Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

phone tapped

Spywares are a a computer softwares that allows unknown individuals to hear and register your conversations and copy your files. Once installed on a computer, the program records all operations performed by the victim and sends them to a web server where the spy can see them. In most cases, the software keeps a history of incoming and outgoing calls (date, time, duration, numbers), stores the SMS sent and received, records incoming and outgoing mail with the date and time and the contact name, collects the addresses of visited websites and provides access to photos and videos stored on the mobile phone. Some are used to track the movements of the owner using the GPS of the device and intercept messages sent by Skype, Snapchat, Twitter, BBM, iMessage, Facebook, WhatsApp.

Can these programs be installed remotely?

No. To install a spy software on a phone, the spy must have a physical access to the device. It is also necessary to activate the mobile, bypass the screen lock. In some cases, the spy will bypass the security system software and have a “root” access (on Android) or “jailbreak” the security system (on iPhone). These operations are well documented online.

How do I know if my phone is tapped?

Watch for suspicious behavior of your cell phone: SMS to unknown recipients, alert messages related to research network, unexpected reboots, suspicious activity when the phone is supposed to be on standby mode. If your Android device indicates that an application is assigned administrator privileges or “superuser”, there is a chance that this application is spyware. If your iPhone has an application called Cydia, is that your machine has been “jailbroken” to bypass Apple’s protection and install unauthorized programs. If you don’t know what to do in this situation, it is recommended to rest your iPhone and perform an update to remove the “jailbreak” and therefore the potential risk of being spied .

How can I protect myself?

Secure your device and your Internet accounts with strong passwords, different and impossible to guess even for your family. Avoid lending your smartphone to a friend “who knows” or to a colleague who wants to “test” and even to your jealous wife. If in doubt, install a reliable security program (Kaspersky Mobile Security, Lookout, VirusBarrier) which will detect the presence of spyware. More radical: Back up the contents of your phone on a computer or online, then do a complete reset to return to the “factory” configuration. Remove the battery from your notebook when you are not using it: no power supply, it can give no signal, indicating its position or communicate information to an online server. Finally, the ultimate solution: purchase a second phone …