spyware - Blog - Global Risk Community2024-03-29T13:42:16Zhttps://globalriskcommunity.com/profiles/blogs/feed/tag/spywareApps for Stalkers Disguised as Parental Control Toolshttps://globalriskcommunity.com/profiles/blogs/apps-for-stalkers-disguised-as-parental-control-tools2019-08-01T15:18:35.000Z2019-08-01T15:18:35.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Sell something called “SuperParent” or even the actual FlexiSpy — and all is swell. Frankly, I’m not opposed to monitoring a child’s phone, kids shouldn’t have phones anyways.</p><p><img src="https://activerain.com/image_store/uploads/agents/robertsiciliano/files/012.jpeg" alt="" width="300" height="200" align="right" /></p><p>But sell something called “iStalk” or “StalkU,” well … this won’t quite go over well with the authorities or the general community.</p><p>It’s all in a name (pardon the cliché).</p><p>Apps that track users contain Spyware. A wannabe stalker can secretly install such an app on their intended victim’s phone via any of the following:</p><ul><li>Manual access to the phone</li><li>Link to a Twitter share</li><li>Share for LinkedIn or Whatsapp</li><li>Text a link posing as security update</li></ul><p>Sending a “malicious” link works when its clicked. However the stalker will usually need to have access to the victim’s phone to install the tracking software. With the way people leave their phones lying around, this is fairly easy to do – to users who don’t have a password set up for their device or share their password with their “stalker”.</p><p>What can some “stalking apps” track?</p><ul><li>Call logs</li><li>Contents of text and chat messages</li><li>Location of phone (and hence, victim if the phone is with them)</li><li>Listening in to ambient sounds picked up by the phones microphone</li><li>Listening in to phone calls</li><li>Access to voicemail</li></ul><p>According to a 2014 study by the National Network to End Domestic Violence, 54% of domestic abusers use tracking software, for which its icon can be visibly concealed from the victim.</p><p>Though availability of tracking apps has become more limited over time, due to the revelations of how these have been abused, they are still available, such as mSpy, which can be easily downloaded to Android devices.</p><p>Downloading stalkware to iPhones is more challenging, but far from impossible. In fact, one technique doesn’t even require physical access to the target’s phone. And even then…this can be breached by a techy stalker.</p><p><strong>How do app makers cover their butts?</strong></p><p>They include language with their apps, such as citing that consent of the target is required before installation, or that the app company will cooperate with law enforcement should a complaint be reported.</p><p>Stalkware isn’t going away anytime soon. Thus, the emphasis needs to be on prevention.</p><p><strong>How to Prevent Remote Stalking</strong></p><ul><li>Heavens, please don’t let your new boyfriend/girlfriend talk you out of having a password with some kind of nonsense like, “If you trusted me you wouldn’t need a password.”</li><li>Never share passwords.</li><li>Tell him or her – on the first date – that your phone is off-limits to them. If they give you flack, it’s over. Only a control freak would mind this.</li><li>If they keep cool, this could be an act to gain your trust. Never leave your phone alone with that special someone.</li><li>Keep your phone turned off unless you’re using it.</li><li>Disable the GPS feature.</li><li>Never leave your phone unsupervised in the presence of other people, even your new boyfriend’s great-grandmother.</li></ul><p><a style="color:#f30e0e;" href="https://safr.me/meet-robert/" target="_blank">Robert Siciliano</a> personal security and <a style="color:#f30e0e;" href="https://safr.me/blog/2018/03/16/identity-theft-advice/" target="_blank">identity theft expert</a> and speaker is the author of <a style="color:#f30e0e;" href="https://www.amazon.com/Identity-Theft-Privacy-Protection-Prevention-ebook/dp/B07FT67BMC/ref=sr_1_3?s=digital-text&ie=UTF8&qid=1535732363&sr=1-3&keywords=Robert+Siciliano&dpID=51hWnD29JtL&preST=_SY445_QL70_&dpSrc=srch" target="_blank">Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud</a>. See him knock’em dead in this <a style="color:#f30e0e;" href="https://youtu.be/2m3Ra6ROPeA" target="_blank">Security Awareness Training</a> video.</p></div>Does Your Mobile Have Spyware on It?https://globalriskcommunity.com/profiles/blogs/does-your-mobile-have-spyware-on-it2018-10-19T12:19:36.000Z2018-10-19T12:19:36.