Retina-X Studios

Last updated
Retina-X Studios, LLC.
Company type Limited liability company
IndustrySoftware
Founded1997;27 years ago (1997)
Headquarters Jacksonville, Florida, United States [1]
ProductsMonitoring software for computer and mobile devices
Website retinax.com

Retina-X Studios is a software manufacturer company that develops computer and cell phone monitoring applications, [2] focused on computers, smartphones, tablets and networks. [3] The company is founded in 1997 and it is based in Jacksonville, Florida, United States. [1]

Contents

History

The company was founded in July 1997 primarily as a web consulting and design company. In 2003, after a period of developing monitoring products for outside companies, the company began creating monitoring software products using its own brand name. The first software product, named AceSpy, was released on April 28, 2003. [4]

In May 2007, the company developed and released monitoring software for mobile phones, named Mobile-Spy, particularly for Windows Mobile.

Usage

Target audiences for Retina-X Studios are parents and employers.[ citation needed ]

Parents and employers use legal monitoring software to check their teens' and staff's internet use. [5] [6] [7] Company markets its products as spy applications as parents can review child's messages and call details without the child's knowledge. [8] Ethical issues can arise if employees are not made aware of monitoring tools, if personal emails are intentionally accessed and if managers are involved directly in evaluating the contents of logging activities as they can be/become biased towards the person whose email is being reviewed. [9]

Illegal

Using cell phones for spying has also increased due to multiplication of smart phones and compromising one's information is very possible with spy apps. People can stalk each other easily with company software. [10] [11] All they need is a onetime access to the gadget and then such software would run invisibly. [12] The wrong use of the software should not be overlooked. [13] The hackers can access the online information that is parsed to the customer's account and this can lead to privacy issues. [14]

See also

Related Research Articles

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems.

<span class="mw-page-title-main">Parental controls</span> Software feature allowing content filtering

Parental controls are features which may be included in digital television services, computers and video games, mobile devices and software that allow parents to restrict the access of content to their children. These controls were created to assist parents in their ability to restrict certain content viewable by their children. This may be content they deem inappropriate for their age, maturity level or feel is aimed more at an adult audience. Parental controls fall into roughly four categories: content filters, which limit access to age inappropriate content; usage controls, which constrain the usage of these devices such as placing time-limits on usage or forbidding certain types of usage; computer usage management tools, which enforces the use of certain software; and monitoring, which can track location and activity when using the devices.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

Employee monitoring software, also known as bossware or tattleware, is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location. It is normally deployed over a business network and allows for easy centralized log viewing via one central networked PC. Sometimes, companies opt to monitor their employees using remote desktop software instead.

Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.

<span class="mw-page-title-main">Ovi (Nokia)</span> Former Internet services by Nokia

Ovi by Nokia was the brand for Nokia's Internet services. The Ovi services could be used from a mobile device, computer or via the web. Nokia focused on five key service areas: Games, Maps, Media, Messaging and Music. Nokia's aim with Ovi was to include third party developers, such as operators and third-party services like Yahoo's Flickr photo site. With the announcement of Ovi Maps Player API, Nokia started to evolve their services into a platform, enabling third parties to make use of Nokia's Ovi services.

Employee monitoring is the surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. This practice may impact employee satisfaction due to its impact on the employee's privacy. Among organizations, the extent and methods of employee monitoring differ.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on desktop computers, and web applications which run in mobile web browsers rather than directly on the mobile device.

Microsoft mobile services are a set of proprietary mobile services created specifically for mobile devices; they are typically offered through mobile applications and mobile browser for Windows Phone platforms, BREW, and Java. Microsoft's mobile services are typically connected with a Microsoft account and often come preinstalled on Microsoft's own mobile operating systems while they are offered via various means for other platforms. Microsoft started to develop for mobile computing platforms with the launch of Windows CE in 1996 and later added Microsoft's Pocket Office suite to their Handheld PC line of PDAs in April 2000. From December 2014 to June 2015, Microsoft made a number of corporate acquisitions, buying several of the top applications listed in Google Play and the App Store including Acompli, Sunrise Calendar, Datazen, Wunderlist, Echo Notification Lockscreen, and MileIQ.

<span class="mw-page-title-main">Universal Windows Platform apps</span> Applications usable across all compatible Microsoft Windows devices

Universal Windows Platform (UWP) apps are applications that can be used across all compatible Microsoft Windows devices. They are primarily purchased and downloaded via the Microsoft Store, Microsoft's digital application storefront.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

<span class="mw-page-title-main">WebWatcher</span> Surveillance software

WebWatcher is a proprietary computer and mobile device monitoring software developed by Awareness Technologies. WebWatcher is compatible with iOS, Android, Windows, ChromeOS and macOS operating systems. WebWatcher Mobile records text messages, call logs, web history, photos, and GPS. WebWatcher for PC and Mac features include email & Instant Message monitoring, keystroke logging, web content filtering and monitoring, and screenshot monitoring. Critics have referred to WebWatcher and other similar pieces of software as "stalkerware".

mSpy Computer monitoring software

mSpy is a brand of mobile and computer parental control monitoring software for iOS, Android, Windows, and macOS. The app allows users to monitor and log activity on the client device.

<span class="mw-page-title-main">KidGuard</span> Computer surveillance

KidGuard is a parental monitoring application for iOS and Android mobile phones. The application uses proprietary software to help parents monitor their children’s text messages, browser history, social media activity, stored videos or photos, emails, and phone GPS location.

Stalkerware is monitoring software or spyware that is used for cyberstalking. The term was coined when people started to widely use commercial spyware to spy on their spouses or intimate partners. Stalkerware has been criticized because of its use by abusers, stalkers, and employers.

<span class="mw-page-title-main">Certo Software</span> Cybersecurity technology company

Certo Software Ltd is a British multinational cybersecurity technology company headquartered in Basingstoke, England. The company specializes in consumer mobile security and privacy solutions.

References

  1. 1 2 "Retina-X Studios LLC". local.com.
  2. "Retina-X Studios" . Retrieved 25 September 2013.
  3. Taylor, Jordyn (6 August 2014). "Study: Most Sexting Occurs On Tuesdays Between 10 a.m. and Noon". BetaBeat. Retrieved 11 September 2014.
  4. Coleman, Matt (11 February 2011). "Software developer offers cross-platform cell phone program". Jacksonville Business Journal. Retrieved 30 July 2014.
  5. Marshall, Patrick. "Spyware goes mobile". Government Computer News. Retrieved May 4, 2007.
  6. Dahlquist, David. "lets you keep a close eye on remote Macs". Macworld. Retrieved Aug 11, 2010.
  7. "Now you can spy on iPhone users too". Los Angeles Times. Retrieved December 15, 2008.
  8. Slattery, Brennon. "iPhone is Now the SpyPhone". PCWorld. Retrieved Dec 18, 2008.
  9. Barnett, Cynthia. "0 Share Email Print NORTHEAST Technology - Peeping Tech". Florida Trend. Retrieved 1 February 2011.
  10. Farrar, Lara. "Calling all spies: Has cell phone spy tech got your number?". CNN.
  11. Scheck, Justin (August 3, 2010). "Stalkers Exploit Cellphone GPS". Wall Street Journal.
  12. Wade, Alana (28 July 2021). "Phone Tracker Apps". Cheating Catcher.
  13. "Report says U.S. needs new approach for security". Department of Information Technology. Archived from the original on 2013-12-22.
  14. Liebowitz, Matt. "'Mobile Spy' App May Be Open To Hijacking Attacks". Tech News Daily. Retrieved 16 May 2012.