Most Innovative Company, South Africa, 2016, African Business Awards
Best Forensic Investigation Company, Africa, 2016, African Corporate Excellence Awards
Best in Security, Forensics & Investigations ā€“ 2016 ā€“ International Business Awards


The Widgetkit Map provides a simple solution for adding a map to your website. Various features let you customize the map, like changing colors and adding markers or directions.


  • Location selection with auto geocoding
  • Supports multiple map markers with text popups
  • Option to get the direction to the active marker
  • Supports custom map styles and colors
  • Uses the latest Google Maps API
  • Built with HTML5, CSS3, PHP 5.3+ and the latest jQuery version
  • Works with Joomla and WordPress

Direction Example

This map features all map controls, multiple markers and you can get the direction.


Color Scheme Example

Set or invert the hue, saturation, lightness and gamma of a map.

Spyware Discovery

Spyware Discovery

Know for certain if your phone is bugged

  • Know what spyware it is
  • Where it originates from

Finding spyware on a cellphone is not easy. Antivirus and traditional antispyware software is only partially effective and cannot detect most spyware in use today. The new generation of smart, persistent surveillance threats like Guardian are not only designed to be undetectable but can actively monitor their environment. They employ self-defense mechanisms to dynamically alter their signatures, disguise themselves as system files, and can even remove all traces of themselves if they detect a threat. To combat these smart threats, we’ve developed a smarter detection system.

As at [todayDate] we guarantee a 100% detection rate for spyware activated on or before [spywareDate].

Spyware Removal

Spyware Removal

Have peace of mind that all threats are gone

  • All spyware and surveillanceware removed
  • All persistent threats neutralized

Finding spyware might not be easy, but effectively removing spyware can be incredibly difficult. Advanced, persistent threats are able to detect traditional removal processes and can deploy effective self-defense and self-preservation mechanisms.

We do not rely solely on an automated removal removal system. An engineer will monitor over 1000 critical data points during the removal process to detect any potential cloaking or evasion efforts by detected spyware. Once the automated process has completed, the engineer will manually inspect the filesystem to remove any remaining modules, applications, artifacts or code. This process can take up to an hour to complete, but at the end you will have complete peace of mind that your calls, messages and activities are free from prying eyes and ears.

We guarantee a 100% removal rate for any spyware detected.

Spyware Investigation

Spyware Investigation

Gather reliable evidence relating to a spyware threat

  • Know exactly what was installed
  • How it came to be installed
  • When it was downloaded and installed
  • What it is capable of monitoring
  • What data could have been compromised
  • Where any compromised data has been sent

Spyware Investigation is not undertaken by a machine or application. It is performed by an experienced analyst. The analyst will examine every aspect of the spyware to answer as many questions as possible regarding the threat itself and any persons, events or activities that can be linked to that threat.

Spyware investigation produces vital evidence that can be used to confront, or take legal action against, a person suspected of involvement in the bugging of your phone. While it may not always be possible to know who physically installed spyware, other facts, such as where data is being sent to, or who purchased the spyware, may implicate a person.

Spyware Prevention

Spyware Prevention

Remain spyware free and enjoy total privacy

  • Detect malicious applications
  • Detect suspicious activity
  • Prevent unauthorized access to resources
  • Log access attempts and significant events

There is no good news. There is bad news and not-nearly-as-bad-news. The bad news is that there are no applications or technologies you can buy that will keep you 100% protected against spyware or monitoring activity. The almost good news is that there is a lot you can do that will make it virtually impossible for someone to monitor you.

We would provide you with applications that monitor your device and look out for suspicious, malicious or potentially problematic activities and behaviours. In addition an engineer will provide you with recommendations to secure your specific device. Included in these recommendations will be instructions on how to correct or set the native security settings, what to be on the lookout for and what activities to avoid. You will also be provided with more general information about spyware, its capabilities and the many methods used by hackers and spies to gain access to your device.

Remaining spyware-free will require action or a change in attitude and behaviour on your part. Relying solely on software to keep you safe is not wise at all.

Minimal Example

This map has a fixed width, no controls and no markers.

Critical Listening

Critical Listening

The audio enhancement process will begin with critical listening. An audio forensic expert will listen to the recording a number of times, carefully noting areas of interest or concern, issues related to audiblity or legitibility, any anomalies, and other facts of significance to the enhancement process.


Clipping or clicking issues can usually be fixed using signal processing or more accurately, using the processing capability of forensic audio software. Noise reduction processing can often remove background noises or at least render them consistent throughout the recording. A variety of filters can be applied to enhance the recording, bringing out specific aspects or events contained in that recording.
Spectrum Analysis

Spectrum Analysis

Noise and other interference can be analyzed by a spectrum analyzer and the corresponding frequencies reduced so that these noises are less noticeable. Similarly, sound of interest can be isolated and amplified so that it is more easily heard.


Highly precise equalizers can be used to boost or cut specific bands of frequencies. To help make speech more intelligible, the frequency band containing most speech content, 200Hzā€“5000Hz, can be amplified or isolated.


Faint sounds in the recording can be boosted by compressing or leveling the signal so that the dynamic range of the material is reduced, making soft sounds more apparent. Compressors as well as gain plugins can help raise the overall level of the recording. Compression will also help balance all of the signals in the recording.

How To Use

With the Widgetkit Map you can quickly create and manage simple maps with features like multiple markers, text popups and custom color schemes. Once you have created a map, you can load it anywhere on your website using shortcodes or the universal Widgetkit Joomla module or WordPress widget.