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:</p><p><img src="https://activerain.com/image_store/uploads/agents/robertsiciliano/files/Social-Media-Security.jpg" alt="" width="300" height="219" align="right" /></p><p><strong>Unusual Background Noise</strong></p><p>While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear them when your phone is not in use.</p><p><strong>Short Battery Life</strong></p><p>Also common, another sign of a hacked phone is a short battery life. If you notice that your battery is suddenly losing power, it’s possible that there is malicious software running in the background. But don’t panic….yet.</p><p><strong>Try Shutting it Down</strong></p><p>If something seems weird with your mobile phone, try shutting it down. Watch how it reacts when you shut it down. Phones that have been hacked often won’t shut down correctly or never shut down, even though you tell it to. Still, a common issues with mobiles.</p><p><strong>Look for Suspicious Activity</strong></p><p>If you notice something suspicious, like your phone turning on or off by itself or apps getting installed or deleted, someone might have hacked it. Other suspicious signs that someone has hacked your phone include strange text messages that contain random letters or numbers. You might see pop-up ads or other issues, too.</p><p><strong>Check for any Electronic Interferences</strong></p><p>Though it might not be uncommon to get interference from other electronics, such as a computer, another phone, or even a television, it shouldn’t happen if you are not on a call. If it does, it could be a sign of something malicious, for instance, someone listening in on your phone calls.</p><p><strong>Look at Your Phone Bill</strong></p><p>If your phone bill shows more text or data usage than you typically use, it might be a sign that your mobile phone is hacked. Things like spyware can cause your data to rise, and this could definitely cause your bill to rise. However, keep in mind, if you just downloaded a new app, this could be the cause of your data usage. Also, make sure that no one in your home is using the data, such as your kids, who are notorious for this.</p><p><strong>Use Caution when Downloading New Apps</strong></p><p>Finally, when you download a new app, make sure they are safe. Most apps from the App Store or Google Play are safe, but occasionally, a malicious app will sneak in. If an app asks for access to your contact list, call history, or address book, use caution.</p><p>If you ever suspect spyware, back up your apps and reset the device back to factory then reinstall everything. Keep in mind, unless an iPhone is “jailbroken” spyware is unlikely. But with Androids, spyware is serious. Install antivirus on Androids.</p><p><a style="color:#f30e0e;" href="https://safr.me/meet-robert/" target="_blank">Robert Siciliano</a> personal security and <a style="color:#f30e0e;" href="https://safr.me/blog/2018/03/16/identity-theft-advice/" target="_blank">identity theft expert</a> and speaker is the author of <a style="color:#f30e0e;" href="https://www.amazon.com/Identity-Theft-Privacy-Protection-Prevention-ebook/dp/B07FT67BMC/ref=sr_1_3?s=digital-text&ie=UTF8&qid=1535732363&sr=1-3&keywords=Robert+Siciliano&dpID=51hWnD29JtL&preST=_SY445_QL70_&dpSrc=srch" target="_blank">Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud</a>. See him knock’em dead in this <a style="color:#f30e0e;" href="https://youtu.be/2m3Ra6ROPeA" target="_blank">Security Awareness Training</a> video.</p></div>Should Stalking or Spying Apps be banned?https://globalriskcommunity.com/profiles/blogs/should-stalking-or-spying-apps-be-banned2015-12-20T14:17:04.000Z2015-12-20T14:17:04.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents with dementia?</p><p><img src="http://activerain.com/image_store/uploads/agents/robertsiciliano/files/7W.jpg" alt="" align="right" height="210" width="345" /></p><p>If you fear that apps for “spying” might get banned, here’s bad news: U.S. Senator Al Franken is pushing for this.</p><p>However, Franken’s proposed law will actually permit these constructive uses. His plan is to require companies to give permission to users before collecting location data or conducting any sharing of it. But suppose a real stalker poses as a concerned parent, how would the company know?</p><p>And when spying and stalking apps are used malevolently, should their makers bear responsibility? Is this like saying that the company that makes steak knives is responsible for the man who used one to stab his ex-friend?</p><p>However, maybe that all depends on whom the stalking and spying app company targets for customers. A now defunct maker of stalking apps targeted people who wanted to stalk their spouses, and its CEO was indicted last year and fined half a mil.