue to increase drastically. Our NSI innovations team continues to advance our digital forensic capabilities. Our expert digital forensic specialists can not only detect an attacker that is using spyware or malware but can also conduct a cellular interception analysis and investigation. Where others fall short in only checking for spyware, our team goes above and beyond and ensures all forms of communications into and out of a device is checked thoroughly.

Can Spyware or Malware be detected with anti-virus software?

Anti-virus and anti-malware software and apps can only identify known threats that have already been analysed. These are done by the virus signature being uploaded to their system. What happens when the threat is not known? These are called zero-day attacks. Attackers use this method as an exploit until such time the software and app manufacturer’s end up creating a way to detect them. Spyware or malware can ultimately infect your internal network in a corporate environment.

You must always ensure you have sufficient systems with multiple redundancies in place in case of a system being infected. NSI can assist with designing a cyber and information security architecture to ensure minimal damage is done in the event of an attack.

What is an SS7 Cellular Attack?

Signaling System 7 (SS7) is a cellular protocol used worldwide that interconnects mobile phone operators. Through the use of an IMSI Catcher or Stingray device, which are rogue or fake cellular towers, a mobile phone is able to be covertly intercepted over the air by exploiting the baseband processor on the mobile phone. When an IMSI Catcher/rogue cell tower is in operation, mobile phones within the vicinity of the rogue tower connect to it and the IMSI Catcher then does a handoff to the legitimate tower(s).

Prior to the handoff, a silent SMS or Paging Request is made which allows your device to be fully controlled, without leaving a trace on your device.

How can NSI help?

NSI utilise military specification forensic equipment. Using this equipment, we analyse the mobile phone to determine if Spyware is currently active or deleted from the device. We are also able to analyse the SIM card to determine if there are any interception attempts.

If Spyware is found, or evidence of an interception attempt is found, we are able to present you with a report which can be presented in all courts and tribunals. We do this by making an image or clone of the mobile phone or electronic device and then analyse the data. We do not modify the data in any way.

Some of the things that can be done to a phone or device that has spyware on it are:
  • View your location
  • Read SMS text messages and emails
  • Listen to phone calls
  • Read your passwords
  • View the websites you have visited
  • Gain access to documents

If you believe that your privacy has been breached by one or more of the above, contact our friendly team and let us help you get your privacy back.