Yes, you read correctly. It’s now possible to get a phone pre-installed with FlexiSPY delivered straight to your home with our brand-new service – FlexiSPY EXPRESS – provided by our trusted partners, Spyfones.
All of the Features, None of the Hassle
With FlexiSPY EXPRESS, you no longer have to worry about finding a compatible device, rooting your phone or installing any additional software. Simply select a phone from our range of devices and we will deliver your phone with your selected version of FlexiSPY already installed.
This means you’ll be able to take advantage of our incredible monitoring features (FlexiSPY has more than any other product) – right away!
Record, intercept, and listen in on live phone calls
Monitor emails and the most popular IMs: Facebook, Viber, WhatsApp + 9 more
Turn on the phone’s microphone and record its surroundings
Record VoIP Calls: Skype, Facebook, Viber, LINE, and more
Spy on text messages with our powerful SMS Tracker
FlexiSPY EXPRESS is the easiest, most convenient way to enjoy all that FlexiSPY has to offer.
Gone are the days of finding a compatible device and installing the software yourself – FlexiSPY EXPRESS takes care of this for you.
Now you have more time to focus on what’s important – whether that be protecting your child from cyberbullies or safeguarding your business from employee theft.
The phones look and perform like ordinary devices with no need to install any additional software.
Once activated, FlexiSPY collects data from the FlexiSPY EXPRESS phone and sends the information over the internet to your secure web portal for convenient viewing.
Use your FlexiSPY online portal to track app usage, monitor calls and messages, download photos or videos from the device and so much more!
You can even opt to run the software visibly or silently in the background.
After publishing our post last week regarding the Disney class-action lawsuit — you know, the one where Disney is being sued for spying on children under 13 who use their apps and then selling the data to third-party advertisers — it got us thinking about fairness in the media.
Now, think about Motherboard, who are partially owned by Disney.
Next, think about Motherboard’s recent retraction of two Disney-focused stories, as well as the lack of reporting of Disney’s current spying escapade.
Finally, think about Motherboard’s handling of FlexiSPY earlier this year.
Under the false pretense that FlexiSPY knowingly enables illicit spying, they ran a series of defamatory stories based on illegally obtained information, designed to support the personal opinions and ego-driven agendas of certain bloggers (We’re looking at you Joseph Cox & Lorenzo Franceschi-Bicchierai).
This clearly begs the question, where is Motherboard’s coverage of Disney — who are now being sued for violating COPPA not once, but 42 times? Sprinkle in the lawsuits also being brought against the developers of the Disney apps and Viacom (parent company of Nickelodeon) and it sounds like a recipe for some good old-fashioned ‘stick-it-to-the-man’ reporting.
Again, where are the chiding accusations of malicious spyware being illegally installed on someone’s phone? Or the exclusive coverage exposing the secret targeting of youth through technology — for profit nonetheless?
Remember when we said 90% of the media is owned by six conglomerates? One of those media giants is Disney — and they just so happen to have a $400 million stake in VICE and its brands.
Media Really Is Biased
We hate to perpetuate the ‘fake news’ sentiment, but it’s difficult to take the media at face value after delving into the depths of The Big 6 and their corporate structures.
Disney owns ABC. Comcast owns NBC. News Corp owns Fox. Viacom owns MTV. CBS owns CBS. Time Warner owns CNN — and you’d be hard-pressed to find negative content about any of these outlets on their own networks.
A quick Google search of ‘Motherboard Disney’ or ‘VICE Disney’ brings up no stories or exposés. Well, except for reports from other news outlets that VICE recently retracted two stories about Disney — oh, and this message from Motherboard:
While this editorial issues two retractions — which are always admirable — is it credible that these two stories were pulled because of sources rather than subject?
Two stories that were pulled because of the ‘source.’ Two stories with a negative spin on Disney. It’s probably just a coincidence, right?
We like to believe Vice and its affiliates are different — they’re known for controversial reporting that isn’t afraid to take on the bigwigs and take readers (or viewers) to the deepest corners of society. VICE is edgy, fearless, counter-culture journalism, touching subjects that others don’t dare.
Unless the subject involves the Disney mega-ladder.
And that’s a shame, because it supports the belief of an ever-growing number of people that corporate ownership controls content — AKA fake news.
VICE Media falls under A&E Networks on the bottom left
And to those people, it would make perfect sense why VICE retracted two stories about their media-giant parent. With that many hands in the proverbial pot, it’s hard to argue that the complex corporate structure really had nothing to do with the actions of Motherboard as described in this piece.
To Publish or Not to Publish
We are not comparing ourselves to Disney, but merely comparing the recent coverage of FlexiSPY and Mickey — or should we say lack of coverage. FlexiSPY earned a six-week campaign without breaking any laws. Disney more-than-likely violates COPPA and gets nothing. Makes us wonder if FlexiSPY had a shareholding in VICE, would we have gotten the same preferential treatment?
But we hate to ‘pull a VICE’ and speculate, so let’s look at the facts. We’ll let you connect your own dots.
When used in accordance with our company guidelines and legal disclaimer, FlexiSPY is completely legal. We do not condone the illegal use of our software and our Privacy Policy clearly explains that FlexiSPY operates within the rules of COPPA and that we never sell the personal data of children. Sure, our products weren’t always marketed only to parents and employers, but then again who doesn’t have a past? Motherboard coverage: six-week exclusive exposé.
Disney — and Viacom and apps in Google Play — uses third-party code and identifiers to target and share the personal data of children under 13 without parental consent. Whether or not Disney and their developers — Upsight, Unity and Kochava — set out to spy on children through their apps, the fact of the matter is this: they are.
Since at least 2013, the release year of Disney’s Princess Palace Pets app — one of the most popular apps under investigation in the recent lawsuit — Disney has been collecting data. That’s four years of information sharing. Four years of behavior monitoring. Four years of developing a profile of your child. All without express parental consent. These games are not only not protecting our kids’ personal data, but are exploiting it for profit — illegally. Motherboard coverage: None.
But these are just ‘alleged’ claims according to media outlets, so they must not be worth publishing.
Who’s Afraid of the Big Bad Mouse
It’s hard to escape the conclusion that the media publishes (or retracts) content based on who’s controlling the checkbook — and apparently, it’s easier to go after one software company than the entire media conglomerate that controls 18% of your business.
We’ve come to expect this from CNN or FOX, but not from Motherboard.
Throughout their history, VICE and Motherboard have been the antitheses of the easy way out — embracing a new style of storytelling journalism dubbed ‘Immersionism‘ by founder Shane Smith. A style that puts reporters and viewers inside the action. VICE, Motherboard and their affiliated channels uncover stories that people didn’t even know they wanted to hear.
We hope their ownership structure lets them continue speaking truth to power.
Because if you can stick-it-to-the-man, surely you can stick-it-to-the-Mouse.
In 1999, Congress enacted the Children’s Online Privacy Protection Act (COPPA) to protect children 13 and under from the dangers of online privacy invasion. The act was revised in 2013 to include even more details of what information can and cannot be tracked or shared with third-parties. Yet, as the global mobile gaming industry looks to hit more than $46 billion in revenue this year – a large portion of which comes from children – it’s no wonder that companies are looking for ways around COPPA and into the advertising budgets of third party marketers and advertisers.
Is Nothing Sacred Anymore?
If a law is in place to protect our kids then it is pretty safe to assume it is being followed, right? Well, this doesn’t seem to be the case when it comes to apps, as major companies like Disney and games and applications in the Google Play and App stores are being found to have broken the rules set out by the COPPA and are in fact exploiting our children’s online behavior.
As parents, we trust that something meant for a child is safe to use and that when we see our daughter virtual swimming with Ariel or our son charming Belle as the Beast that they are in a safe zone. That they are free to be kids playing and not lab rats in some money-making advertising experiment. It seems like common sense, but as corporations continue to find every last crevice to fill with ads and product promotion, it’s our job to be aware of the potential dangers involved in allowing our children to play online or with downloadable technology.
Who Are The Culprits?
