Guns, Gams & Gumshoes

A blog for PIs and writers/readers of the PI genre

  • Writing a Sleuth?

    A Guide for Writing Fictional Sleuths from a Couple of Real-Life Sleuths

    "How to Write a Dick is the best work of its kind I’ve ever come across because it covers the whole spectrum in an entertaining style that will appeal to layman and lawmen alike."

    Available on Kindle

  • Copyright Notices

    All rights reserved by Colleen Collins and Shaun Kaufman. Any use of the content on this site (including images owned by Colleen Collins and/or Shaun Kaufman) requires specific, written authority. Any violations of this reservation will result in legal action.

    It has come to our attention that people are illegally copying and using the black and white private eye at a keyboard image that is used on our site. NOTE: This image is protected by copyright, property of Colleen Collins.

  • Writing PIs on Twitter

  • Guns, Gams, and Gumshoes

  • Advertisements

Protecting Your Cell Phones Against Spyware

Posted by Writing PIs on May 13, 2010

Seems every time you read or watch the news, there’s a new story about someone discovering nasty spyware secretly downloaded onto a cell phone.  Such spyware (or malware) is a real threat, but according to some experts, the media makes it seem more prevalent than it really is.  According to one of our PI associates who’s quite knowledgeable about cell phone forensics, a lot of cell spyware is junk, although there are also some competent, popular software brands out there.  He estimates there’s currently over 500 documented malwares for cell phones.

One of our Writing PIs currently wrote an article about how to protect yourself from cell phone spyware:

Are Cell Phones Good? Or How to Protect Cell Phones From Going Bad Due to Downloaded Spyware: (had problems shortening this url–if you click and the article doesn’t open, select the entire url and paste into your browser)

Here’s a YouTube video “Is Your Cell Phone Bugged?”

You lock the doors to your house and car, right?  You password-protect your computer, right?  Follow the suggestions in the above article to also protect your cell phone.

Have a great week, Writing PIs


Sorry, the comment form is closed at this time.

%d bloggers like this: