Preyproject- Find Stolen Laptop & Phone

Have you ever faced this situation means have you ever lost your personal digital assistants it could you your Iphone, Laptop and so on. It can be happen with any one and every where is the world, so the question is how to protect and how to get back your stolen Laptop and phone. There are different tools, software’s and services available that provides a feature to find your stolen laptop or phone.

during the London riots an IT security specialist has lost his MacBook Pro, it was stolen from his home, now what is the story behind it. Greg Martin is an IT security specialist and running a blog InfoSecurity 2.0 was the wrong person for this thief because Martin had installed a tracking software called PreyProject.

What Is PreyProject

According to the official website “Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It’s lightweight, open source software, and free for anyone to use. And it just works”.
Martin is now get back his MacBook but how the simple answer it that he was just start his preyproject and was tried to capture the images so that he could fine the name and the log in information of the thief.
As Martin wrote on his blog that after two hours the thief was log in on his Facebook so by using the facebook Martin was found the relevant information about the robber like his name, school name, IP address and address. Martin was got some picture of the robber from the MacBook camera and from his facebook profile page.
After getting a lot of different information about the robber Martin just had to pass the information on to London Metro police, so by the help of PreyProject and Facebook Martin got his MacBook.

Download PreyProject

So you can download the open source tool to protect your Laptop and phone, try to be smart like Martin.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...