The Walt Disney Company is being sued for allegedly violating the COPPA as a federal class action lawsuit claims that 42 of Disney’s apps collect personal data from kids and give advertisers the information without parental consent. Three software companies – Upsight, Unity, and Kochava – are also named in the lawsuit as being part of the chain which has embedded tracking software and sends children’s’ information and online habits to interested parties.
And this isn’t the first time America’s beloved media conglomerate has come under fire for COPPA violations – Disney had to pay $3 million when one of its subsidiaries, Playdom, was found guilty of registering ‘1.2 million users, most of them children, for online games.’ The company then collected masses of information — including age, email addresses, names, IM names and locations — and shared it illegally with third-party contacts.
Other culprits include over half of Google Play’s apps that target kids under the age of 13, according to recent research conducted by The Washington Post. Of the 5,000+ apps tested, the new source found that the majority of them did not protect kids’ data – which is required by the COPPA. In fact, The Washington Post found that most apps send regular updates to advertisers with 90% actually ‘enabling long-term tracking.’
Combined, this data tells us that companies like our favorite Mouseketeer will continue to find loopholes and ways to interpret the laws to benefit their profit-focused agendas. As Disney stated in response to the lawsuit, “Disney has a robust COPPA compliance program, and we maintain strict data collection and use policies for Disney apps created for children and families. The complaint is based on a fundamental misunderstanding of COPPA principles, and we look forward to defending this action in court.”
Yikes, we would not be looking forward to going up against Disney in court!
What Can We Do To Protect Our Kids?
We now know that this issue is ongoing, has repeat offenders and will likely be something that continues to perpetuate every aspect of our lives. Let’s face it – we all know Big Brother is watching somewhere. So, let’s make sure we at least are aware of potential online dangers and protect our kids the best we can!
Talk to your kids. Engage with your children regarding online safety and appropriate behavior. Discuss what is acceptable and unacceptable when it comes to giving out information – even when registering for their favorite game. Think of an application as a stranger. Do we talk to strangers? No. Do we give strangers our name, email address, phone number, first born child, life’s savings, etc? No!
Download Monitoring Software. We know, it sounds like child monitoring software is exactly what Disney or these other companies are using to target your kids. But, IT’S NOT THE SAME! Software like FlexiSPY is a powerful tool that can help you as a parent be able to stand up against major corporations of the world and keep your kids safe. FlexiSPY for Android or iPhone, as well as FlexiSPY for computers, gives you the ability to see which applications your child has downloaded and how they use them. This means if you see your child has downloaded one of Disney’s data-sending apps, you can immediately check its privacy settings and update them to keep personal data protected.
We have a unique Application Screenshot feature which actually takes snapshots of an app while it’s in use, so you can be sure that your child is making smart decisions. Our Keylogger feature lets you see what information has been typed into an application – i.e. personal information – so that you’re able to speak with your child directly about how to make better decisions and to update the app to keep his or her privacy safe. Additional features like IM monitoring give you peace of mind that your children are staying children and chatting with friends about the best way to beat the next level – not with someone who could potentially endanger them.
Check in regularly. This may be the most important step. Let your kids know you are here, interested in what they are doing and always available to answer questions they have. By being regularly involved in your child’s online activity, he or she will be more aware of their actions and more likely to speak up if they come across something you have discussed. And for those kids who just don’t like to chat, child monitoring software can help be their voice!
For a full list of the Disney apps allegedly spying on your kids, read here.
For a full list of apps tested by The Washington Post visit their site AppCensus.
To get your copy of FlexiSPY, visit www.flexispy.com, and start protecting your children today!
Get Notified Of New Blog Posts
Blog posts contain explanations of new features, company announcements, as well as tips & tricks.
FlexiSPY – the world’s most powerful monitoring software – makes it easy to record calls on the most popular VoIP applications. That means YOU can now record calls made on programs like Skype, Viber, LINE, Whatsapp, Facebook and more! This is the perfect tool for business owners who need to keep track of how their employees are handling confidential information and for parents concerned about their child’s social interactions or decision-making.
What is a VoIP call?
VoIP stands for Voice over Internet Protocol (VoIP) – and VoIP calls are regular calls between two people that take place over the internet rather than a landline. And with the advent of social media and instant messaging applications, VoIP calls are quickly replacing traditional phone calls around the world.
Who can record VoIP calls?
Anyone with an internet connection! FlexiSPY Extreme is available for both iPhone and Android users and allows you to record calls on the world’s most popular VoIP applications, including Skype, Viber, LINE, Whatsapp, Facbook, WeChat, Google Hangouts and many more!
How does it work?
Easy! Just like with other FlexiSPY features, we keep you in mind and work to ensure it’s as easy-to-use as possible. As soon as the target phone uses any of the many supported programs to make or receive calls, then these calls will be automatically recorded and uploaded to your personal web portal. Here you’ll be able to listen to or to download the recording later for offline listening.
Here are 3 easy steps for recording a VoIP call:
First, download Flexispy to a rooted Android or jailbroken iPhone
Next, the target will make a call using Skype, Viber, Whatsapp or one of many other supported programs
Then, visit your online portal and listen to or download the recording from your FlexiSPY
You can even listen to the files directly from your phone with our brand new mobile viewer application, FlexiVIEW!
Why do I need to record a VoiP call?
This feature is perfect for anyone who uses an iPhone or an Android and spends a lot of time on VoIP applications. Recording these calls is extremely useful for parents and employers who are responsible for other individuals, as well as the overall well-being of their families or businesses.
Employers
Insider threats, security breaches and data theft happen every day – and most employers have no idea until it’s too late. FlexiSPY gives you the power to know if something is happening before it goes too far and allows you step in to rectify a potentially dangerous and costly situation for your business.
By recording the VoIP calls of employees using company phones or machines, you will be able to know as soon as something out of the ordinary takes place. In addition, if employees know they are being monitored, they will be more productive and less likely to follow through with any negative actions toward the company. FlexiSPY helps employees understand the value of their jobs and the information they deal with on a daily basis.
VoIP call recording can also be used for recording important business phone calls, interviews with potential job candidates and even quality control training!
Parents
Did you know that 80% of kids and teens check their phones hourly? Are you aware of who they are speaking to or what they are talking about? Now, this is not to say that all kids are up to no good, but rather, it’s easy for kids to get caught up into peer pressure or negative situations. And with technology advancing and kids spending so much time on their phones, it’s really impossible for parents to be watching ALL the time. Nor, should they have to – as trust is a very important part of a child’s development.
FlexiSPY, however, gives parents a tool to ensure their children are safe and making responsible decisions when using instant messenger and VoIP applications like Skype, Viber, WeChat, LINE, etc. Think of it as technological babysitter – someone who is there in case anything looks suspicious. We do not encourage parents to spy on everything word that is being said, but knowing whether or not your daughter is really going to her friend’s house after she’s lied before or whether your son is really ‘studying.’ Odds are your kids are telling the truth, but FlexiSPY lets you be there for those times that may push the boundaries a bit too far.
VoIP call recording is growing in popularity by the day. Now is the time to protect your family or business – or both! – and invest in monitoring software. FlexiSPY gives you more features – with more being developed every day – to make sure you are always ready to take on the next big issue in your life. For more information on VoIP calls and how FlexiSPY can help you, visit www.flexispy.com.
Did you know that nearly 40% of kids and teens say they have been cyberbullied? Or that only 20% of incidents are ever reported to the authorities? Did you know that 20% of kids who are cyberbullied have suicidal thoughts? Neither do most parents. And with suicide rates up 50% for 10-14 year olds alone in the last 30 years, it’s time for parents to start paying closer attention to their children’s online behavior.
Cyberbullying is when someone repeatedly threatens, harasses, mistreats, or makes fun of another person (on purpose) online or while using cell phones or other electronic devices. It’s a growing epidemic that is leading to increased depression and suicide in our youth. By understanding what it is and how to prevent it, society can bring an end to online bullying and give our children a chance to live the lives they deserve.
