Blog

Welcome to the blog — explore the latest insights, case studies and practical guidance.

Why 90% of Cybersecurity Incidents Start with an Organizational Failure, Not a Technical One

Cybersecurity incidents, data breaches, ransomware, and phishing attacks in more than 85–90% of cases do not begin with a sophisticated technical attack, but with an organizational or decision-making failure, or a lack of board-level accountability. This article explains why in 2026 cybersecurity is a management and business problem, not merely an IT issue.

How to Detect Spyware on Your Phone?

Stalkerware, spyware, phone spying apps, phone monitoring without consent — this is a real problem that private individuals report more and more often. In this article, I explain how to detect spying apps on Android and iPhone, what the symptoms of stalkerware are, and how to respond safely without destroying digital evidence.

One Click After Seizing the Phone — and the Entire Case Collapsed

One Click After Seizing the Phone — and the entire case collapsed The case looked perfect. The phone was secured according to procedure. The data had been extracted. The lawyer was convinced it was a formality — a verdict in the bag. The problem appeared later. Someone — acting in good faith. Often a lawyer or a technician. Turned the phone on after it had already been seized.

Deepfake in Divorce Cases – Real Incidents from 2025

In 2025, deepfake technology stopped being a curiosity. It became a weapon — used to destroy reputations, influence custody rulings, or reduce alimony. 1. London, January 2025 – a fake death-threat voice message A mother in a custody dispute submitted a 2-minute voice recording to the court. In the audio, the father allegedly threatened to kill her and their 5-year-old son.

Cyber Detective – What I Do and When You Should Contact Me

Sometimes it’s not about more than just technology. It’s about that gut feeling when: someone knows too much about you, they always show up “by coincidence”, messages disappear or someone has read them, your partner knows details they shouldn’t, you feel emotionally, psychologically, or financially controlled. In my office I hear the same sentence over and over:

Detecting Spyware on Phones and Computers – How to Check If Someone Is Spying on You?

Spyware and stalkerware have become one of the most serious threats to privacy. With their help, a third party can: read your messages, track your location, record conversations, spy on your screen or camera, access photos, files, and call history, take over accounts (Google, Apple ID, WhatsApp, Messenger). As a digital forensics expert and licensed private investigator, I increasingly encounter cases where someone doesn’t even realise they’ve been monitored for months. That’s why I’ve prepared a practical guide: how to detect spyware on phones and computers, what the symptoms are, and what steps to take to regain security.

GDPR in Practice – Things Most Companies Have No Idea About (But Should)

GDPR has been in force since 2018, but in most companies and institutions, it looks the same as on day one: somewhere there are some “policies”, someone once did a “document-based” implementation, and personal data… well, lives its own life. The longer I work with organisations, the more I see that GDPR is not a legal problem. GDPR is an organisational and technical problem. This means that knowing the regulations alone does nothing – you need to know how to organise data, processes, people, and systems to avoid risks.

Google's Critical Warning: Fake VPN Apps Are Attacking Users

🔥 Google’s Critical Warning: Global Wave of Fake VPNs Google has issued an official warning about massive cybercriminal campaigns publishing fake VPN apps that impersonate well-known and trusted brands. Victims download them in good faith — believing they’re enhancing their security. In reality, the opposite happens. Once installed, these apps function as advanced spying tools:

OpenTable and Hidden Data Sharing with Restaurants. Are Your Reservations Being Analysed?

🍽️ OpenTable and “Silent” Data Sharing with Restaurants In a recent expert interview, it was revealed that the popular restaurant reservation app — OpenTable — collects far more user data than most people imagine. Moreover, this information is shared directly with restaurants, which can use it for customer analysis, profiling, or micro-targeting.