What are stalkerware apps & how to protect yourself from spyware?

56
spyware and stalkerware apps | iTMunch

There’s no denying the fact that technology has made our lives easier. And while there are numerous pros of technology, losing control of privacy is one big con (more like a price we pay) we have to deal with for using technology. The State of Stalkerware report by Kaspersky found that 53,870 of their mobile users across the globe were affected by stalkerware apps in the year 2020 [1]. It also found that countries most affected by stalkware apps or spyware apps are Russia, Brazil and the United States of America.

Moreover, a NortonLifeLock study that surveyed more than 10,000 adults across 10 countries found that about 86% of the adults surveyed were not aware about stalkerware apps or had only heard of its name [2].

In this blog, you’ll understand what exactly stalkerware apps are, how you can know for sure if you are being digitally ‘stalked’ and how you can protect yourself from a spyware app.

What are stalkerware apps?

Stalkerware apps are software programs and devices that allow cybercriminals or other people to secretly monitor as well as record your device’s activity and information. These spyware apps are invasive and intrusive because they are installed on your phone without your knowledge and consent. Stalkerware apps are used by abusers for accessing:

  • Real-time location
  • Call logs 
  • Messages 
  • Camera (to watch you and your surroundings)
  • Microphone (to listen to you)

How to scan your phone for stalkerware apps

1. Inspect your app permissions

To check whether your phone has stalkerware apps installed, closely review the permissions you’ve granted to applications. You can do so by going to phone settings. If you find certain apps you’ve given a broad variety of app permissions to, that could be suspicious. You can use apps like “F-Secure SAFE” to easily review your app permissions.

2. Scan your phone’s admin app list

In the Settings of your Android phone, check Security Settings and look for any applications that you don’t recall downloading. If you find any such apps, further investigate what they actually are.

3. Leverage online resources on stalkerware apps

There are tons of resources available that talk about stalkware apps. You can visit websites like Coalition Against Stalkerware that teach you how to identify the existence of stalkerware apps on your device and what to do to protect yourself.

SEE ALSO: How to protect your digital infrastructure from cyber attacks?

How to protect yourself from stalkerware apps?

stalkerware apps | iTMunch

1. Make sure your phone has passcodes or passwords

Most stalkerware apps need physical access. Meaning, the app needs to be installed on your phone to get access. Make sure you place a strong passcode lock on your device to eliminate the risk of an abuser installing spyware on your device. Make sure you don’t share the passcode with anyone.

Moreover, be very cautious if you give your phone to someone to fix an issue on your phone. Trust your intuition. If you had given your phone for getting something fixed to someone, try to gauge if there’s something suspicious or if there’s increased stalking or monitoring.

2. Change these passwords often

You’ve set a passcode/password? Good. But it is also important to keep changing this password frequently, for your phone as well as your online accounts, to avoid un-permitted access. Always use strong and complex passwords for all your accounts that are easy for you to remember yet tough for cyber criminals to guess. Don’t save these passwords on your device.

3. Use two-factor authentication to protect your device from stalkerware apps

For any digital account that gives you the option, always go for two-factor authentication to protect yourself from stalkerware apps. This form of security requires 2 forms of identity verification before allowing you to log into your account.

Say, for instance, you’re trying to enter your Instagram account. 

Step 1: Instagram asks you to enter your username and password 

Step 2 Instagram asks you to enter an OTP (One Time Password) generated by an authentication app

With this added layer of protection, even if the intruder gets their hands on your password using the stalkerware, they still won’t be able to log in without that temporary code.

4. Update your phone’s software as and when required

Google and Apple often keep issuing software updates for their Android and iOS devices. These updates include important security fixes that are designed to remove and stalkerware apps from your phone. So, make sure your device is always updated to its latest, updated software version.

SEE ALSO: Data Security: Definition, Importance & What it Looks Like in 2021

5. Use anti-spyware and antivirus software protection 

Anti-spyware is a software designed to detect and eliminate unwanted spyware programs and stalkerware apps on devices. Anti-spyware apps and software perform routine checks on your devices to make sure your systems are safe and secure. It ensures your privacy is protected from any possible intrusions.