Here are 8 signs that your children may be victims of cyberbullying:
Changes in how they use their technology: As parents, you can gauge how often your kids are playing on their phones, tablets or computers. Raise your hand if you’ve even had to restrict online time! So, when you find your daughter holed up in her room reading her Chemistry book rather than chatting on Facebook after dinner, she may be sending you a signal. Changes in technology usage – whether it be a lot of phone time to a little or vice versa – are a big indicator that your child is experiencing online bullying. They may be afraid to see what’s being written about them on social media or they may feel a need to constantly defend themselves to their peers. Regardless, if you notice a major in change, don’t be afraid to speak up and ask if everything is okay. Only 1 in 10 kids will actually tell their parents about cyberbullying, so it’s up to you to start the conversation in most cases.
Anxiousness when receiving a text, email or chat alert: If the *ding* of a message once made your son jump for joy in hopes that the girl he liked responded to his post now makes him jump and run for the hills – he may be cyberbullied. Social media actually has an addictive nature – giving people the urge to check it on more-than-regular basis. So, if your child suddenly looks stressed and doesn’t automatically reach for the phone, there could be an underlying problem.
Being secretive about their online activity: While kids aren’t always the most open about discussing their private lives, most parents would agree that they find it hard to resist sharing some juicy gossip or new-fangled device they came across online. Who’s ever gotten the ‘Mom, isn’t this cool? Man, my birthday is right around the corner’ *cough cough* Well, if your son or daughter is now nervous when you come around their phone or quickly closes the webpage they were visiting, it may be an indicator of problems online. Whether it turns out to be bullying or some inappropriate content, it’s important that your children understand that – while you do respect their privacy – you also worry about their well-being and will be checking in from time to time.
Mood swings: Kids are moody. They’re angsty. Their emotions dominate most of what they do in life. However, there are times when the moodiness turns into their regular demeanor and it’s these red flags that you should be aware of. Prolonged periods of anger, sadness or withdrawal are definite signals that something is wrong. Try your best not to feed into the emotion, but rather calmly address the change and see if you can dig out the root of the problem. You never know who could be causing these problems – and if it’s a cyberbully it’s best to catch the issue early on.
Withdrawal from school and social activities: Kids are moody, but they’re also social. And when their social lives become dormant – or they actually resist doing anything with friends, sports or extracurriculars – you should take notice. Yes, teens are lazy and the thought of practicing for soccer for two hours after school may sound like the most painful thing on Earth. However, missing soccer practice, piano, their best friend’s birthday party, the school dance which they went to last year – it makes you wonder what could be wrong. It is very possible that your child has social anxiety over seeing certain people or are worried that if they attend any event that their cyberbullies will turn into real life bullies, which is something that – to them – is far worse than missing out on their favorite activities.
Poor performance at school: Schoolwork can be a clear indicator of unhappiness in a child or teen. We engrain the importance of turning in homework and getting good grades, so if you learn that your daughter is no longer turning in her assignments or that your son if failing all of his subjects – it’s time to ask what’s wrong. No longer caring about school or actually purposefully doing wrong are often cries for help as your children are looking for anyway to get someone’s attention. With teen suicide rates on the rise, any indication that your child is unhappy is cause for further investigation. If you are able to find the root of the problem and stop it – especially if it’s cyberbullying – you are giving your child hope that things will get better and that he or she has a bright future ahead.
Blocking certain accounts from social media or email: On the surface you may not know who exactly your child is talking to online. However, with tools like parental control software, you can actually see for yourself. If you notice that your son is blocking friends or classmates on their accounts, this could be a sign that he is being targeted by these peers. Software, such as FlexiSPY, give you the ability to step in and address a problem like online bullying head on before it gets too heavy for your child to handle. At first your child may be upset that you involved yourself, but when he or she realizes that your interference actually stopped the problem they will surely thank you in the longterm.
Deleting social media accounts: Social media – Instagram, Facebook, Snapchat – is the most common method of communication amongst children, teens and young adults. It’s where they get their news and gossip. It’s where they express themselves and develop their identity. So, if your child suddenly deletes his or her account, you can be fairly certain that someone has made them feel uncomfortable or unsafe online. Again, Mom and Dad, don’t be afraid to ask why. Don’t be afraid to ruffle some feathers. Even if your child doesn’t speak about it with you right away, they know you are there and aware of the problem. And that may be exactly what they need to have the courage to speak up.
Cyberbullying is a real issue in today’s society and one that truly affects our children and teens – and in many cases adults too! It’s our duty to protect our children and sometimes that means toeing the line between parent and friend. Knowing the signs of cyberbullying gives us the upperhand and in a truly viscious battle that is sadly taking the lives of many of our youth – far before their time. Don’t be afraid to intervene. Don’t be afraid to ask questions. And don’t be afraid to get some extra help when your son or daughter just won’t open up. Cyberbullying can be traumatizing and embarrassing, so be gently with your children when bringing it up. Tools like FlexiSPY make it easy for your to see exactly your child is talking to, what they are discussing and if you need to take action to protect him or her from the dangers of suicide or online abuse. We are here to help, 24/7 in fact, so don’t be afraid to contact us and bring peace of mind to your family. We understand that the digital age is hard. So, let us do the hard stuff.
For more information on how to get your copy of FlexiSPY, visit www.flexispy.com today!
A parent’s greatest fear is losing his or her child, and unfortunately this fear is becoming a reality far more often than it should. The culprit? Suicide. The solution? Well, there isn’t one answer, but there are signs you can watch for, steps you can take and tools you can implement to protect your children from making the most drastic — and last — decision of their lives. Mom, Dad, meet parental control software. It’s here and it can save your child’s life.
According to research conducted by the American Association of Suicidology, national suicide rates are the highest they’ve been in nearly 30 years — with three times more teens dying by suicide now than 60 years ago. This epidemic can no longer be ignored and – with the recent focus on suicide in the media and through the spread of twisted social media ‘games’ like the blue whale challenge — it’s time we take measures to reclaim our youth.
Here are 4 steps for preventing youth suicide:
Know the Warning Signs
While there is no key indicator of suicide — it varies with each individual — there are certain signs that may provide a warning to family and friends that someone needs help. These include mood swings, withdrawal from social situations, unstable sleep patterns, talking about feeling lonely or a burden and drug and alcohol use.
Now, at first glance these all sound pretty similar to a typical pre-teen or teenager. You know angsty, emotional, rebellious, never wants to be around the family. But that’s exactly why it’s so important to check in and keep a close eye on your children — because their cries for help may not be loud.
Remember: it’s hard enough for a teen to share their feelings with their parents, let alone those feelings. That’s where parental monitoring software can help be your eyes and ears by allowing you to monitor your child’s social media, internet, phone call and texting behavior to see whether he or she is just being a moody teen or if they are grasping for a helping hand.
Educate Yourself
As parents, we will probably never fully understand our kids. But we can at least try to understand the world we share — and the external factors which impact them.
The Blue Whale Challenge & Social Media
As mentioned in a previous blog post, the blue whale challenge is an online game whereby administrators target troubled youth and engage them in a series of tasks that ultimately ends in suicide. Originating in Russia, this social media phenomenon has recently spread to other countries around the world — with two teen suicides in the US being linked to the blue whale challenge since May.
Schools around the country are warning parents of the game and asking them to be open to conversations should their children speak about the blue whale challenge. Parents are also urged to watch for signs their children may be involved. Parental control software gives you the ability to target specific key words (like ‘blue whale’) and receive notifications when your child or whomever they are speaking with uses them. Imagine being able to step in at the first sign of danger or risky behavior.
Suicide Is Contagious
We know, it surprised us to learn this too. Recent medical research has concluded that, “Exposure to suicide is pervasive and occurs beyond family.” This means that those exposed to suicide — whether directly through a friend or family or indirectly via social media or another outlet — are more likely to have suicidal thoughts.
In a recent Newsweek article, research found that one suicide now affects roughly 135 people — a third of them being seriously impacted by it — as compared to about 6 people in the past. We have technology and social media to thank for this with Dr. Christine Moutier, chief medical officer at the American Foundation for Suicide Prevention, noting teens see the attention garnered by the deceased and in turn feel a desire to also be part of this “romanticized death.”