</p><p>Another such maker, markets their product for good uses like keeping tabs on kids: a smarter move. Their site even calls their software “monitoring” rather than “stalking” or “spying.”</p><p>With that all said, it’s illegal to spy on someone with these apps without their permission. The line is very blurry, because it’s not illegal for a manager at the workplace to follow a subordinate and watch his every move, including what he’s doing on his computer during work hours.</p><p>Banning these kinds of apps will not go over well with the many parents who see them as a godsend for keeping a watchful eye on their kids, not to mention the many middle-agers who, without these apps, would fear that their elderly parents with dementia might wander off and get lost or in harm’s way.</p><p>Robert Siciliano is an identity theft expert to <a href="http://bestidtheftcompanys.com/companies">BestIDTheftCompanys.com</a> discussing <a href="http://www.youtube.com/watch?v=p_ikx0_erfU">identity theft prevention</a>.</p></div>What is a Virus?https://globalriskcommunity.com/profiles/blogs/what-is-a-virus2015-04-20T13:48:03.000Z2015-04-20T13:48:03.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through the air when an infected person coughs or sneezes. It’s not a very fun illness to have.</p><p><img src="http://activerain.trulia.com/image_store/uploads/agents/robertsiciliano/files/6D.jpg" alt="" align="right" height="340" width="331" /></p><p>Viruses don’t just affect humans; there are viruses that can affect your tech devices. A tech virus is a malicious program file that can also replicate itself and infect other devices through techniques like malicious links and sketchy downloads. But unlike the chicken pox where the virus eventually appears on your skin, a virus could be wreaking havoc on your device and you might not even know it!</p><p>Computer and mobile viruses can take many different form factors, but all are usually intended to do harm to your device, steal your personal info or money or both. Some examples of viruses include a <a href="http://blogs.mcafee.com/consumer/trojan-horse">Trojan Horse</a>, which masquerades as something neutral or benevolent, but is programmed to infect the hard drive or even crash it. <a href="https://blogs.mcafee.com/consumer/family-safety/spyware-a-major-identity-theft-threat">Spyware</a> is a virus that observes your activities like logging into your bank account, collects this data (e.g., password, answer to secret question, username) and sends it to the hacker. And a <a href="https://blogs.mcafee.com/consumer/what-is-worm">worm</a>, like other viruses, can corrupt files, steal sensitive information, or modify system settings to make your machine more vulnerable, but it’s different in that it can replicate and send copies of itself to other computers in a network without any human interaction.</p><p>There are several clues that could mean that your device has a virus. For example, if you notice your device is suddenly running at a snail’s pace. Another example is programs or apps opening and closing on their own. Or a major sign would be if you receive an email from a friend responding to a mass email you supposedly sent promoting some great deal on a pharmaceutical (that you never actually sent).</p><p>Just like there are things you can do to prevent the chicken pox, like wash your hands and stay away from infected people, there are ways to prevent a virus from getting on your device.</p><ul><li><strong>Be wary.</strong> Don’t open attachments from people you don’t know.</li><li><strong>Think before you click.</strong> Don’t click blindly. Check the link URL to make sure you are being directed to a legitimate site.</li><li><strong>Keep your OS and browser updated.</strong> Make sure that you install the latest updates for your operating system and browser as well as any hardware updates that are available for your device as these often close up security holes.</li><li><strong>Install security software.</strong> Use comprehensive security software that protects all your devices, like <a href="http://home.mcafee.com/root/campaign.aspx?cid=132126">McAfee LiveSafe™</a>.</li></ul><p>Here’s to keeping all your devices nice and healthy!</p><p><a href="http://robertsiciliano.com/"><em>Robert Siciliano</em></a><em> is an Online Safety Expert to </em><a href="http://blogs.mcafee.com/author/robert-siciliano"><em>Intel Security</em></a><em>. He is the author of </em><a href="http://www.amazon.com/Things-Wish-Before-Identity-Stolen/dp/1941308996/ref=as_sl_pc_qf_sp_asin_til?tag=httprobertc02-20&linkCode=w00&linkId=JAZ7MOSJYUIXZMJ3&creativeASIN=1941308996"><em>99 Things You Wish You Knew Before Your Mobile was Hacked!