Blog

Welcome to the blog — explore the latest insights, case studies and practical guidance.

Cyber Detective – What I Do and When You Should Contact Me

Sometimes it’s not about more than just technology. It’s about that gut feeling when: someone knows too much about you, they always show up “by coincidence”, messages disappear or someone has read them, your partner knows details they shouldn’t, you feel emotionally, psychologically, or financially controlled. In my office I hear the same sentence over and over:

Detecting Spyware on Phones and Computers – How to Check If Someone Is Spying on You?

Spyware and stalkerware have become one of the most serious threats to privacy. With their help, a third party can: read your messages, track your location, record conversations, spy on your screen or camera, access photos, files, and call history, take over accounts (Google, Apple ID, WhatsApp, Messenger). As a digital forensics expert and licensed private investigator, I increasingly encounter cases where someone doesn’t even realise they’ve been monitored for months. That’s why I’ve prepared a practical guide: how to detect spyware on phones and computers, what the symptoms are, and what steps to take to regain security.

GDPR in Practice – Things Most Companies Have No Idea About (But Should)

GDPR has been in force since 2018, but in most companies and institutions, it looks the same as on day one: somewhere there are some “policies”, someone once did a “document-based” implementation, and personal data… well, lives its own life. The longer I work with organisations, the more I see that GDPR is not a legal problem. GDPR is an organisational and technical problem. This means that knowing the regulations alone does nothing – you need to know how to organise data, processes, people, and systems to avoid risks.

Google's Critical Warning: Fake VPN Apps Are Attacking Users

🔥 Google’s Critical Warning: Global Wave of Fake VPNs Google has issued an official warning about massive cybercriminal campaigns publishing fake VPN apps that impersonate well-known and trusted brands. Victims download them in good faith — believing they’re enhancing their security. In reality, the opposite happens. Once installed, these apps function as advanced spying tools:

OpenTable and Hidden Data Sharing with Restaurants. Are Your Reservations Being Analysed?

🍽️ OpenTable and “Silent” Data Sharing with Restaurants In a recent expert interview, it was revealed that the popular restaurant reservation app — OpenTable — collects far more user data than most people imagine. Moreover, this information is shared directly with restaurants, which can use it for customer analysis, profiling, or micro-targeting.

Identity Theft: How to Protect Yourself? Practical Guide for Individuals and Companies

Suspect your account or device has been compromised? Contact me. I’ll examine the affected hardware, identify the incident source, and design effective, tailored protection solutions. In today’s world, one of the greatest threats to personal and digital security is identity theft. Criminals increasingly use personal data, document numbers, or account access to impersonate victims and extort financial gains. That’s why it’s not just about understanding how these crimes happen, but mastering effective protection against them. In practice, this means conscious data management, online caution, strong safeguards, and regular monitoring of your digital identity. This article is exactly about that — how to protect yourself and your data in the era of digital threats.

What is OSINT? A Complete Guide to Open-Source Intelligence

What is OSINT? Open-Source Intelligence (OSINT), or intelligence from open sources, is the process of gathering, evaluating, and analysing publicly available information to answer specific intelligence questions. Information vs. Intelligence It’s worth noting that information is not the same as intelligence. Data collected from the internet is just raw material. Only through analysis, interpretation, and giving it meaning does it transform into valuable intelligence.

How to Check If Your iPhone Is Being Spied On? Complete Guide to Detecting Wiretaps, Tracking, and Spyware

Complete, practical guide from a digital forensics expert Every year, more people contact me suspecting their iPhone is being monitored, tracked, or wiretapped. Most often, it’s: private individuals suspecting a partner/ex-partner, entrepreneurs concerned about company data, parents checking if someone interfered with their child’s phone, companies finding an MDM profile not from their organisation. This guide shows real detection methods, not myths from online forums. If you suspect someone has access to your phone — don’t wait. After detecting irregularities, you can contact me immediately (details at the bottom of the article).

The Future of Cybersecurity – Trends and Technologies That Will Define the Next Decade

Cybersecurity is evolving at an unprecedented pace. The growing value of data, rapid AI adoption, and increasingly sophisticated attacks are forcing organisations to adopt a new generation of defensive strategies. In 2025 and beyond, cybersecurity is no longer just an IT issue — it is a core pillar of organisational resilience.