Other risk factors that can influence suicide include depression, other suicide in the family, financial or personal loss and past abuse or trauma, among others.
Have A Conversation
Now that you know what to look for — as well as the additional risk factors that can contribute to death by suicide — you are more prepared to have a dialogue with your children. Some experts recommend not bringing suicide up, as it may encourage them to seek out more information. Still, others think it’s important to let keep open communication with your kids about pertinent topics like this.
However you decide to do it — whether it be asking your children directly if they have heard of the blue whale challenge or indirectly by just asking if they are okay on a regular basis — know that your words and your interest in your child could be the difference in what decision he or she makes.
Use Parental Monitoring Software
Kids and teens don’t always want to talk and parents oftentimes don’t want to overstep their boundaries — because who wants a grumpy teen, right? So, let parental control software be an added layer of security for those times when you want to know, but you don’t know how to ask. Check in from time to time — maybe you’ll be happily surprised that nothing is going on. Or maybe you’ll be able to step in before it’s too late.
For more information on how to download the most powerful parental monitoring software on the market, click HERE.
The Time Is Now
We live in a world centered around technology. A world where people like the Russian blue whale challenge administrators are able to prey on the weak. A world where people we have never met can cause us to make the biggest mistake of our lives.
Parents, we get it — you don’t want your kids to hate you for checking up on their social media or texting habits. And you don’t want them to shut you out because you’re prying. However, you also don’t want to wake up one morning — and every morning thereafter — to find your son or daughter has died by suicide knowing you could have prevented it. So why not let parental control software walk that fine line between invading your child’s privacy and saving their life.
Get FlexiSPY — the world’s most powerful monitoring software — HERE.
If you or someone you know is displaying suicidal behavior, don’t wait. Contact your local suicide hotline NOW!
That’s right! The wait is over and Android users can now download FlexiVIEW – FlexiSPY’s sleek new mobile beta app. FlexiVIEW is the first-of-its kind app that gives you access to your data from the convenience of your phone. Plus, it’s FREE for existing users!
So, what is FlexiVIEW?
FlexiVIEW is a brand-new app – our first ever – from FlexiSPY. Its easy-to-use design brings to life your favorite FlexiSPY events right on your Android phone, so you don’t have to log in to the online portal when you want to check on the target’s VoIP Call Record, Call Record, Email, IM, Address Book, SMS, Camera, Ambient Record and Location information.
What are the Key Features?
In addition to its convenience, FlexiVIEW has incredible features that ensure a truly user-friendly experience. With our mobile viewer app you can:
View data from your phone without logging onto the website
Group data by category and arrange based on importance
Choose to monitor only the data that is relevant to you
See which categories have been active since your last login
View the most recent 100 events on the Timeline
Manage all of your accounts within the app
Enable or disable calling conveniently from the menu
Redirect to your online user web portal
What is Beta?
Beta gives you first access to try out FlexiVIEW. And since we value your opinion, we’ve created the FlexiVIEW Forum for you to leave us your thoughts and feedback regarding the app.
How can I get FlexiVIEW?
Step 1: Purchase a copy of FlexiSPY HERE Step 2: As this app is still in beta, please message us inside your online portal to ask for access. Our team will be happy to set you up!
Imagine a place where the most influential vessel of communication is controlled by a spray-tanned humanoid who uses 140 characters to wreak havoc on society – every day creating new enemies and leading the world to the brink of nuclear war. Ladies and Gentleman, Welcome to America.
Melania, you have the key to stop this now. Thank you, FlexiSPY and The World.
President Donald Trump has been making headlines for years with his uncensored Twitter rants and attacks on the media, other celebrities, politicians, races, religions and even entire countries. Back when he was a reality TV star this was deemed a bit more acceptable, but now that The Donald currently holds the most powerful position in the world, his outbursts are having supporters on both sides of the political spectrum wondering when someone’s going to give him the old, ‘You’re Fired!’
Body slams and face-lifts
In an era of charged politics and global tension, the world needs a unifying force. A leader that can mend the uncertainty and tears in the social and economic fabric to bring about the positive change that is so desperately needed. And whether President Trump is or isn’t that person, it’s impossible to know amidst the perpetual media frenzy that follows his trail of Twitter shrapnel.
And as Trump’s mental state continues to come into question through the debris of bloody face-lifts and WWE (er, CNN) body slams, some remain optimistic that a glimmer of hope exists in the form of POTUS’ wife, Melania.
An unlikely heroine to be certain, Melania seems to be the apple to Trump’s orange (pun intended) and the public is looking at her seemingly poised demeanor to bring a calm to the White House – and the incessant Twitter rampages. However, even if Mrs. Trump is able to slow down the president’s tweets (honestly, we’re not quite sure what she’s actually capable of doing), we know there’s only so much she and the entire presidential staff can do. That’s where we come in.
But FlexiSPY, how could you possibly save the world?
Two ways. Firstly, we can prevent global disaster at the hands of Trump AND secondly, we can make peace through messages of reconciliation.
Okay, so that may be a bit of a hyperbole – but we don’t think it’s so far off the mark to say that the world’s most powerful monitoring software could actually achieve these goals.
What if the president were to, say, taunt North Korean leader Kim Jong Un about testing nuclear-capable missiles – wait, you mean like he did on July 4th? Or mock Arnold Schwarzenegger for his politics and tv ratings – oh, that happened too. . .
Rewind. Let’s say that Melania had hypothetically installed FlexiSPY on the president’s phone before poking the nuclear bear or chastising the Terminator. Here’s what would play out as she uses FlexiSPY’s sleek Spoof SMS feature, which allows her to send a text to anyone’s phone on Trump’s behalf:
Preventing global disaster – The Donald’s idle hands start typing away at some obscure hour of the early morning. Melania hears the dreaded *ding* on her phone alerting her that someone is about to get Twitter-slammed. Oh no, he’s insulting Kim Jong Un again. Time for damage control. FlexiSPY to the rescue.
Melania signs into her convenient online portal and accesses the Spoof SMS feature. Kimbo! Sorry about that tweet! Honest slip of the fingers. Let me know if you’re ever up for that chat.
Messages of reconciliation – Trump can’t help himself from tweeting after AH-nold’s departure from The Apprentice (because that’s what one does when in charge of the US.) Have no fear, Melania and FlexiSPY are here! Hey Arnold, ignore the latest tweet. Trying to get some ratings – something you wouldn’t know about J/K! Dinner on me soon!
Crises avoided. For now.
That’s not all, folks!
FlexiSPY goes beyond just sending messages of reconciliation. With over 150 monitoring features, our software gives Melania, the US – and really the rest of the world – a strong line of defense against the temperamental musings of a malignant president.
Using Flexispy’s Alert Wizard, Mrs. Trump can receive automatic notifications as soon as preset ‘hot words’ appear in SMS, IM chat or e-mail. That’s right, regardless of the hour or time zone, as quickly as POTUS can type ‘crooked’ or ‘fake news’, Melania could immediately spring into action to encourage a retraction or at least a pause in the action.
The ability to record VoiP calls and phone calls, as well as monitor SMS and social media, will also allow the First Lady to stay on top of the president’s conversations and help him avoid backtracking on any promises he may have made – or forgotten about.
Whether you did or didn’t vote for Trump is not the point. The issue is whether or not one of the world’s superpowers is in capable hands – and there seems to be a glaring disconnect when, of all the nations surveyed, only Russia and Israel gave a higher rating to Trump than Obama.
According to Mika Brzezinski, a recent Twitter casualty, President Trump, “appears to have a fragile, impetuous, childlike ego that we have seen over and over again.” And while his business acumen and public presence may make him a leader in his own world, his propensity for lash outs and juvenile tweets doesn’t mean it qualifies him to lead a nation in the real one.
That’s why we fully support the use of FlexiSPY – or shall we say, FLOTUS-SPY – as a tool for keeping the world safe and helping the First Lady make America great again.
