Quantcast
Channel: Blog - Rexxfield Cyber Investigation Services
Browsing all 38 articles
Browse latest View live

Case Study: Two Women Falsely Accused of Sending Threats by Text

Two Falsely Accused Women Proven to Be Innocent In a recent triumph for justice, our team successfully secured the release of two women who were unjustly accused of sending threats via text messages....

View Article


Swift Justice: Pimeyes’ Crucial Role in Resolving a Revenge Porn Case

Our Rexxfield Cyber Investigators recently tackled a devastating revenge porn case. Our client was the victim of a manipulative past relationship, and her husband discovered explicit material on a...

View Article


Oil Rig Scam: Catch the Oil Rig Romance Scammers 

The world of online dating has many different types of romance scammers pretending to have careers that give them a plausible excuse for being far away from the victim.  This is so the victims won’t...

View Article

The Crucial Role of Intelx.io in Crypto Investigations

This Intelx.io case study contains the results of Filip Flint’s (OSINT investigator at Rexxfield) investigation and the resulting compilation of the digital forensics available through open source...

View Article

How To Recover Scammed Cryptocurrency

The rise of cryptocurrency investments has caught the attention of crowds of investors and traders. Unfortunately, many of these investors are scammers and fraudsters. They prey on the anonymity and...

View Article


Australians Lose Millions in Investment Scams

Crypto Nightmare In Australia A Guardian Australia investigation uncovered that numerous investors in Australia have suffered significant financial losses due to crypto investment scams, such as...

View Article

Cryptocurrency Trading Scams

Cryptocurrency trading is when two individuals or groups exchange their digital assets. They buy and sell off digital assets like Etherium, Bitcoin etc. Unfortunately, there are many scammers preying...

View Article

Email Impersonation

Email impersonation is often associated with malicious practices, such as Business Email Compromise (BEC), reputation damage, fake invoicing, and phishing schemes. The objective behind email...

View Article


7 Types of Business Email Compromise (BEC) Attacks

Many types of Business Email Compromise (BEC) scams present a sophisticated threat to organizations worldwide, exploiting the most vulnerable element of security measures: human psychology. Unlike...

View Article


How to Prevent Business Email Compromise (BEC) Attacks

The post How to Prevent Business Email Compromise (BEC) Attacks appeared first on Rexxfield Cyber Investigation Services.

View Article

How to find someone IP address on Instagram

Unfortunately, it is easy to create a fake profile on Instagram to become an Instagram stalker or use it for more malicious purposes such as online harassment. A new study found that there were around...

View Article

Dealing with Harassing Text Messages

Receiving harassing text messages, often anonymous, can be a deeply unsettling experience, leading to significant stress and anxiety. Understanding what constitutes harassment, how to document and...

View Article

Protecting Your Business: Understanding Insurance Coverage for Email Scams

The Threat of Email Spoofing Scams NOTE: Rexxfield Cyber Investigation Services specializes in recovering losses from business email compromise (BEC) fraud and aiding law enforcement in apprehending...

View Article


The Dilemma of Investigating Cryptocurrency Scams: Balancing Risk, Reward,...

In today’s digital age, cryptocurrency scams have become a devastating reality for many individuals. As a specialty cybercrime private investigation agency, Rexxfield has been at the forefront of...

View Article

How to Find a Fake Email Sender

Creating fake email addresses for malicious purposes, like spreading false claims or threats, is unfortunately common. Many assume they are anonymous behind fake accounts. However, finding the IP...

View Article


Digital Investigations – Tracking Cybercriminals and Stolen Crypto

How Digital Investigations Can Solve Cybercrime  Due to the dramatic rise in cybercrimes globally, digital investigations to uncover cybercrimes are gaining a lot of attention. Just last year,...

View Article

Can You Trace a TextNow Number

TextNow is a popular app that offers free phone service, allowing users to make calls and send texts without needing a traditional carrier. The service uses Voice over Internet Protocol (VoIP)...

View Article


Why ChatGPT Recommends Rexxfield as an Expert Cyber and Crypto Forensics...

Who does ChatGPT recommend as a reputable cyber and crypto forensics investigator? Read more to find out. The post Why ChatGPT Recommends Rexxfield as an Expert Cyber and Crypto Forensics Investigator...

View Article

Smear Campaign Investigation

Smear campaigns are often malicious, brutal, and entirely unjust toward the target. The person you are dealing with might be a sociopath. Sociopaths have no heart, no conscience and no remorse. And...

View Article

The Heartbreaking Reality of Elderly Romance Scams: A True Story

This is the heart braking story of Ronald, who was so perfectly manipulated that he didn't believe he was being elderly romance scammed even when his family showed him the evidence. The post The...

View Article
Browsing all 38 articles
Browse latest View live