Back to Services
Spyware Analysis
Investigate suspected spyware with forensic-level checks
Step 1 of 517% complete
Isolate the Device
Before investigating, reduce the device's ability to communicate with a remote attacker. This prevents them from being alerted to your investigation or remotely wiping evidence.
Tip: Use a different, trusted device (like a friend's phone or a public computer) to research anything suspicious you find during this process.