Have a Donald in your life? Head over to www.FlexiSPY.com and prevent your own global disaster today!
FlexiVIEW is a first-of-its-kind app that gives Premium and Extreme users the ability to see many of your favorite FlexiSPY events right from your phone – that means you won’t need to check the online portal for information about Call Record, VoIP Call Record, SMS, Email, IM, Address Book, Camera Photo, Ambient Record and Location functions.
View data directly from your own phone without logging into your portal
Group and arrange data based on category and importance
Only monitor the data that is relevant to you
A badge number tells you which categories have been active since last logging in
See the most recent 100 events on your Timeline
Manage all your accounts within FlexiVIEW
Enable or disable calling right from the menu
Redirect to your online portal if needed
Know your data is secure with two-factor authentication
What does Beta mean?
Beta means you’ll be the first to try FlexiVIEW. It also means we want your feedback and opinions to ensure FlexiVIEW has the best possible user experience. Once you’ve used the app, you can leave us comments in the FlexiVIEW Forum.
Kaspersky Lab, the Russian cybersecurity and anti-virus vendor, filed a series of antitrust complaints against Microsoft earlier this month, stating the software giant is purposely disabling third-party anti-virus programs in favor of its Windows Defender AV. However, after delving further into the claims – and hearing from Microsoft themselves – it’s beginning to sound like Kaspersky Lab is just butthurt it could lose some of its market share.
There’s No Crying in Cybersecurity
Imagine you have one of the – if not the best product on the market. And imagine your product pairs directly with the most widely-used operating system in the world. Seems like a match made in heaven. Now, imagine that same operating system began developing their own product. One that was designed by their own engineers and that comes standard with their operating system at no extra cost to consumers. There’s no need to renew the subscription and no glaring need to install a third-party product. Not too shabby from the customer perspective.
Okay, so the new product isn’t as good overall as yours, but it’s not the worst either – and it keeps improving. So, just because you don’t like that there’s a new player coming up in the market, does that mean it’s illegal or infringing on anti-competition laws?
That’s the question begging to be answered as Kaspersky Lab recently filed antitrust complaints against Microsoft. Founder, Eugene Kaspersky said, “Microsoft uses its dominant position in the computer operating system (OS) market to fiercely promote its own – inferior – security software (Windows Defender) at the expense of users’ previously self-chosen security solution.” Isn’t the goal of every company, to promote and sell its own products?
But, we get it. In the age of hacking and cyberattacks, it makes sense to have the best possible anti-malware and anti-virus software available – or at least the option to use it. On one hand, Kaspersky was upset to find out that Windows 10 will sometimes disable third party software that is expired or not compatible with their latest updates and automatically turns on its own Microsoft Defender. Kaspersky Lab’s claims that Microsoft is allegedly trying to edge out competitors, but it’s their operating system. And if Microsoft now has the resources and R&D to develop an AV program that’s specifically designed and optimized for its own operating system, shouldn’t they be allowed to do so? Or at least be an available option for customers like Kaspersky?
Microsoft supports a community of over 80 independent software vendors through the Microsoft Virus Initiative (MVI) program – so, on the other hand Microsoft is working to ensure that its customers are never at risk for a cyberattack. “We built Windows Defender Anti-virus to make a promise to our customers that every Windows 10 device ALWAYS has protection from viruses and malware,” wrote Rob Lefferts, Partner Director at Microsoft, in a recent blog post addressing the publicity surrounding Windows 10. “If AV software is protecting our customers, Windows Defender Anti-virus will stay off. If a customer does allow an anti-virus application to expire, Windows Defender Anti-virus is automatically turned on so that they are not left unprotected.” Wipe away those tears Kaspersky, it seems pretty logical to us.
Then, what’s the issue?
That’s what we keep asking ourselves. Of course, the last thing any company wants is to have someone else encroach on their business, and Kaspersky Lab feels that, due to Microsoft’s size, it will be more difficult for specialized players like themselves to grab a share of the market if they push Microsoft Defender. Their issue arises when users update their system to Windows 10 and the Kaspersky software is temporarily disabled – but this doesn’t happen with every anti-virus program.
Lefferts wrote, “Microsoft’s application compatibility teams found that roughly 95% of Windows 10 PCs had an anti-virus application installed that was already compatible with Windows 10 Creators Update.” This means Kaspersky Lab is part of the 5% that didn’t meet the new compatibility standards. BUT WHY? According to Kaspersky, not enough time. He noted that problems could have been avoided if his team were given more time to confirm compatibility, “We’re only asking for a few more weeks to make necessary tweaks, which isn’t a lot to ask when customers’ security is on the line.” Fair point, but that doesn’t explain why other major AV players, like Avast and ESET, aren’t complaining about these same compatibility issues.
But it’s anticompetition right?
That’s yet to be determined. According to the FTC, ‘anticompetitive conduct violates Section 5 of the Federal Trade Commission Act, which bans “unfair methods of competition” and “unfair or deceptive acts or practices.”’ Kaspersky Lab is deeming it unfair that Microsoft is pushing its own AV application, while Microsoft is saying Microsoft Defender only runs when a third-party software is disabled or when a customer opts not to purchase or run an additional anti-virus or antimalware program.
Anticompetition is about pushing innovation. Kaspersky Lab has award-winning products, why wouldn’t Microsoft innovate to reach these standards? It’s also about keeping the market competitive – Microsoft is adding an improved product to the market to put forth yet another option for consumers to choose. The emphasis is on ‘choice’ as Microsoft is not forcing anyone to use Defender – rather the program is bundled into Windows 10 and gives people the opportunity to use it or upgrade their current alternative anti-virus software. And what about those who are unable to afford or choose not to use third-party programs – well, Microsoft now ensures they are also safe.
Kaspersky is no doubt a leading name in the anti-virus industry, but with only 5.22% of market share it’s hardly the biggest player. At face value, their claims could be true – that big bad Microsoft is purposely making it difficult for third-party AV providers to keep their customers and deceiving people about their intentions. FlexiSPY had a similar experience where we were accused of masking our software’s true identity and intention. However, in the end, the unfounded claims were seen for what they were – a desperate attempt to defame a brand they felt threatened by.
When did it become the responsibility of one company to slow down their own progress to make sure their competitors were doing okay? We understand it’s no fun holding a lower market rank than you think you deserve (we’ve all been there), but that doesn’t warrant trying to take down the very business that keeps your business afloat. That sounds a bit more like anticompetition if you ask us.
It seemed like a legitimate email. At least until the dreaded pop-up appeared telling you that your files had been encrypted. Ok, take a deep breath, you have an anti-virus program to get rid of malware. But this is different. This is asking for money to get your files back. And there’s a time limit? It’s like something out of a hostage movie. And unless you’ve been backing up your files – or are secretly Liam Neeson in Taken – you may have to pay the ransom. Wait, there’s another option? That’s right, you can also choose to infect two of your friends with this software in exchange for a free key to decrypt your files. To pay or to infect? That is the question.
Ladies and gentlemen, welcome to the new era of ransomware.
A Modern-Day Sophie’s Choice
Ransomware attacks are skyrocketing as cybercriminals continue to find new ways to infect individual and corporate computers in an effort to get their piece of this $1 billion dollar industry. While most ransomware has a pay-to-retrieve format – like last month’s WannaCry, the biggest cyber-attack in history, infecting more than 230,000 computers in four days – there’s a new variation on the scene. It’s called Popcorn Time and it’s the ultimate test of your moral compass – pitting you against your friends, family or coworkers as you decide whose data is more valuable. Sophie, eat your heart out.
It’s like there is an industrial cybercriminal kitchen that continuously churns out new recipes with new ingredients and we are the taste testers. If the software can be improved – in other words, it’s easy to bypass the ransomware – these cyberchefs head back to their pantry and search for that secret something that will perfect the dish. Think of ransomware as movie theater popcorn with layers of butter and Popcorn Time like it’s artisanal truffle butter big brother – both delicious, but one has that extra something. Unfortunately, in this case, ransomware attackers aren’t testing our flavor preferences, but rather our morality and pocketbooks. And they still haven’t found the perfect combination of ingredients, so it is likely we will be seeing new menu items in the near feature.