</em></a><em> </em><a href="http://robertsiciliano.com/blog/2010/01/01/disclosures-term-conditions/"><em>Disclosures</em></a><em>.</em></p></div>What is a Potentially Unwanted Program (PUP)?https://globalriskcommunity.com/profiles/blogs/what-is-a-potentially-unwanted-program-pup2015-04-01T13:53:03.000Z2015-04-01T13:53:03.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to your device. What I’m talking about is a potentially unwanted program (PUP). What is an unwanted program? It’s software or an app that you don’t explicitly want on your device. PUPs usually are bundled with freeware and often installs without your permission.</p><p><img src="http://activerain.trulia.com/image_store/uploads/agents/robertsiciliano/files/1S.jpg" alt="" align="right" height="220" width="370" /></p><p>Note: PUPs are not <a href="http://blogs.mcafee.com/consumer/malware">malware</a>. The main difference is that you give consent to download the PUP, even though you might not know about it if you don’t read the agreements or installation process thoroughly.</p><p>So if PUPs aren’t malware, why are they bad? Some PUPs contain <a href="https://blogs.mcafee.com/consumer/family-safety/spyware-a-major-identity-theft-threat">spyware</a> including <a href="http://blogs.mcafee.com/consumer/what-is-a-keylogger">keyloggers</a>, dialers, and other software to gather your information which could lead to identity theft. Others may display annoying advertisements on your device. Even if the PUP doesn’t have any malicious content, too many PUPs can slow down your device by taking up space on your device and it can weaker your device’s security, making you vulnerable to malware.</p><p>Companies or hackers use several techniques to get you to download PUPs. One technique is offering multiple installation options. Although the standard or default options may be highly recommended by the company or hacker, it is usually the custom or advanced option that is PUP-free. Another trick is automatically including PUPs in the installation. You have to uncheck the boxes to opt-out of the PUP. Sometimes they will gray the opt-out option so it looks like you can’t get out of downloading a PUP. Other companies will sneak clauses about PUPs into the end user license agreement. This means when you click to agree with their user terms, you also agree to download PUPs.</p><p>Here’s some tips on how to make sure you don’t get a PUP.</p><ul><li><strong>Be picky.</strong> Hesitate before downloading any freeware. Do you really need that Guardian of the Galaxy wallpaper for your laptop? Be vigilant and only download from trusted sites.</li><li><strong>Customize.</strong> When downloading a program, it may be tempting to use the standard or default installation, but this version usually includes downloading programs you don’t need. Choose the custom installation.</li><li><strong>Opt out.</strong> Instead of asking you to opt in to PUPs, companies will automatically include the PUPs in the installation; it’s up to you to say no. For example, a freeware program might recommend that you install a free browser add-on andbelow this statement will be a box that is checked that indicates you want to install the add-on. If you don’t uncheck the box, you can potentially download a PUP you may know very little about.</li><li><strong>Read the fine print.</strong> Read the End User License Agreement before you accept it. There may be a clause about PUPs.</li><li><strong>Have comprehensive security software.</strong> Install security software that works for all of your devices, like <a href="http://home.mcafee.com/root/campaign.aspx?cid=132126">McAfee LiveSafe™</a> service. McAfee LiveSafe can detect PUPs and remove them from your device.</li></ul><p>Remember it’s much more fun to snuggle with furry pups rather than the computer code kind.</p><p><a href="http://robertsiciliano.com/"><em>Robert Siciliano</em></a><em> is an Online Safety Expert to </em><a href="http://blogs.mcafee.com/author/robert-siciliano"><em>Intel Security</em></a><em>. He is the author of</em> <a href="http://www.amazon.com/Things-Wish-Before-Identity-Stolen/dp/1941308996/ref=as_sl_pc_qf_sp_asin_til?tag=httprobertc02-20&linkCode=w00&linkId=JAZ7MOSJYUIXZMJ3&creativeASIN=1941308996"><em>99 Things You Wish You Knew Before Your Mobile was Hacked!</em></a><em> </em><a href="http://robertsiciliano.com/blog/2010/01/01/disclosures-term-conditions/"><em>Disclosures</em></a><em>.</em></p></div>This is what Spy Software looks likehttps://globalriskcommunity.com/profiles/blogs/this-is-what-spy-software-looks-like2015-03-11T14:28:12.000Z2015-03-11T14:28:12.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver.