How to find "stalkerware" on your devices

Fighting stalkerware is difficult. You cannot suspect that he is there. Even if you have, it can be difficult to detect because antivir...

Fighting stalkerware is difficult. You cannot suspect that he is there. Even if you have, it can be difficult to detect because antivirus software has only recently started to report these apps as malicious.

Here’s a guide on how stalkerware works, what to watch out for, and what to do about it.

Surveillance software has proliferated on computers for decades, but more recently spyware makers have focused on mobile devices. Because mobile devices have access to more intimate data, including photos, real-time location, phone conversations, and messages, apps have come to be known as stalkerware.

Various stalkerware applications collect different types of information. Some record phone calls, some record keystrokes, and others track location or upload photos of a person to a remote server. But they all generally work the same: an abusive lover with access to a victim’s device installs the app on the phone and disguises the software as ordinary software, like a calendar app.

From there, the app hides in the background and later the attacker recovers the data. Sometimes the information is sent to the abuser’s email address or can be downloaded from a website. In other scenarios, attackers who know their romantic partner’s password can simply unlock the device to open the stalkerware and examine the saved data.

So what to do? The Coalition Against Stalkerware, which was founded by Ms. Galperin and other groups, and many security companies have offered these tips:

  • Check for unusual behavior on your device, like a battery that drains quickly. This could be a sign that a stalker app is constantly running in the background.

  • Scan your device. Some applications, such as MalwareBytes, Certo, NortonLifeLock, and Lookout, can detect stalkerware. But to be thorough, take a close look at your apps to see if anything is unusual or suspicious. If you find stalkerware, take a break before removing it: this can be useful evidence if you decide to report the abuse to law enforcement.

  • Ask for help. In addition to reporting harassing behavior to law enforcement, you can seek advice from Resources as the National helpline on domestic violence or the Safety net project hosted by the National Network to End Domestic Violence.

  • Audit your accounts online to see which apps and devices are connected to it. On Twitter, for example, you can click the “Account Security & Access” button in the settings menu to see which devices and apps have access to your account. Disconnect from anything that seems fishy.

  • Change your passwords and passwords. It is always safer to change passwords for important online accounts and avoid reusing passwords across multiple sites. Try to create long and complex passwords for each account. Likewise, make sure your password is difficult to guess.

  • Enable two-factor authentication. For any online account that offers it, use two-factor authentication, which essentially requires two forms of verifying your identity before allowing you to sign in to an account. Let’s say you enter your username and password for your Facebook account. This is step 1. Facebook then asks you to enter a temporary code generated by an authenticator application. This is step 2. With this protection, even if an attacker discovers your password using stalkerware, he still cannot connect without this code.

  • On iPhones, check your settings. A new stalker app, WebWatcher, uses a computer to wirelessly download a backup copy iPhone data from a victim, according to Certo, a mobile security company. To defend yourself, open the Settings app and look at the General menu to see if “iTunes Wi-Fi Sync” is enabled. Disabling will prevent WebWatcher from copying your data.

    Apple said this was not considered an iPhone vulnerability because it required an attacker to be on the same Wi-Fi network and have physical access to a victim’s unlocked iPhone.

  • New start. Buying a new phone or wiping all the data on your phone and starting over is the most effective way to rid a device of stalkerware.

  • Update your software. Apple and Google regularly release software updates that include security fixes, which can remove stalkerware. Make sure you are using the latest software.

Ultimately, there’s no real way to beat stalkerware. NortonLifeLock senior researcher Kevin Roundy said he reported more than 800 stalkerware items in the Android app store. Google removed the apps and updated its policy in October to prohibit developers from offering stalkerware.

But others have appeared to take their place.

“There are certainly a lot of very dangerous and alarming possibilities,” Roundy said. “This is going to continue to be a concern.”

Source Link



Africa,893,Americas,4274,Art & Culture,15649,Arts,6700,Arts & Design,1824,Asia,3495,Automobile,508,Baseball,751,Basketball,591,Books,4110,Business,5570,Celebrity,2633,Cricket,648,Crime,158,Cryptocurrency,1896,Dance,632,Defense,836,Diplomatic Relations,2496,Economy,1277,Editorial,260,Education,1399,Elections,308,Energy & Environment,3119,Entertainment,23318,Environment,3836,Europe,4434,Faith & Religion,235,Family & Life,817,Fashion & Style,3519,Finance,21025,Food & Drink,3992,Football,1194,Games,97,Gossip,10289,Health & Fitness,4340,Health Care,954,Hockey,242,Home & Garden,920,Humour,994,Latin America,49,Lifestyle,18000,Media,527,Middle East,1657,Movies,1931,Music,2856,Opinion,3651,Other,12666,Other Sports,5309,Political News,11324,Political Protests,2324,Politics,18337,Real Estate,2119,Relationship,106,Retail,3116,Science,2842,Science & Tech,10735,Soccer,319,Space & Cosmos,394,Sports,12963,Technology,3663,Tennis,664,Theater,1853,Transportation,313,Travel,2735,TV,3890,US,1137,US Sports,1481,Video News,3531,War & Conflict,1069,Weird News,998,World,17544,
Newsrust - US Top News: How to find "stalkerware" on your devices
How to find "stalkerware" on your devices
Newsrust - US Top News
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content