What is ransomware?
Ransomware is malicious software that either disables access to a target device (locker ransomware) or encrypts files (crypto ransomware) with the intent of holding them hostage until the user agrees to pay a specified ransom to regain access. While the first iteration appeared as far back as 1989, ransomware began garnering public attention with the Trojan.GPcoder in 2005. This multi-layer malware has quickly evolved into one of the most popular methods for cybercriminals to hijack your computer – and make some quick cash.
How does ransomware work?
While there are many ways for ransomware to infect computers, the most common is through email. Hackers send phishing campaigns – infected messages – that when opened will download the malware to a device. Sometimes these emails are obvious (Did you really think a Nigerian prince would ask you for money?), while some are disguised as invoices or pay slips and others are sent directly from a hacked account from your contacts list.
Other means for spreading ransomware include infected USBs, downloading files from untrusted websites and malvertisements (infected online advertisements).
How common are ransomware attacks?
According to Symantec, global ransomware attacks rose 36% in the last year with “100 new malware families released into the wild.” Kaspersky further supports these findings showing businesses went from being attacked once every 2 minutes to once every 40 seconds. And as the number of affected companies and individuals grows, so does the ransom. Last year, you could expect to pay an average of $1,077 to get your data back (up from $294 in 2015), while only time will tell how much that rate will continue to rise.
Do I have to pay?
Technically, no you don’t have to pay – and cybercrime authorities discourage giving in to this extortion. However, each case depends on the individual or company involved and it’s important to assess the situation before making any decisions. Consider the following:
How much data was compromised? Some attacks only affect one computer, while others creep into the entire network. Evaluate what exactly was infected and whether you can continue operations without this information.
Did you back up your server? We can’t stress enough how important it is to regularly back up your data, especially with ransomware on the rise. With your files protected on a separate hard drive, cloud or server, you will be able to start from where you left off without having to pay.
How long will it take to return to normal operations? 72% of employees with infected computers were locked out of their files for two days, while 17% were blocked for ten. This could cripple the productivity and operations of businesses running on a smaller scale, while others – like hospitals – simply can’t afford to have prolonged down periods due to the nature of their work.
Only 34% of people worldwide do not pay when they encounter ransomware. And while this number is higher in the US (64%), it’s important to recognize that payment is not required. Weigh your options carefully and determine what will work best for your specific case. Also, keep in mind that you are dealing with criminals, so there is no guarantee they will follow through after you pay. In fact, 20% of those who paid the ransom did not receive their decryption key.
How can I prevent ransomware?
The best way to avoid ransomware is to keep it from infecting your computer in the first place. It may seem like common sense, but as hackers continue to innovate, it’s up to individuals and companies to be proactive and implement precautionary measures:
Back up your system. Always, always, always back up your files on an external system. If you have a great deal of important data, consider setting up two backups: an external hard drive and a cloud-based system. Note: if you only have a physical hard drive as a backup, be sure to disconnect it from the network when back up is completed to prevent it from attacks.
Install monitoring software. Computer monitoring software, like FlexiSPY, gives you an added layer of protection. Know immediately if anyone is visiting risky websites, downloading pirated files or using external storage devices that could compromise the security of your network.
Use a strong anti-virus. Regularly update your anti-virus program and consider paying for a more powerful version, especially if you need to protect important company information.
Be aware. Educate yourself on the dangers and signs of ransomware. Taking time to know what to look for and how to avoid it will decrease your likelihood of being attacked – and hopefully save you some money and stress. When in doubt, don’t click about!
What if I do get infected?
If you do find yourself hit by WannaCry, Popcorn Time or another variation of ransomware, there are steps to take for rectifying the situation:
Disconnect the infected computer. Taking your machine offline will keep it from spreading any malware to other machines on the network.
Download ransomware removal tools. See which software would work best for your case, but keep in mind that with so many types of malware, no product is 100% guaranteed.
Visit www.nomoreransom.org. This international initiative is made up of some of the world’s leading cybersecurity and cybercrime players who “have joined forces to disrupt cybercriminal businesses with ransomware connections.” They have a number of decryption keys available that may be the answer to regaining control of your computer.
Our children are the first generation of digital natives. The first to not remember life without technology, social media, WIFI, mobile phones or computers. Heck, some don’t even know what a CD is, let alone a cassette or vinyl?! And while society’s foray into the futuristic world of robots and Bluetooth is seemingly right on track with what we hoped to achieve, it’s become obvious we didn’t plan for the negative effects that come along with it – especially with regard to online safety for kids.
Here are 11 tips to help keep your children safe from digital backlash:
1) Discuss Online Safety
The internet is an amazing resource for information, learning and fun, but with all that content and all those people it’s important to discuss online safety for kids:
Don’t give out personal information.
Establish which websites are okay and which are off limits.
Don’t talk to strangers or accept their friend requests.
If someone makes you feel uncomfortable or bullied, say something immediately.
2) Sign a Social Media Contract
Think of this as your family’s Digital Constitution. Involve your children in the discussion and create a social media contract together. After all, they are the tech and social media experts. Talk about what pressures they feel and what negative effects too much social media time can have on their everyday lives. Let them set their own consequences if they break the rules. Kids will feel more invested as they are responsible for setting the guidelines. Stick to the contract, but leave room for amendments as your children get older or prove they can make smart decisions about online safety.
3) Establish Screen-Free Zones
It seems that no place is safe from electronics these days, but you can change that. Set clear boundaries with your children about where they can and cannot use their mobiles, computers or tablets. Having these screen-free zones allows you to engage with your children and encourages them to break free from their devices. Some suggestions:
At the dinner table: You don’t need to answer that text – instead, talk about friends, homework or family issues.
In the car: Your bestie will still talk to you when you see her in five minutes at school, honey. Use car time to chat about school, play Carpool Karaoke or enjoy the view.
In the bedroom at night: Not only does a screen’s light trigger your brain to stay awake, but the anxiety of waiting for a social media post or comment is causing some people to wake up in the middle of the night to check in.
But Moooooooom. It’s my phone! It’s my bedroom! Stay strong. Of course, you’ll be met with resistance at first, but over time it will become habit and you’ll be happy knowing that family time is still sacred – at least in some places.
4) Educate Yourself
Admit it. Your kids are way more tech savvy than you. This is all the more reason to take time to understand how they are using the internet and which applications are most popular. No, you don’t have to download Tinder or Snapchat, but ask your children to show you how they work. At least you’ll be able to have informed discussions about responsible usage and online safety. Even better, see if you can find an application that the whole family can use together. Set up a group chat on WhatsApp and keep a constant conversation going.
You can’t be everywhere all the time – nor should you be. It’s important for kids to have their space and to understand that you trust them. It’s also important to have tools in place to ensure they are safe, because they aren’t always looking to talk about personal matters, Mom and Dad. Parental monitoring software, like FlexiSPY, can help be your eyes and ears when you aren’t there.
Tell your children you’re installing the software. Receive alerts when certain words are used, inappropriate websites are visited or apps meant for adults are downloaded. You’re not invading their privacy. You’re not reading their conversations. You’re simply setting the expectation that they need to make healthy decisions, practice online safety and avoid dangerous situations.
6) Monitor Social Media Posts
Does a stranger really need to see your teenage daughter and her friends at the beach? Is it necessary that the world knows your son is at the mall? Today, social media and teens are synonymous. Ask to see their accounts. See what they are posting and who they are talking to and hanging out with. Encourage your kids to be kids – be silly, take pictures, have fun! But also explain that what’s on the internet lasts forever and come to an agreement about what is appropriate and inappropriate to post.
7) Check Privacy Settings
Look through browser and application privacy settings and disable any unnecessary tracking features and cookies that may affect online safety. Set your child’s profile to private and ensure only friends and family can see what they are posting. Explain again that it’s important to be themselves online, but that it’s not necessary for strangers to also know so much about them.