Antivirus is a program (or set of programs) designed to detect, look for, prevent and remove software viruses as well as other malicious software such as trojans, worms, and adware. Antivirus is critical for any user and device. It also needs to be updated regularly because a device without antivirus protection is prone to be infected within seconds of connecting to the internet.

Antivirus protects you from malicious online activities by scanning specific files and directories for any malware or any known malicious patterns. It also allows you to schedule scans on your devices to automatically run for you.

6. Leverage security features your phone offers 

Most Android devices have security settings that enable installation from sources unknown. Turning this setting off minimizes the chances of applications outside of Google Play Store from being downloaded on the phone. You can also switch on Google Play Protect on Android phones. Google Play Protect scans for apps for you with malware and viruses. This can protect your device from most spyware and stalkerware apps. 

7. Do not jailbreak or root your phone

Smartphones, be it Android or iOS, come with operating system limitations and restrictions by mobile carriers. By ‘jailbreaking’ on iOS and ‘rooting’ for Android, your device bypasses those restrictions and enables more customization.

Avoid jailbreaking and rooting because such devices are more prone and vulnerable to viruses and make it easier for stalkerware apps and spyware to be installed. Moreover, many more invasive stalkerware apps and features do not work unless the device is jailbroken or rooted. On iPhones, most stalkerware apps cannot be installed unless the phone is jailbroken. 

SEE ALSO: 6 important questions to ask your AI security solutions vendor

For more latest IT news and updates, keep reading iTMunch

Image Courtesy

Featured Image: Technology photo created by rawpixel.com – www.freepik.com

Image 1: Image by Biljana Jovanovic from Pixabay

Sources

[1] Kaspersky & Coalition Against Stalkerware (2020) “The State of Stalkerware in 2020” [Online] Available from: https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/25175212/EN_The-State-of-Stalkerware-2020.pdf [Accessed November 2021]

[2] Norton (2021) “Norton Cyber Safety Insights Report” [Online] Available from: https://us.norton.com/nortonlifelock-cyber-safety-report?_gl=1*9bq3pd*_ga4_ga*LU1vN0QxTzBPOFN6VndMT1k4QWY.*_ga4_ga_KKPP18MZ8Y*MTYzNjUzMzA4Ni4zLjAuMTYzNjUzMzA4Ni42MA.. [Accessed November 2021]

Subscribe to our Newsletter!

Previous articleFintech giant Revolut plans on building its own cryptocurrency exchange
Next articleAdvantages of outsourcing with ERP managed services
Riddhi Jain is a technology content writer. She is based in India and has been working as a content writer since 2018. Riddhi has been writing content in the tech domain since May 2020 and can’t get enough of it. Riddhi has pursued most of her education from her hometown, Indore. She has graduated as a Bachelor of Business Administration and discovered her love for writing blogs while pursuing an internship during college. Once she discovered her love for writing, she went on to improve this skill set (and hasn’t stopped since). Riddhi’s writing relationship with iTMunch began in May 2020. This is where she developed a knack for writing content for the technology domain. She's an expert in tech content writing who has written over 700 blogs for iTMunch in just a year. Riddhi loves diving deep into tech sub-domains like financial technology, marketing technology, HR technology, Artificial Intelligence and gaming technology. She loves staying updated with the latest and upcoming trends in digital marketing, digital payments, fintech, gaming, web design and app development. She cherishes writing about futuristic technologies like blockchain and cryptocurrency, NFTs, Internet of Things, Facial Recognition, Machine Learning, Edge Computing, etc. Riddhi also likes to keep an eye on what’s going on with the tech titans like Google, Facebook and Apple. One of her major interests is in staying updated with the latest IT startups and the groundbreaking technologies they’re coming up with. When Riddhi is not writing content, she is binging on documentaries on Netflix (check out ‘The Great Hack’, ‘Seaspiracy’, and ‘What the Health’). She also likes reading books once in a while (Yuval Noah Harari and Michelle Magorian are some of her favorite authors). Riddhi also likes listening to podcasts like The Tim Ferriss Show (do listen to the ones with guest Naval Ravikant) and The Joe Rogan Experience.