Market Overview

Gary Huestis, Director of Digital Forensics with E-Investigations, Interviewed as a Mobile Phone Security Expert


Gary Huestis, Director of Digital Forensics with E-Investigations, was interviewed recently by local news media as a mobile phone security expert about the latest mobile phone malware and provides tips on keeping mobile phones and other digital devices secure.

Houston, Texas (PRWEB) October 31, 2012

Gary Huestis, Director of Digital Forensics with E-Investigations was interviewed recently by local news media as a mobile phone security expert about the latest mobile phone malware. Malware, short for malicious software, is software used or created to disrupt digital operations, gather sensitive information, or gain access to private systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of hostile or intrusive software. When installed on an Android phone, malware can secretly take photos every few seconds without the owner ever noticing. The photos are sent off through the phone to a remote location. Then, using data from the smart phone's location and position sensors, those pictures can be assembled into a three-dimensional map of the phone's surroundings.

Thieves can combine this information with other data easily gathered from the internet, such as Facebook or LinkedIn, to access more sensitive information like bank accounts, credit card numbers, or even corporate network access (an employee's user name and password). Mobile phone spyware has been around about as long as mobile phones, so the gathering of sensitive information such as text messages, call logs, and GPS locations is not new. However, with the advancement of mobile phone technology like accelerometers, proximity and position sensors this new malware can provide the attacker with much more information about the user's environment.

"Almost like a 3D model," explained Gary Huestis in the interview, "to see where things were, or how things were laid out. To see pictures on the wall or documents on the screen. Bills with credit card numbers, things like that." Huestis went on to say that his number one tip "is to always maintain physical possession of your phone."

The most common mobile phone malware detection software has not caught up to these latest threats. To help protect digital devices, E-Investigations suggests the following:

  •     Keep your phone with you whenever possible. An unattended phone provides a hacker the opportunity to install malware.
    Create a secure password. Passwords prevent unauthorized access; however, do not use common consecutive numbers, letters or easily gathered information like family member birthdays.     Be careful about what Apps are installed. Try to only install Apps from a known source and a reputable developer. Be suspicious of Apps requesting permission to access functions of the phone that it shouldn't need.     Check regularly for operating system (OS) updates. The provider will often release patches or updates that should be installed when available. Check with the phone manufacturer or provider to verify that the phone has the latest updates.     Don't open suspicious attachments or links. Phones can be infected from emailed or multimedia messaging service (MMS) attachments or links just like a computer.


E-Investigations has the tools and experience to perform logical, physical, file system and password extraction of data from mobile devices. By the incorporating the latest hardware and software technologies, E-Investigations has one of the most thorough capabilities for mobile phone investigations in the industry – with the ability to image thousands of mobile phones, smartphones and portable GPS devices, and all major mobile OS: iOS, Android, BlackBerry, Nokia, Symbian, Windows Mobile and Palm.

E-Investigation's Computer Forensic Investigators follow the trail and decipher the information regardless of whether the evidence is digital, such as electronically stored information found on computers, mobile phones or other devices or if the investigation requires traditional private investigative services. E-Investigations' tools and techniques include surveillance, undercover work and detailed record searches. The final product helps our clients gain a deeper understanding of what has happened or what is occurring. The gained clarity and discovery of truth allows our clients to quickly respond and recover.

Gary Huestis is the Director of Digital Forensics at E-Investigations. Mr. Huestis is an EnCase certified examiner and a licensed private investigator.

About E-Investigations:

Call us toll-free at 877-305-4935

For the original version on PRWeb visit:

View Comments and Join the Discussion!