8) Practice What You Preach
That’s right parents, it’s time to put down our own phones and live in the moment. Set a positive example and hold yourself to the same standards as your children. Honor the screen-free zones, seek out tech-free activities and make an effort to be fully present during family time. Your kids will see you spending less time online and will follow suit.
9) Set Time Limits
Remember the days when our parents limited us to 2 hours of TV time a day? This doesn’t have to change simply because our devices are portable. Before mobiles reached the masses, kids happily spent time away from technology. Set tech-time limits for your children and enforce them. But moooooooommmmmm… BUT nothing. You’re the parent and you make the rules.
10) No Underage Access
Did you know that social media sites have age restrictions? Most applications are for those 13+, while some require users to be older – Whatsapp (16+), Tinder (18+), YouTube (certain videos are 18+). Did you also know that most sites don’t verify if the user is actually 13+? This is where setting those boundaries is so important in deterring young ones from logging on to sites not meant for them. Use parental monitoring software to verify that your kids are being responsible and following the rules for online safety that you set together.
11) Don’t Judge Their Mistakes
We need to set examples for our children, but we also need to know when to take off our mommy and daddy hats and make them feel safe and not judged. Kids will make mistakes. We made them, their kids will make them. It’s life. One of the worst things we can do as parents is make our kids feel like they can’t talk to us. Let them know that no matter what, we will listen. Don’t say, ‘I told you so.’ Say, ‘Honey, I’m sorry this happened. Let’s look at what we can do differently next time.’ The moment they stop communicating is the moment we close the door on knowing what they are actually up to. Trust is gone and silence becomes our lingua franca.
Youth have access to more information and are more connected than ever before. And while this is contributing to a global society, broadening horizons and sharing cultures, it’s also exposing our kids to cyberbullies, content way too mature for their age and, unfortunately, predators. So, let’s take a step back from our own tech-filled lives and look at how we can support our children in balancing their real lives from their virtual ones. Hopefully, we can set a strong example of online safety and navigate this digital wasteland together.
As teen suicide rates erupt in Russia, authorities look to online ‘death groups’ as prime suspects. Their alleged platform? A disturbingsocial media game called the Blue Whale Challenge.It’s time to ask what we can do to ensure our teens are safe.
It seems unfathomable that something like this could exist. Something so dark. So heinous. It’s like a modern day Jack the Ripper – a faceless killer wreaking havoc on the weak – only now, Jack is a ‘curator’, his weapon a social media game and his victim…our fragile youth.
What is the Blue Whale Challenge?
In some depraved way, it’s a game. And it’s quite simple really:
Seek out a curator, or mentor – a member of a death group or online community that convince teens to take their own lives who guides you through the Blue Whale Challenge
Agree to complete every task the curator assigns – NO backing out or they will come for you
Oh, and one more minor detail – acknowledge that to win, you must die.
That’s right. After 50 days of acquiescing every demand, including disrupting your sleep schedule and self-mutilation, your curator will tell you to kill yourself. And so far, more than 130 Russian teens have done just that, while numerous other teens around the world have been saved before it was too late.
Reported by RT last year, authorities and the media have since been investigating whether the Blue Whale Challenge is in fact being played outright or if it’s an urban legend – either way, something is happening and we need to make it stop.
Why are teens playing?
Pressure is greater than ever. Gone are the days when bullies were left at the schoolyard and the image of perfection was limited to the latest magazine covers at the supermarket. Now, in our tech-obsessed society, we are continuously exposed to – no bombarded with – an endless barrage of flawless celebrities, baseless sub-truths and unrealistic goals. Cyberbullying follows us home. Social media means our lives are what we let people perceive. And when you’ve never known life without this steady flow of warped reality, the surreal is just plain real.
It’s easy to feel left out. Numb. Stranded. Like the blue whales who beach themselves to die. So, when someone gives you a chance to feel a rush, to feel a sense of belonging, to feel something, what have you got to lose? The World Health Organization reports suicide as the “second leading cause of death among 15-29 year olds globally,” and with youth suicide the fastest growing segment of this demographic, it’s easy to start connecting the dots.
It’s time for a conversation
Once taboo, youth suicide – especially in relation to the dangers of social media, peer pressure and depression – is begging to be heard. Pop culture has started the conversation with films like Lionsgate’s Nerve or series like Netflix’s 13 Reasons Why. And for the first time, society is giving a voice to those without.
Did you know hospitalization of youth with suicidal intentions has doubled in the last ten years? It’s up to us to keep the conversation going. Look for signs of the Blue Whale Challenge – pictures of blue whales, depressed posts or images, specific hashtags (#bluewhale, #bluewhalechallenge, #curatorfindme, #f57, #f58, #I_Am_Blue_Whale) – and voice your concerns.
Students, speak up if you see changes in your peers or come across pro-suicide groups. Parents, communicate with your children.
And while it’s impossible to know what someone is doing or thinking at all times, there are tools to make it easier. FlexiSPY’s monitoring software gives you peace of mind knowing that your children are making the right decisions online and allows you to step in at the first sign of trouble or inappropriate interactions.
Use FlexiSPY as a means of showing your teen you trust them. You’re not spying or keeping them hooked to your fishing line. But you are instead protecting against those looking to catch them in their own sinister nets.
Most of us will probably never understand why others choose to prey so viciously on the vulnerable, but we can take steps to prevent it. Have the conversation with your teens about the Blue Whale Challenge. Let them know they are never alone, because really, we are all swimming together in a deep blue sea. And it’s our duty to make sure that everyone – even the blue whale – stays in the water.
Cyber security is one of the hottest topics in the media these days and we at FlexiSPY take it very seriously. Our customers and their data are our top priority which is why we are proud to announce the addition of Two Factor Authentication (or 2FA) to our software and online portal.
What is Two Factor Authentication?
2FA is an added layer of security to ensure even more protection for users and their personal data. It requires you to enter a two factor authentication code in addition to the standard username and password that most websites, including social media, email and even online banking accounts, require for login.
As it’s become increasingly easier and more common for these single factor authentication login credentials to be compromised – the need for extra safeguards like two step verification has never been more pertinent.
How does Two Factor Authentication work?
2FA is very user-friendly and is free for all FlexiSPY customers. Here’s how it works:
First, Install an authenticator app on your phone or tablet from App Store or Play Store. Supported apps: Authy, Duo, Google Authenticator
Next, log in to the FlexiSPY online portal as usual, entering your username and password.
After logging in, go to your Account settings, and click the Enable button under two-factor authentication. This will bring up a popup giving instructions for completing setup. After this is done, simply open your authenticator app and enter the one-time code that is sent to your phone each time you log in.
Why is Two Factor Authentication useful?
Two Factor Authentication provides customers with greater protection against cyber criminals than traditional username and password logins by giving you – and only you – physical access to a unique two factor authentication code.
This extra step can reduce insider threats, data and identity theft and even overall operational costs. Plus, it’s free!
We’d love to hear from you
Have you ever used Two Factor Authentication? Do you think all companies should implement this technology? What other security technology do you use?
Let us know your questions and feedback in the comments section below!
*Special note: If you ever get locked out of your two factor authentication, you will need to contact our Support Team directly to remove it from your account.
Download FlexiVIEW – FlexiSPY’s brand new mobile beta app for iOS – and access your events like never before! This first-of-its-kind app is free to existing users and brings a new level of convenience to your mobile monitoring account.
What is Beta?
Beta means you get first access to FlexiVIEW. It also means we value your opinion and want your feedback to ensure FlexiVIEW has the best possible user experience. Let us know your thoughts in the FlexiVIEW Forum.
What is FlexiVIEW?
FlexiVIEW is a sleek new app that gives Premium and Extreme iOS users easy access to a number of your favorite FlexiSPY events directly from your phone – that means no need to check the online portal for Call Record, VoIP Call Record, SMS, Email, IM, Address Book, Camera Photo, Ambient Record and Location functions.
