by Anna Brown | May 21, 2020 | Blog
Disrupting a Gumtree Scam that converges with a Romance Scam In western countries, less than 1 in 100 cybercrimes are investigated, and less than 1 in 10,000 are prosecuted. So what can you do? We can’t “solve” these crimes, but we can disrupt the...
by Anna Brown | May 15, 2020 | Blog
Phishing definition and how to protect yourself Phishing is an attempt to deceive users in order to take sensitive information from them via emails, telephone or text. Social Engineering Phishing applies social engineering – the act of deception, or capitalizing...
by Anna Brown | Apr 17, 2020 | Blog
The FBI urges everyone to be extra vigilant for cyber scams during the COVID-19 Pandemic. Cybercriminals are using the pandemic fears for their profit, using a fresh set of malicious software and cyber scams. There are thousands of cybercriminals. These range...
by Anna Brown | Mar 31, 2020 | Blog
How you can stop a cyber stalker Definition of cyberstalking The definition of cyberstalking is a crime in which the stalker harasses a victim through electronic communication. This could happen through email, texts, calls, or messages posted on a website or...
by Anna Brown | Mar 9, 2020 | Blog
If you want to repair your online reputation, it is important to know how to convince Google to rank your content high in Google search results. We listed SEO statistics for 2020 to help you get an understanding of SEO how to improve your online presence. By...
by Anna Brown | Feb 25, 2020 | Uncategorized
Scammers are quite innovative in their initiatives to obtain your money or private details. Watch and protect yourself from internet scams by utilizing our guidelines. Ways to protect yourself from internet scams Be alert. When dealing with unidentified contacts from...
by Michael Roberts | Jan 21, 2020 | Spoofed Call
Is There a Way to Identify a Spoofed Caller’s Identity? Visit our case studies page to get an idea as to how Rexxfield can help you positively identify the individuals behind harassing, anonymous, online or, mobile phone spoofed calls or email messages. What is...
by Anna Brown | Jan 21, 2020 | Uncategorized
How do I contact Google Law Enforcement Request System? To contact Google Law Enforcement Request System, law enforcement agencies in the United States demand to adhere to a legal process. This legal process entails a subpoena or court order to force Google to reveal...
by Anna Brown | Dec 19, 2019 | Uncategorized
Removing info from Intelius Tons of websites offer your private information to everybody on the internet. These sites are also known to as people-finder, people-search, or white pages websites. A few of the most known ones include Spokeo, MyLife, PeopleSmart, US...
by Anna Brown | Oct 3, 2019 | Blog, Case Studies
Case Study: Identify Twitter User behind Twitter Harassment Brief Our client – let’s call her Jane – faced Twitter harassment by an anonymous online antagonist. The antagonist additionally harassed Jane’s friends and client’s...