
This is the last app anyone would suspect someone to use when cheating, private investigator reveals
However, according to a private investigator — there is one unexpected app that most people would never think to check if their loved one is being sneaky behind their back.
London-based private investigator Aaron Bond said if someone is suspicious of any naughty business going on in their relationship — check their supermarket loyalty apps, the ones that help shoppers save money and earn rewards.
Advertisement
What does a receipt for buying eggs and toilet paper have to do with infidelity?
'While most people think of text messaging and call logs as the obvious signs of cheating, there are often other signs that can uncover and paint a larger picture,' Bond told the Mirror.
Check your partner's supermarket loyalty apps, the ones that help shoppers save money and earn rewards, if you suspect any infidelity.
DC Studio – stock.adobe.com
Advertisement
He said a supermarket loyalty member app can reveal a lot.
'Clubcard data is limited, but it does tell you a date and location, which is easily accessible if you log into your account,' he told the outlet.
'If your partner claims they were working or out with friends but the account shows they made a purchase in a completely different area, then it's a clear red flag.'
This is just one of many tech red flags to be on the lookout for if you think the other person is cheating in your relationship.
Advertisement
If your significant other constantly conceals their phone — especially when notifications pop up, that's not a good sign.
It's not a good sign if your partner is sneaky with their phone.
simona – stock.adobe.com
'Notifications can also reveal cheaters, so it's common to switch them off or hide them if you're doing something you don't want your significant other to see,' radio show host, Kim Komando told the Daily Mail.
Clearing their search history on apps and closing tabs on Safari or Chrome are other big red flags for cheating.
Advertisement
'If they routinely access dating sites, secret email accounts or anything, they will probably think to cover their tracks,' Komando said.
A person's location history is another tell-tale sign that can reveal if they're being unfaithful.
Komando said to check this on your partner's phone — if you can — to see if there's one place in particular they frequent often.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
15 hours ago
- Yahoo
Heartbreaking photos of Casey-Louise, 13, with baby sister as mystery grows over final hours
Heartbreaking new photographs show a "caring" Casey-Louise Horrocks tenderly holding her baby sister, as the mystery surrounding her final hours deepens. Casey-Louise was found unresponsive in a flat in Huddersfield on August 11. She died in the early hours of the next morning. It is understood that she had been living in Liverpool under the care system. A 16-year-old boy has been arrested on suspicion of Casey-Louise's rape and murder. He has also been arrested on suspicion of raping another 16-year-old girl in a separate incident in Kirklees. He has since been released on bail. READ MORE: Teenager charged after Huddersfield Bus Station stabbing READ MORE: What happened when dozens of Yorkshire children 'saw seaside for first time' on special free trip The police are treating Casey-Louise's death as unexplained following a post-mortem examination. Yesterday, two new photographs of the schoolgirl were shared by her loved ones on a tribute site managed by the funeral directors. One image shows her lovingly cradling her baby sister, Mia, while in another she is seen standing next to a family friend, reports the Mirror. A heartfelt tribute from her 'best mate', Cole, read: "RIP Casey you'll be missed so much. Can't believe you left us so early, you're flying with the angels now, fly high, love you lots my thunder buddie in the sky." Her aunt, Dani, expressed her sorrow, saying she missed her "so much" and that she would remain "Forever 13". Paula Mills wrote: "Fly high with the angels beautiful girl. I hope there's an amazing afterlife waiting for you where all your hopes and dreams come true." Another person wrote: "You've left a massive hole in the lives of all who had the pleasure of knowing you. Sweet dreams Casey, you'll be sadly missed xx." Casey-Louise attended Mossley Hollins High School in Tameside, with a statement released this week paying tribute to her as "bright, full of character, always full of life, and never afraid to be herself. "She was funny, sweet, had a smile that could brighten anyone's day and will be deeply missed by our school community", the statement continued. Students will receive support when lessons resume in September. A GoFundMe appeal has been launched to assist her family and contribute towards funeral expenses. In their most recent statement, DCI Stacey Atkinson, from West Yorkshire Police's Homicide and Major Enquiry Team, said: "We are continuing to conduct a number of enquiries following the death of a 13-year-old girl following an incident at a flat on Sheepridge Road. "A post-mortem was not able to determine how she died and we continue to treat her death as unexplained at this time, pending more enquiries. "Those enquiries are complex and are likely to be lengthy as we work to fully understand the circumstances of the girl's death. Specially trained officers are supporting her family at this time." Get all the latest and breaking Huddersfield news straight to your inbox by signing up to our daily newsletter here.