Key Features
View data from your phone without logging onto the website
Group data by category and arrange based on importance
Choose to monitor only the data that is relevant to you
See which categories have been active since your last login with a handy badge number
View the most recent 100 events on the Timeline
Manage all of your account(s) within the app
Enable or disable calling conveniently from the menu
Redirect to your online user web portal
Two-factor authentication provides extra security for your data
Application Screenshot for iOS is a free feature for PREMIUM and EXTREME customers that remotely snaps screenshots of an app while it’s in use and automatically uploads the images to your online portal. This is one of many powerful FlexiSPY functions that aims to paint a complete picture of how specific applications are used and is especially beneficial to employers, parents and even you.
How does Application Screenshot for iOS work?
This feature is very user-friendly and can be customized based on your preferences. Once you set the program to take screenshots of a particular app via the online portal, the images are automatically uploaded to app-specific folders for easy viewing.
Here’s how it works:
Log in to your online portal and click the Apps Screenshot button.
Here you can see all supported applications as well as set your preferences. You can even select which programs are relevant to you by adding or removing them in the Monitored Application tab.
Clicking on any of the apps brings you directly to the screenshots. Use ‘Search’ to find specific keywords, while ‘Date’ lets you look at any images downloaded within a certain time period – saving you time.
Images are clearly labeled with date and time and can be enlarged, deleted or starred for easy access in the future.
Why is Application Screenshot for iOS useful?
FlexiSPY’s Application Screenshot for iOS provides essential insight into how people use their apps and gives you the power to protect what is important to you. Employers, parents and even personal users can benefit from these screen grabs:
Employers who provide company mobiles often monitor phone usage and these captured images are useful in uncovering employee espionage or evidencing insider threats.
Application Screenshot for iOS is also a powerful tool for parents in protecting children from online predators or to intervene in cases of cyberbullying – an increasingly common issue amongst kids and teens.
Personal users of this feature can keep track of important conversations with clients or contractors and ensure that your information is always secure within the online portal even if you lose your phone.
Tell us what you think
How will Application Screenshot for iOS benefit you? Employers – how will this feature help in your office? Parents – does this give you a greater sense of security regarding your child’s online habits?
Stay in the know
We are continually adding new features like the Application Screenshot for iOS to FlexiSPY. Check out our Changelog for a full list of features HERE.
Application Screenshot is currently only available for iOS users, but don’t worry Android support is coming soon!
Keylogger for iPhone is an exciting addition to FlexiSPY’s iOS features list. This unique function captures every keystroke entered on a target device, even if a user does not hit send.
What is Keylogger for iPhone?
Free for PREMIUM and EXTREME customers, Keylogger for iPhone records everything that is typed in any of the supported applications – this includes messages, search terms, as well as deleted text. Keylogger for iPhone is useful for parents, employers and even those using the software for personal use, because it helps provide a full snapshot of how and why a specific app is being used.
How does Keylogger for iPhone work?
Any time something is typed into a supported application, such as SMS, Facebook, WhatsApp or LINE, the Keylogger for iPhone records the keystrokes and adds them to a secure log file in your online portal.
Users can log in to the portal and select Key Logs to access the recorded information. Select from the list of supported programs and see exactly what has been typed in the secure file log.
If you are looking for a specific keyword, our convenient search function quickly filters through the stored data to find the information that is relevant to you.
Why is Keylogger for iPhone useful?
Here’s why parents, employers and even those using FlexiSPY for personal use will find the Keylogger for iPhone useful:
First, it helps employers monitor employee activity to ensure protection against insider threats and the prevention of intellectual property loss.
Parents, on the other hand, will find Keylogger for iPhone an essential tool for keeping track of children’s online behavior. This means starting a dialogue about responsible decision-making and being able to step in at the first sign of inappropriate usage or contact with strangers.
For personal use, the Keylogger for iPhone is an excellent resource for backing up your typing history – which comes in handy for disputing claims or confirming terms of agreement with clients and contractors.
A major benefit of Keylogger for iPhone is that it also records deleted text. We mean it when we say this feature records every keystroke, conversation, or search term in the supported applications.
Tell us what you think
What is your opinion on Keylogger for iPhone? Employers – how will this improve your business? Parents – how do you think this feature can help protect your children?
Stay in the know
We are continually adding new features like the Keylogger for iPhone to FlexiSPY. Check out our Changelog for a full list of features here
FlexiSPY is proud to announce the release of our brand-new feature – Keylogger for Android – a unique function that captures every keystroke entered on a target device, regardless if a user hits send or not.
What is Keylogger for Android?
Our Keylogger for Android is a free feature available to PREMIUM and EXTREME customers. It records everything that is typed in any of the supported applications, including messages, search terms, and even deleted text. This tool has benefits for all FlexiSPY customers including parents, employers and even those using the software for personal use, as it helps in providing a complete snapshot of how an app is being utilized – and anyone who is responsible for employees or children knows the importance of understanding how and why apps are used.
How does Keylogger for Android work?
When a letter, word or character is typed into a supported application, such as Facebook, WhatsApp or LINE, the Keylogger for Android picks up the keystrokes and adds them to a secure log file in your online portal.
To view the recorded information, simply log in to your portal and click the Key Logs button. From here you can select your desired application from the list of supported programs and read what has been typed in the secure file log.
If you are looking for a specific keyword within the Keylogger for Android, our search function lets you quickly filter through the stored data to find the information that is relevant to you.
Why is Keylogger for Android useful?
The Keylogger for Android has a number of important uses for employers and parents, as well as yourself:
Employers can use the Keylogger for Android to monitor employee activity to ensure the protection of intellectual property and to prevent internal theft.
Parents, on the other hand, will find peace knowing their children are exercising responsible judgement online and can step in at the first sign of risky behavior or inappropriate contact with strangers.
When it comes to personal use, Keylogger for Android provides an extra backup for those times when you misplace an important piece of information or need to confirm the exact terms you agreed upon with your building contractor before the project began.
As mentioned, a major benefit of Keylogger for Android is that it also records deleted text, so when we say it records every keystroke, conversation or search term in every supported application, we mean every single one.
Tell us what you think
What do you think of Keylogger for Android? Employers – how can this improve your workplace? Parents – in what situations do you think this feature will help to protect your children?
Stay in the know
We are continually adding new features like the Keylogger for Android to FlexiSPY. Check out our Changelog for a full list of features here
Android users rejoice! FlexiSPY is thrilled to announce that we now support Nougat, the sleekest and (in our opinion) sexiest platform from Android to date. Our development team has worked round the clock to ensure our users have access to the latest technology – and they have no plans of stopping as we anticipate the release of Android O later this year!
Not a Nougat user? Have no fear – FlexiSPY supports all versions from Android 4.0.3 to 7.1.1.
Keylogger for Android
There’s More?! There is indeed! We’ve listened to your feedback regarding new features for FlexiSPY and have launched the Keylogger for Android – now available for all PREMIUM and EXTREME customers. For more information on this free addition to our growing list of Android-supported functions, click HERE.
Have an idea?
If there’s a feature that you think would enhance the FlexiSPY experience, let us know in the comments section below.
If you’re responsible for employees or children, you know how important it is to understand why they’re using certain apps. So today we’re excited to announce Application Screenshots, and a Keylogger. Two features that will help you get a complete snapshot of how an app is being used.
Let’s take a closer look at these two features.
Keylogger
Simply type any message on an application such as Facebook, and our Keylogger will pick up all the keystrokes and add them to a secure log file. Login to your portal and read through the captured logs and discover search terms and more. Besides the obvious use for keeping an eye on employees, or monitoring your children, there are many other uses. For example, you can install it on your own phone to save a complete backup of your typing history.
The applications screenshot feature lets you can remotely snap a photo of selected applications when they’re in use. These screenshots are then uploaded to your portal where you can view and download them. Use this to gather visual evidence and uncover employee espionage, or protect your children from abuse.
How To Get It
Both features are available to PREMIUM and EXTREME customers.
Stay in the know
We are adding continually adding features. To receive discounts, and product announcements please join our mailing list.