WE'VE GOT YOU COVERED!

The Prey Blog
Straight from our labs

Tip: Enabling a guest account on Windows & Mac OS X

by Patricia Laurié May 29, 2013

We're going to show you how to enable guest accounts on Windows and Mac OS X so that you can protect your devices from identity theft, or from it just getting stolen.

If your laptop is ever stolen, there's a very high chance the guy will turn it on and try to use it, either to see if there's anything of interest to him, or maybe just to surf the good 'ol internets for a while -- which is when Prey is meant to kick in.

But what happens if your computer is password protected and he's unable to?

Even though Prey works even if no user is logged in, it's hard to imagine someone staring at the login box for more than a minute, after trying the usual "123456" and "password" combinations.

In other words, chances of recovery are drastically reduced when there's no way for these guys to use your computer, at least for a while.

That's why creating a dummy guest account is so important for Prey to work its magic. Guest accounts have been woefully overlooked as merely an account for guests, but as you see, having one is a pretty good idea, just as protecting your documents with an account password.

Plus, if someone logs into a guest account in your lappy, he or she won't be able to mess with your stuff or remove applications, because guest accounts are unprivileged and restricted to a tiny sandbox.

Here's how to achieve it.

Read More

Prey Labs: How to avoid buying a stolen laptop

by Patricia Laurié April 18, 2013

According to our database, about 20% of Prey's recovered devices were found in the hands of people who had bought them online. The most frequent sites used for these activities turned out to be EBay and Craigslist. It is important to emphasize that none of these sites condone the trading of stolen devices, and because of this reason, they have implemented their own rules and regulations to put an end to the commercialization of misappropriated electronics. Nevertheless, thieves still manage to bypass them, leaving users at their mercy.

We don't want you to become one of the victims and we are sure you don't want that either. So, we have gathered an assortment of advice for you to take into account when buying used devices from online classifieds.


Read More

Prey Labs: How to protect your laptop while using a Wi-Fi hotspot

by Patricia Laurié April 10, 2013

According to Jiwire, there are around 823,314 free and paid Wifi hotspots in the world. There are 135,758 in the United States alone, meaning there's a pretty good chance you have used at least one of these hotspots at a hotel, the subway station, the nearest Starbucks or even the bus, yet, not many people are aware of the vulnerabilities they expose themselves to while using these hotspots, which include stolen social network, banking and e-mail information to name but a few.

But, don't panic.

The Prey Team is here to help you with your device's safety and so we present you 7 tips to take into account when using Wi-Fi hotspots.

Read More

Tip: Stop Prey from being deleted in iOS

by Patricia Laurié April 4, 2013

As most iOS users know, it is extremely easy to uninstall apps in your iDevice. Just press an app icon long enough until it starts to shake uncontrollably and a little x will appear on the corner. Press it and the app is gone as quick as a bunny. But, have you ever asked yourself if there was a way to make uninstalling your favorite anti-theft software, a.k.a. Prey, less easy in iOS? Well, we have and we found a way. It is very easy and I will show how.

Read More

Tip: How to protect your mobile phone from street theft

by Patricia Laurié March 25, 2013

Cellphone theft has been rising quite considerably. So much so that the chances of getting your device snatched is becoming a scarily common occurrence. In London, 314 phones are stolen everyday, which is 70% of all the personals taken. In San Francisco,  40% of all the robberies in 2012 were of cellphones. This is no wonder when we take into account that carrying a smartphone, the majority of phones stolen, is akin to carrying $300+ in one tiny piece of equipment and that there is plenty of black market for such products in the world.

So, here are some pointers to protect yourself and your phone from criminals (gathered personally by the security gnomes from Prey Labs):

Read More

Prey Labs: These are places your stolen laptop will most likely end up at

by Patricia Laurié March 15, 2013

Nobody is off limits when it comes to laptop theft. We use these portable devices for a myriad of things: to take notes at school (or randomly browse the internet at a boring lecture), for work, to store our important files, music, memories, and more. Sadly, no matter how much time or money we invest securing them, the chances of your laptop getting stolen are there, and according to your lifestyle, they can vary quite significantly.

Read More