Tom's Guide
17 hours ago
- Tom's Guide
Popular Chrome VPN extension caught secretly spying on users — uninstall it right now
A VPN is a common and recommended privacy tool when going online which is why many people download them as either apps for their computer or smartphone or as extensions for their browser of choice. However, not every VPN is trustworthy or even remains that way. Case in point, is a Chrome extension with 100,000 installs, a 3.8 star rating and even a verified badge. However, several recent updates have changed the status of the extension from safe to very suspicious. As reported by Cybernews, researchers at Koi Security recently put out a report detailing their findings on the extension complete with a timeline that showed how it has shifted to spying on its users instead of protecting their privacy. This was done by taking screenshots of their displays and sending this data back to remote servers. When a webpage is loading, the extension will grab a screenshot in the background and then send it back to a server with additional details like the URL, tab ID number and a unique user identifier. The report points out how screenshots can include sensitive and personal information like passwords, personal messages and banking details; sending these images to a third-party server is the exact opposite of what a privacy tool like a VPN is supposed to do for its users. Additionally, the extension now collects and transmits other sensitive information like IP geolocation, device information and sends it encoded in Base64, or via AES-256-GCM encryption with an RSA key which hides the data in transit. One of the features of the extension is 'Scan with AI Threat Detection' which is intended to upload screenshots and URLs when the user clicks a 'check URL' button, however, there is no indication to the user that the extension has been repeatedly grabbing screenshots in the background even when this feature is not being used. These suspicious features were added recently and went live on July 17 of this year, which was right before strict age verification rules went into effect in the U.K.; many people in that area would be searching for VPNs after the rules went into place as a workaround. VPN extensions need some permissions to operate on a user's system – usually proxy and storage permissions. However, required suspiciously more access including all URLs, tabs and scripting permissions. The researchers at Koi Security pointed out that this, in addition to the other issues the extension exhibited, opened the door to persistent surveillance of its users. A developer is not named in either the privacy policy or the Terms of Service on the website, and their explanations to the security researchers about their findings do not match. According to the researchers: 'The [developer] explained that the automatic screenshot capture is part of a Background Scanning feature, which should only trigger if a domain appears suspicious. In practice, we saw screenshots being captured on trusted services like Google Sheets and Google Photos, domains that cannot be considered suspicious' and the developer ceased communications when asked to provide proof of legitimacy. If you've installed this VPN extension, you should uninstall it and run a scan using one of the best antivirus software solutions. Likewise, you're going to want to check your browser extensions to ensure that it's removed and then check your screenshots folder as well. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.
Yahoo
17 hours ago
- Yahoo
New zero-day startup offers $20 million for tools that can hack any smartphone
A new United Arab Emirates-based startup is offering up to $20 million for hacking tools that could help governments break into any smartphone with a text message. Advanced Security Solutions launched this month and is now offering some of the highest prices, at least public ones, in the whole zero-day market. Zero-days are flaws in software that are unknown to the affected developer at the time of their discovery. These tools can be highly valuable for hackers, especially those working for law enforcement and intelligence agencies. Apart from the highest bounty of $20 million, which applies to any mobile operating system, the company also offers bounties for exploits in various software: $15 million for the same type of zero-days for Android devices and for iPhones; $10 million for Windows; $5 million for Chrome; $1 million for Apple's Safari and Microsoft Edge browsers, among others. It's unclear who is behind the company, and its customers. 'We empower government agencies, intelligence services, and law enforcement to operate with precision in the digital battlefield,' reads the company's website. 'We maintain continuous cooperation with over 25 governments and intelligence agencies worldwide. Our clients consistently return for new services, reflecting the trust and strategic value we provide in high-stakes operational contexts, including counterterrorism and narcotics control.' The website also says that while the company is new, 'it is staffed exclusively by professionals with over 20 years of operational experience in elite intelligence units and private military contractors.' Advanced Security Solutions did not respond to a series of questions, including who funds, owns, and runs the company, who the customers are, as well as whether the company has any self-imposed ethical, or legal restrictions on what governments to sell to. Do you have more information about Advanced Security Solutions, or other zero-day providers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop. A security researcher with experience in the world of zero-days told TechCrunch that the prices offered by Advanced Security Solutions are approximately in line with the current market. 'Normally these advertised prices are in the ball park,' the person told TechCrunch on the condition of anonymity to speak candidly about the zero-day industry. The person added that the $20 million bounty 'is low depending on how unscrupulous you are.' The researcher also warned that, personally, he wouldn't deal with a company that doesn't disclose who is behind it, such as in this case. 'I don't think you should sell bugs to anyone who's trying to hide who they are,' he said. The market for zero-days has expanded considerably in the last ten years, both in terms of the number of companies participating in it, as well as the prices offered. In 2015, Zerodium, a broker that much like Advanced Security Solutions also acquires zero-days from researchers and resells them to governments, was among the first-ever companies to publicize their price list. At the time, the company founded by veteran exploit broker Chaouki Bekrar offered up to $1 million for tools to hack iPhones. Then, three years later, came Crowdfense offering $3 million for the same type of zero-days. More recently, the prices of zero-days have skyrocketed, in part because there is higher demand and also because it's getting more difficult to hack modern devices and software, thanks to big tech companies improving their security. Last year, Crowdfense published its new price list, which offered up to $7 million for zero-days to break into iPhones, and $5 million for the same type of exploits for Android. Customers can also buy zero-days for specific apps, especially messaging apps like WhatsApp (up to $8 million), and Telegram (up to $4 million). For its part, Advanced Security Solutions says it offers $2 million for Telegram, Signal, and WhatsApp zero-days. Russian zero-day company Operation Zero was an outlier in the market, offering up to $20 million for the same type of exploits that Advanced Security Solutions is looking for. Operation Zero is in a unique position because it says it works only with the Russian government, and for many researchers in the U.S. and Europe, it's illegal to sell their hacking tools to Russia, which means Operation Zero may have a harder time finding what it looks for. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data