</p><p><img src="http://activerain.trulia.com/image_store/uploads/agents/robertsiciliano/files/2W.jpg" alt="" align="right" height="376" width="400" /></p><p>How primitive! Because these days, all of your computer, mobile, tablet and online activities can be “bugged” – without someone ever coming into your home or office—remote spying—done with spyware. They know what you’re posting to Facebook, what videos you’re watching, what secrets you’re telling or hiding—anything and everything. They may even be watching YOU as you type or recording your keystrokes.</p><p>Spyware companies sell the technology and it’s legal to purchase. Spyware ranges from $40 to $200 a month. Based on their sales, it’s feasible that millions of Internet users are being spied on.</p><p>Selling spyware is perfectly legal, as mentioned, even though this can get into the wrong hands. But it’s akin to the legal sales and use of knives. In the wrong hands, even a butter knife could be a dangerous weapon.</p><p>Though some spyware devices must be installed physically on the target’s device (e.g., wife installing on her husband’s device, employer installing on employee device, parent on child’s device), some devices can be installed remotely.</p><p>This isn’t as techy as you think. The spyware companies want to make money, so they’ve made it easy to install and use their products. Parents wanting to know what’s going on with their teenagers are drawn to this technology. So are psycho-stalkers.</p><p>Spyware is a big hit with people wanting to find out if their spouse or significant other is cheating on them, and many even focus on this in their ads. Another demographic that’s drawn to spyware are employers who want to see what their employees are up to.</p><p>But let’s not forget that a thief could spy on someone to get their credit card number, passwords and other crucial information and then use it to drain their bank accounts, max out their credit card or open a new credit card under their name and go wild with it.</p><p>Spyware can also be used to eavesdrop on phone calls after the snooper (or stalker) puts the app in the phone. There are cases in which abusive men did just this to their partner’s phone after the partner fled from them, then tracked them down and committed violence against them. So should spyware be banned? Well, it goes back to the butter knife analogy.</p><p>Spyware gets away with legality because of its strong legitimacy in terms of parents keeping an eye on their kids, and employers monitoring employees whom they think are goofing off on the job. However, an employer can take it further and “follow” where the employee goes on lunch break or to see if they went to that big basketball game when they called in sick.</p><p>That’s pushing it, but it can go even further: The spyware customer could intercept phone calls, text messages and anything else the unsuspecting target does on their smartphone. However, even though spyware came out in the mid ‘90s, there have been only three prosecutions. If it’s ever outlawed, parents will go berserk.</p><p>How many times have you read about something horrible that a teenager did, that was somehow connected to their online activities, and you thought, “Where were the parents when all this was going on? Weren’t they monitoring their kid’s online activities? Didn’t the parents care what their child was doing online?” Etc., etc.?</p><p>If these parents had had one of these spyware programs, maybe they would have nipped their kids’ problems in the bud and prevented tragedy. But don’t let these cases fool you: Parents make up a large percentage of spyware customers.</p><p>Critics of spyware won’t back down, including legislators, and maybe that’s why some companies are requiring customers to identify themselves as parents or employers in order to use their applications. This sounds more like defensive TOS, since anyone can claim they’re a parent or workplace supervisor without having to prove it. What’s a company really going to do…send out a private investigator to see if the new user really DOES have a teenager?</p><p>Now that you know more about spyware, how can you prevent someone from bugging your phone or computer? Keep your devices locked. Never leave your phone where someone can get to it.</p><p>Robert Siciliano is an Identity Theft Expert to <a href="http://hotspotshield.com">Hotspot Shield</a>. He is the author of <a href="http://robertsiciliano.com/identity-theft-book/"><em>99 Things You Wish You Knew Before Your Identity Was Stolen</em></a> See him discussing internet and wireless security on <a href="http://www.youtube.com/watch?v=Ynj5SgZEIyY&feature=share&list=UUxPUhCstuAW8GJR826pamYA">Good Morning America</a>. <a href="http://ow.ly/1bdMH">Disclosures</a>.</p></div>