Investigation Tutorials

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS. You cannot...

How to Investigate Cash App & Venmo Accounts (Financial OSINT)

You are trying to buy concert tickets or a piece of furniture on Facebook Marketplace. The seller seems friendly, but when it is time...

How to Find Hidden Data in PDFs & Word Docs (Free Document OSINT)

You just received an email with a PDF attached. It looks like an official invoice from "PayPal" or "Geek Squad" saying you owe $499....

Does Instagram Notify When You Screenshot? (The 2026 Update)

We have all been there.You are deep-diving on Instagram-maybe checking out an ex, a competitor, or investigating a potential scammer. You see something interesting....

How to Spot AI-Generated Images (Deepfake Detection Guide)

You scroll through X (Twitter) and see a photo of a politician getting arrested. Or maybe a celebrity endorsing a crypto scam. It looks...

How to Spot a Fake Social Media Profile (The Bot & Catfish Checklist)

You get a friend request from a stranger. They are attractive, successful, and seem interested in you. Or maybe you see a political account posting...

How to Find the Location of a Photo (Exif Data Guide)

You take a photo of your new car parked in your driveway and upload it to a forum or send it to a buyer.You...

How to Find Anyone’s Social Media Accounts by Username

You just matched with someone on a dating app. Their profile says their name is "Mike," but their username is MikeRuns2024.Or maybe you are...

Don't miss

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...

Stop Reusing Passwords: How Credential Stuffing Actually Works

When the average person pictures a cyberattack, they imagine...